Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 23:42
Behavioral task
behavioral1
Sample
23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe
Resource
win10v2004-20241007-en
General
-
Target
23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe
-
Size
2.9MB
-
MD5
0981843c2e0c2722ceffd71d48849b80
-
SHA1
86f71db7708588eab7d9aeb3603cdbc0bbff3d22
-
SHA256
23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532f
-
SHA512
aa1ef006d3b86edff7aabd28613535eae082db8f6e57c1a107bd445809b756680b63fcadfed77ddea18dabe9e922c17508555c9e2083cff93f3f36bd4c3ef77a
-
SSDEEP
24576:ATU7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHi:ATU7AAmw4gxeOw46fUbNecCCFbNecl
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload 4 IoCs
resource yara_rule behavioral1/files/0x0007000000019403-89.dat warzonerat behavioral1/files/0x00070000000193d9-171.dat warzonerat behavioral1/files/0x0008000000019401-188.dat warzonerat behavioral1/files/0x0008000000019401-673.dat warzonerat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs cmd.exe -
Executes dropped EXE 22 IoCs
pid Process 1736 explorer.exe 1744 explorer.exe 1772 explorer.exe 2456 spoolsv.exe 2232 spoolsv.exe 2808 spoolsv.exe 2784 spoolsv.exe 2980 spoolsv.exe 2208 spoolsv.exe 308 spoolsv.exe 1016 spoolsv.exe 2928 spoolsv.exe 2956 spoolsv.exe 2132 spoolsv.exe 1104 spoolsv.exe 1028 spoolsv.exe 2096 spoolsv.exe 1608 spoolsv.exe 1800 spoolsv.exe 2484 spoolsv.exe 2396 spoolsv.exe 1220 spoolsv.exe -
Loads dropped DLL 32 IoCs
pid Process 2164 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 2164 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 1772 explorer.exe 1772 explorer.exe 2456 spoolsv.exe 1772 explorer.exe 1772 explorer.exe 2808 spoolsv.exe 1772 explorer.exe 1772 explorer.exe 2980 spoolsv.exe 1772 explorer.exe 1772 explorer.exe 308 spoolsv.exe 1772 explorer.exe 1772 explorer.exe 2928 spoolsv.exe 1772 explorer.exe 1772 explorer.exe 2132 spoolsv.exe 1772 explorer.exe 1772 explorer.exe 1028 spoolsv.exe 1772 explorer.exe 1772 explorer.exe 1608 spoolsv.exe 1772 explorer.exe 1772 explorer.exe 2484 spoolsv.exe 1772 explorer.exe 1772 explorer.exe 1220 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft OneDrive = "C:\\Users\\Admin\\AppData\\Local\\Chrome\\StikyNot.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 15 IoCs
description pid Process procid_target PID 3068 set thread context of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 2888 set thread context of 2164 2888 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 33 PID 2888 set thread context of 1480 2888 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 34 PID 1736 set thread context of 1744 1736 explorer.exe 38 PID 1744 set thread context of 1772 1744 explorer.exe 40 PID 1744 set thread context of 1988 1744 explorer.exe 41 PID 2456 set thread context of 2232 2456 spoolsv.exe 45 PID 2808 set thread context of 2784 2808 spoolsv.exe 48 PID 2980 set thread context of 2208 2980 spoolsv.exe 52 PID 308 set thread context of 1016 308 spoolsv.exe 55 PID 2928 set thread context of 2956 2928 spoolsv.exe 59 PID 2132 set thread context of 1104 2132 spoolsv.exe 63 PID 1028 set thread context of 2096 1028 spoolsv.exe 66 PID 1608 set thread context of 1800 1608 spoolsv.exe 70 PID 2484 set thread context of 2396 2484 spoolsv.exe 74 -
resource yara_rule behavioral1/memory/3068-0-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/3068-2-0x0000000000310000-0x0000000000356000-memory.dmp upx behavioral1/memory/3068-51-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/files/0x0007000000019403-89.dat upx behavioral1/memory/1736-144-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/files/0x00070000000193d9-171.dat upx behavioral1/files/0x0008000000019401-188.dat upx behavioral1/memory/2456-198-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/1772-194-0x00000000004E0000-0x0000000000526000-memory.dmp upx behavioral1/memory/2808-253-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2980-306-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/308-362-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/memory/2928-414-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral1/files/0x0008000000019401-673.dat upx -
Drops file in Windows directory 14 IoCs
description ioc Process File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 32 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 2164 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 1736 explorer.exe 2456 spoolsv.exe 1772 explorer.exe 1772 explorer.exe 2808 spoolsv.exe 1772 explorer.exe 2980 spoolsv.exe 1772 explorer.exe 308 spoolsv.exe 1772 explorer.exe 2928 spoolsv.exe 1772 explorer.exe 2132 spoolsv.exe 1772 explorer.exe 1028 spoolsv.exe 1772 explorer.exe 1608 spoolsv.exe 1772 explorer.exe 2484 spoolsv.exe 1772 explorer.exe 1220 spoolsv.exe -
Suspicious use of SetWindowsHookEx 30 IoCs
pid Process 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 2164 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 2164 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 1736 explorer.exe 1736 explorer.exe 1772 explorer.exe 1772 explorer.exe 2456 spoolsv.exe 2456 spoolsv.exe 1772 explorer.exe 1772 explorer.exe 2808 spoolsv.exe 2808 spoolsv.exe 2980 spoolsv.exe 2980 spoolsv.exe 308 spoolsv.exe 308 spoolsv.exe 2928 spoolsv.exe 2928 spoolsv.exe 2132 spoolsv.exe 2132 spoolsv.exe 1028 spoolsv.exe 1028 spoolsv.exe 1608 spoolsv.exe 1608 spoolsv.exe 2484 spoolsv.exe 2484 spoolsv.exe 1220 spoolsv.exe 1220 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2892 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 30 PID 3068 wrote to memory of 2892 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 30 PID 3068 wrote to memory of 2892 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 30 PID 3068 wrote to memory of 2892 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 30 PID 3068 wrote to memory of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 3068 wrote to memory of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 3068 wrote to memory of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 3068 wrote to memory of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 3068 wrote to memory of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 3068 wrote to memory of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 3068 wrote to memory of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 3068 wrote to memory of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 3068 wrote to memory of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 3068 wrote to memory of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 3068 wrote to memory of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 3068 wrote to memory of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 3068 wrote to memory of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 3068 wrote to memory of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 3068 wrote to memory of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 3068 wrote to memory of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 3068 wrote to memory of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 3068 wrote to memory of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 3068 wrote to memory of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 3068 wrote to memory of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 3068 wrote to memory of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 3068 wrote to memory of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 3068 wrote to memory of 2888 3068 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 32 PID 2888 wrote to memory of 2164 2888 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 33 PID 2888 wrote to memory of 2164 2888 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 33 PID 2888 wrote to memory of 2164 2888 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 33 PID 2888 wrote to memory of 2164 2888 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 33 PID 2888 wrote to memory of 2164 2888 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 33 PID 2888 wrote to memory of 2164 2888 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 33 PID 2888 wrote to memory of 2164 2888 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 33 PID 2888 wrote to memory of 2164 2888 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 33 PID 2888 wrote to memory of 2164 2888 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 33 PID 2888 wrote to memory of 1480 2888 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 34 PID 2888 wrote to memory of 1480 2888 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 34 PID 2888 wrote to memory of 1480 2888 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 34 PID 2888 wrote to memory of 1480 2888 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 34 PID 2888 wrote to memory of 1480 2888 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 34 PID 2888 wrote to memory of 1480 2888 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 34 PID 2164 wrote to memory of 1736 2164 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 35 PID 2164 wrote to memory of 1736 2164 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 35 PID 2164 wrote to memory of 1736 2164 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 35 PID 2164 wrote to memory of 1736 2164 23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe 35 PID 1736 wrote to memory of 1964 1736 explorer.exe 36 PID 1736 wrote to memory of 1964 1736 explorer.exe 36 PID 1736 wrote to memory of 1964 1736 explorer.exe 36 PID 1736 wrote to memory of 1964 1736 explorer.exe 36 PID 1736 wrote to memory of 1744 1736 explorer.exe 38 PID 1736 wrote to memory of 1744 1736 explorer.exe 38 PID 1736 wrote to memory of 1744 1736 explorer.exe 38 PID 1736 wrote to memory of 1744 1736 explorer.exe 38 PID 1736 wrote to memory of 1744 1736 explorer.exe 38 PID 1736 wrote to memory of 1744 1736 explorer.exe 38 PID 1736 wrote to memory of 1744 1736 explorer.exe 38 PID 1736 wrote to memory of 1744 1736 explorer.exe 38 PID 1736 wrote to memory of 1744 1736 explorer.exe 38 PID 1736 wrote to memory of 1744 1736 explorer.exe 38 PID 1736 wrote to memory of 1744 1736 explorer.exe 38 PID 1736 wrote to memory of 1744 1736 explorer.exe 38 PID 1736 wrote to memory of 1744 1736 explorer.exe 38 PID 1736 wrote to memory of 1744 1736 explorer.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe"C:\Users\Admin\AppData\Local\Temp\23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exeC:\Users\Admin\AppData\Local\Temp\23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exeC:\Users\Admin\AppData\Local\Temp\23c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532fN.exe3⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\explorer.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"5⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1964
-
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1744 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe6⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1772 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1260
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2232
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2776
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2784
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1724
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2208
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2360
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1016
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1924
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2956
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2424
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1104
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:1936
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2096
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵PID:2812
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1800
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2892
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2396
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1856
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe8⤵PID:1536
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"6⤵PID:1988
-
-
-
-
-
C:\Windows\SysWOW64\diskperf.exe"C:\Windows\SysWOW64\diskperf.exe"3⤵PID:1480
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "c:\windows\system\spoolsv.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"1⤵PID:1544
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD50981843c2e0c2722ceffd71d48849b80
SHA186f71db7708588eab7d9aeb3603cdbc0bbff3d22
SHA25623c32832b80a9530e2fdf1cd335585847cb25bb11c3c8e3008bb3e34c415532f
SHA512aa1ef006d3b86edff7aabd28613535eae082db8f6e57c1a107bd445809b756680b63fcadfed77ddea18dabe9e922c17508555c9e2083cff93f3f36bd4c3ef77a
-
Filesize
93B
MD58445bfa5a278e2f068300c604a78394b
SHA19fb4eef5ec2606bd151f77fdaa219853d4aa0c65
SHA2565ddf324661da70998e89da7469c0eea327faae9216b9abc15c66fe95deec379c
SHA5128ad7d18392a15cabbfd4d30b2e8a2aad899d35aba099b5be1f6852ca39f58541fb318972299c5728a30fd311db011578c3aaf881fa8b8b42067d2a1e11c50822
-
Filesize
92B
MD513222a4bb413aaa8b92aa5b4f81d2760
SHA1268a48f2fe84ed49bbdc1873a8009db8c7cba66a
SHA256d170ac99460f9c1fb30717345b1003f8eb9189c26857ca26d3431590e6f0e23d
SHA512eee47ead9bef041b510ee5e40ebe8a51abd41d8c1fe5de68191f2b996feaa6cc0b8c16ed26d644fbf1d7e4f40920d7a6db954e19f2236d9e4e3f3f984f21b140
-
Filesize
2.9MB
MD5c01d7814edbf37a3085891028907409e
SHA1575ea048753b8c6f81a810945480ea2b3259467f
SHA256da381a49414370d9422386601b3b9b271a8a0cf563b9c7f7c7d8a15ec8e081aa
SHA51253c2ad4f8cae82a8d931ab1b66952b370657991a03ed28bed28024c9daf6590a4411884eee99c695c6f037eee9ca98065b840bf898c09b9c7c6faea311600f7b
-
Filesize
2.9MB
MD58368c82950cec923a4b80cf6b8443b97
SHA1d4dc0c7d7ad86ab824d95f3bb4f66a2b97da009e
SHA256afb6720e23333c5b43296800ce07d4a417114004f02a8056f4ed68ae75675d56
SHA512fb1272ae8b86e21dc0fa60a1dccd52a7adcdbe6c9af30d14260433c34e40ea0fe6c04e1747938f2d565fc797e5e88594c9834075d4d32e3a2f1da092be297689
-
Filesize
1.6MB
MD5264158dc3710585e70a238bd1d8aa3bf
SHA15e291a99e3599dae49793889f4f9535654ff5ae8
SHA25697bb4c54c3f86b44b3edeed069d701408d149e02b8507198b74a4810c530af76
SHA512055c648571e401625794be267d3d872dcb47d7345498feb85cfacf0130c8e28cb3d71f7da866fe65adf8fdc0ab713104c2551399e9dc56af5c315ec3d3682715