Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2023, 13:54
Static task
static1
Behavioral task
behavioral1
Sample
Documento_digitaL.scr
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
Documento_digitaL.scr
Resource
win10v2004-20230703-en
General
-
Target
Documento_digitaL.scr
-
Size
1.4MB
-
MD5
850d9e8271dcae3b78c922aeddd9f743
-
SHA1
95971cc0caf853f0e4750cdaff5874b4adc2a4a3
-
SHA256
0e25b5299c3df59e05d296b1478d43094d5d81e1a5b8706fd355b36388244326
-
SHA512
0e4af245411c80d1cdc52d72a16fddbad41a3dc9972bdb8a25fe9f50721c8306eebb17ee30c1a504e370ff7cb8175e411c4b13188336f093269468906500b5ef
-
SSDEEP
24576:9VgmnudJ41JhQ0IM6AYsLKBL/7DciY5tTb2p0UdEWVnK:9VSr4+M63ci6b2pxI
Malware Config
Extracted
remcos
matarifeJULIO5
matarife.duckdns.org:2798
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
20
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-ZQGP5Y
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Control Panel\International\Geo\Nation Documento_digitaL.scr Key value queried \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Control Panel\International\Geo\Nation RAd00000000000000000523KJIUTJ.SCR -
Drops startup file 7 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AXd00000000000000000523KJIUTJ.lnk AXd00000000000000000523KJIUTJ.SCR File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AXd00000000000000000523KJIUTJ.lnk AXd00000000000000000523KJIUTJ.SCR File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\anydeskMR.exe Powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\anydeskMR.exe Powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\anydeskMRX.exe Powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\anydeskMRX.exe Powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\anydeskMR.exe Powershell.exe -
Executes dropped EXE 10 IoCs
pid Process 3780 AXd00000000000000000523KJIUTJ.SCR 1348 RAd00000000000000000523KJIUTJ.SCR 2832 RAd00000000000000000523KJIUTJ.SCR 4732 RAd00000000000000000523KJIUTJ.SCR 3376 remcos.exe 2368 AXd00000000000000000523KJIUTJ.SCR 2272 remcos.exe 4768 remcos.exe 4180 remcos.exe 1216 remcos.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Software\Microsoft\Windows\CurrentVersion\Run\ RAd00000000000000000523KJIUTJ.SCR Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-ZQGP5Y = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" RAd00000000000000000523KJIUTJ.SCR Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Software\Microsoft\Windows\CurrentVersion\Run\ remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-ZQGP5Y = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{B7E93B47-53CD-4496-99EA-19B326B765F4}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat svchost.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1348 set thread context of 4732 1348 Process not Found 88 PID 3780 set thread context of 2368 3780 AXd00000000000000000523KJIUTJ.SCR 100 PID 3376 set thread context of 1216 3376 remcos.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\Local Settings Documento_digitaL.scr -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 812 Powershell.exe 812 Powershell.exe 1348 Process not Found 1348 Process not Found 4996 Powershell.exe 4548 Powershell.exe 4996 Powershell.exe 4548 Powershell.exe 3376 remcos.exe 3376 remcos.exe 3376 remcos.exe 3376 remcos.exe 3376 remcos.exe 3376 remcos.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 2368 AXd00000000000000000523KJIUTJ.SCR 2368 AXd00000000000000000523KJIUTJ.SCR -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 812 Powershell.exe Token: SeDebugPrivilege 1348 Process not Found Token: SeDebugPrivilege 4996 Powershell.exe Token: SeDebugPrivilege 4548 Powershell.exe Token: SeDebugPrivilege 3780 AXd00000000000000000523KJIUTJ.SCR Token: SeDebugPrivilege 3376 remcos.exe Token: SeDebugPrivilege 2368 AXd00000000000000000523KJIUTJ.SCR -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4532 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 1216 remcos.exe 4532 AcroRd32.exe 2368 AXd00000000000000000523KJIUTJ.SCR -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2924 wrote to memory of 3780 2924 Documento_digitaL.scr 81 PID 2924 wrote to memory of 3780 2924 Documento_digitaL.scr 81 PID 2924 wrote to memory of 3780 2924 Documento_digitaL.scr 81 PID 2924 wrote to memory of 1348 2924 Documento_digitaL.scr 83 PID 2924 wrote to memory of 1348 2924 Documento_digitaL.scr 83 PID 2924 wrote to memory of 1348 2924 Documento_digitaL.scr 83 PID 2924 wrote to memory of 4532 2924 Documento_digitaL.scr 84 PID 2924 wrote to memory of 4532 2924 Documento_digitaL.scr 84 PID 2924 wrote to memory of 4532 2924 Documento_digitaL.scr 84 PID 1348 wrote to memory of 812 1348 Process not Found 85 PID 1348 wrote to memory of 812 1348 Process not Found 85 PID 1348 wrote to memory of 812 1348 Process not Found 85 PID 1348 wrote to memory of 2832 1348 Process not Found 87 PID 1348 wrote to memory of 2832 1348 Process not Found 87 PID 1348 wrote to memory of 2832 1348 Process not Found 87 PID 1348 wrote to memory of 4732 1348 Process not Found 88 PID 1348 wrote to memory of 4732 1348 Process not Found 88 PID 1348 wrote to memory of 4732 1348 Process not Found 88 PID 1348 wrote to memory of 4732 1348 Process not Found 88 PID 1348 wrote to memory of 4732 1348 Process not Found 88 PID 1348 wrote to memory of 4732 1348 Process not Found 88 PID 1348 wrote to memory of 4732 1348 Process not Found 88 PID 1348 wrote to memory of 4732 1348 Process not Found 88 PID 1348 wrote to memory of 4732 1348 Process not Found 88 PID 1348 wrote to memory of 4732 1348 Process not Found 88 PID 1348 wrote to memory of 4732 1348 Process not Found 88 PID 1348 wrote to memory of 4732 1348 Process not Found 88 PID 4532 wrote to memory of 1616 4532 AcroRd32.exe 90 PID 4532 wrote to memory of 1616 4532 AcroRd32.exe 90 PID 4532 wrote to memory of 1616 4532 AcroRd32.exe 90 PID 4732 wrote to memory of 3376 4732 RAd00000000000000000523KJIUTJ.SCR 92 PID 4732 wrote to memory of 3376 4732 RAd00000000000000000523KJIUTJ.SCR 92 PID 4732 wrote to memory of 3376 4732 RAd00000000000000000523KJIUTJ.SCR 92 PID 3780 wrote to memory of 4996 3780 AXd00000000000000000523KJIUTJ.SCR 94 PID 3780 wrote to memory of 4996 3780 AXd00000000000000000523KJIUTJ.SCR 94 PID 3780 wrote to memory of 4996 3780 AXd00000000000000000523KJIUTJ.SCR 94 PID 3376 wrote to memory of 4548 3376 remcos.exe 95 PID 3376 wrote to memory of 4548 3376 remcos.exe 95 PID 3376 wrote to memory of 4548 3376 remcos.exe 95 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 PID 1616 wrote to memory of 3208 1616 RdrCEF.exe 97 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Documento_digitaL.scr"C:\Users\Admin\AppData\Local\Temp\Documento_digitaL.scr" /S1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\AXd00000000000000000523KJIUTJ.SCR"C:\Users\Admin\AppData\Local\Temp\AXd00000000000000000523KJIUTJ.SCR" /S2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\AXd00000000000000000523KJIUTJ.SCR' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\anydeskMRX.exe'3⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
-
C:\Users\Admin\AppData\Local\Temp\AXd00000000000000000523KJIUTJ.SCR"C:\Users\Admin\AppData\Local\Temp\AXd00000000000000000523KJIUTJ.SCR"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2368
-
-
-
C:\Users\Admin\AppData\Local\Temp\RAd00000000000000000523KJIUTJ.SCR"C:\Users\Admin\AppData\Local\Temp\RAd00000000000000000523KJIUTJ.SCR" /S2⤵
- Executes dropped EXE
PID:1348 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\RAd00000000000000000523KJIUTJ.SCR' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\anydeskMR.exe'3⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:812
-
-
C:\Users\Admin\AppData\Local\Temp\RAd00000000000000000523KJIUTJ.SCR"C:\Users\Admin\AppData\Local\Temp\RAd00000000000000000523KJIUTJ.SCR"3⤵
- Executes dropped EXE
PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\RAd00000000000000000523KJIUTJ.SCR"C:\Users\Admin\AppData\Local\Temp\RAd00000000000000000523KJIUTJ.SCR"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\ProgramData\Remcos\remcos.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\anydeskMR.exe'5⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"5⤵
- Executes dropped EXE
PID:2272
-
-
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"5⤵
- Executes dropped EXE
PID:4768
-
-
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"5⤵
- Executes dropped EXE
PID:4180
-
-
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1216
-
-
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Carpeta Acta Del Caso JurÃdico.pdf"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=999EB93B57C7DA8BA4AB09E5F5BC4DBE --mojo-platform-channel-handle=1720 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:3208
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=93B0D21850D2717D8359B1793390072E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=93B0D21850D2717D8359B1793390072E --renderer-client-id=2 --mojo-platform-channel-handle=1728 --allow-no-sandbox-job /prefetch:14⤵PID:1076
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=761F4ED8A2FBB97B3679F88BADE6B286 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=761F4ED8A2FBB97B3679F88BADE6B286 --renderer-client-id=4 --mojo-platform-channel-handle=2148 --allow-no-sandbox-job /prefetch:14⤵PID:4728
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=97CF6EB1497A140364164D33FA48E7D5 --mojo-platform-channel-handle=2580 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4448
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B6396474975FD3F876CDA1666BC38391 --mojo-platform-channel-handle=1784 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4884
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=83F9785EC5DAF7CCC7D0A56A53A18704 --mojo-platform-channel-handle=2668 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:1584
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3024
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:3468
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234B
MD54b3cb7b4f90ba53c0b1c87852a76b729
SHA1bc920c3d5046abd8e164ba9b8f8e4f543fe9122f
SHA256088d896ab383d81a68b6404d21db0f6ebbb352c8e2a7bf66e481b0b0bde0a8f0
SHA512695ea1472f2946eb9c2c5a5a4808debbfacd0ad09aa103c29af9a4428d93c41513ec434dae3918dd14149ab0d4e54b5e0bc88f8287df8e42f09c901b11d74c96
-
Filesize
853KB
MD5c6ea0e7a228a5de6fdb682fd0a135d67
SHA1264d0950d5ac08b6dc784b5e372237185a3b956c
SHA25640495077a292c313a58d5d42004097acf6372f0ab3f7e20c14872e7623edf6a2
SHA5121bb34d149e390a2668abe85e977ec9285002e15dc741315b0888df44e1b0b7ebf1c7a03b9ad041ad19f51325702176124e123ea3b5c3bd76a8f83bca5c10b5d5
-
Filesize
853KB
MD5c6ea0e7a228a5de6fdb682fd0a135d67
SHA1264d0950d5ac08b6dc784b5e372237185a3b956c
SHA25640495077a292c313a58d5d42004097acf6372f0ab3f7e20c14872e7623edf6a2
SHA5121bb34d149e390a2668abe85e977ec9285002e15dc741315b0888df44e1b0b7ebf1c7a03b9ad041ad19f51325702176124e123ea3b5c3bd76a8f83bca5c10b5d5
-
Filesize
853KB
MD5c6ea0e7a228a5de6fdb682fd0a135d67
SHA1264d0950d5ac08b6dc784b5e372237185a3b956c
SHA25640495077a292c313a58d5d42004097acf6372f0ab3f7e20c14872e7623edf6a2
SHA5121bb34d149e390a2668abe85e977ec9285002e15dc741315b0888df44e1b0b7ebf1c7a03b9ad041ad19f51325702176124e123ea3b5c3bd76a8f83bca5c10b5d5
-
Filesize
853KB
MD5c6ea0e7a228a5de6fdb682fd0a135d67
SHA1264d0950d5ac08b6dc784b5e372237185a3b956c
SHA25640495077a292c313a58d5d42004097acf6372f0ab3f7e20c14872e7623edf6a2
SHA5121bb34d149e390a2668abe85e977ec9285002e15dc741315b0888df44e1b0b7ebf1c7a03b9ad041ad19f51325702176124e123ea3b5c3bd76a8f83bca5c10b5d5
-
Filesize
853KB
MD5c6ea0e7a228a5de6fdb682fd0a135d67
SHA1264d0950d5ac08b6dc784b5e372237185a3b956c
SHA25640495077a292c313a58d5d42004097acf6372f0ab3f7e20c14872e7623edf6a2
SHA5121bb34d149e390a2668abe85e977ec9285002e15dc741315b0888df44e1b0b7ebf1c7a03b9ad041ad19f51325702176124e123ea3b5c3bd76a8f83bca5c10b5d5
-
Filesize
853KB
MD5c6ea0e7a228a5de6fdb682fd0a135d67
SHA1264d0950d5ac08b6dc784b5e372237185a3b956c
SHA25640495077a292c313a58d5d42004097acf6372f0ab3f7e20c14872e7623edf6a2
SHA5121bb34d149e390a2668abe85e977ec9285002e15dc741315b0888df44e1b0b7ebf1c7a03b9ad041ad19f51325702176124e123ea3b5c3bd76a8f83bca5c10b5d5
-
Filesize
853KB
MD5c6ea0e7a228a5de6fdb682fd0a135d67
SHA1264d0950d5ac08b6dc784b5e372237185a3b956c
SHA25640495077a292c313a58d5d42004097acf6372f0ab3f7e20c14872e7623edf6a2
SHA5121bb34d149e390a2668abe85e977ec9285002e15dc741315b0888df44e1b0b7ebf1c7a03b9ad041ad19f51325702176124e123ea3b5c3bd76a8f83bca5c10b5d5
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD53ffa98ad3c022ec54298ddb75ceaab71
SHA189bfa0c01b2263df01c67562859b4a514c269ec5
SHA2561a0d20c34597e15277dd284c616c5612a766e37d4ffd3104ff4bc19ed8cd3764
SHA5125af2c2bfc1f6a400bdfdcf836439b9d29a4fb236a7311502c76f943f700eb054f81eff68d785386e85026b08b05ee55e5c74f1f4c42bed876f92e33b96a9594b
-
Filesize
1KB
MD5def65711d78669d7f8e69313be4acf2e
SHA16522ebf1de09eeb981e270bd95114bc69a49cda6
SHA256aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c
SHA51205b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7
-
Filesize
15KB
MD51199b6089b9ac32e086be709bdc790a7
SHA182a53ddc3f558d757f5fe1e1b342ccc6f2f6d640
SHA25611628e1da8d535f098ad61846f2efe5a68387d9247aa606aa581ed7213c12681
SHA5121697abd703478840d2b4f88dab2de558ccfd1f8f887454447ebfc0d20a0a1580c01223dd069acc7fec91013b2afdb15a5538780d91e34b02552b4f8d61ecf5ac
-
Filesize
15KB
MD51c23a11395c420cc7c0ec7cf50d2f225
SHA1a74bf7034f2d0616e61b4237e4fbde0965cb5612
SHA256694297f659a123090f9463a0851971bf5822c382ae17afc8af4b6835e2f08ed9
SHA5129f378895793a7d0cfabd329be8305413243a6bfb1adaf9481d03d4915bb3d2b83098744eeefd2f6bc967c1d4658410bbe4f2d8d4d722a4acb209ca4c81c51620
-
Filesize
571KB
MD5f0ee9b49497460c19c470e2ba4a9db70
SHA14dcc8dd8b1f54fa6f0d7af9438b403fbf84f8b37
SHA25651e46ab5623646e8fea7fd1b13348f0adc510a0712e7b1b506d3117d6b066c19
SHA512b441f746cc666a68abf96778c4cc61aac41e4bac5c8ed950e9de432972e0b712a37e278f2107b005ec7c9c8f858495bab54cfb34deb259e579731a6941773482
-
Filesize
571KB
MD5f0ee9b49497460c19c470e2ba4a9db70
SHA14dcc8dd8b1f54fa6f0d7af9438b403fbf84f8b37
SHA25651e46ab5623646e8fea7fd1b13348f0adc510a0712e7b1b506d3117d6b066c19
SHA512b441f746cc666a68abf96778c4cc61aac41e4bac5c8ed950e9de432972e0b712a37e278f2107b005ec7c9c8f858495bab54cfb34deb259e579731a6941773482
-
Filesize
571KB
MD5f0ee9b49497460c19c470e2ba4a9db70
SHA14dcc8dd8b1f54fa6f0d7af9438b403fbf84f8b37
SHA25651e46ab5623646e8fea7fd1b13348f0adc510a0712e7b1b506d3117d6b066c19
SHA512b441f746cc666a68abf96778c4cc61aac41e4bac5c8ed950e9de432972e0b712a37e278f2107b005ec7c9c8f858495bab54cfb34deb259e579731a6941773482
-
Filesize
112KB
MD5238e8416d317ec42a14f2ba41e3dfcf4
SHA1b5a2b1864e5daffd1adabc463975f98783845633
SHA256299e149cf809474d19d823ea9fd6e8d7b1403c5040bb85a29b02e9624c022988
SHA5120a6af03d8601ddf536aef607875989eda2efc074ad0124acb399688e648efa655d9f4f3b2a57ff6c69fabd95795b7a2d40e02b6aeec88d7657edbceb9b00729f
-
Filesize
853KB
MD5c6ea0e7a228a5de6fdb682fd0a135d67
SHA1264d0950d5ac08b6dc784b5e372237185a3b956c
SHA25640495077a292c313a58d5d42004097acf6372f0ab3f7e20c14872e7623edf6a2
SHA5121bb34d149e390a2668abe85e977ec9285002e15dc741315b0888df44e1b0b7ebf1c7a03b9ad041ad19f51325702176124e123ea3b5c3bd76a8f83bca5c10b5d5
-
Filesize
853KB
MD5c6ea0e7a228a5de6fdb682fd0a135d67
SHA1264d0950d5ac08b6dc784b5e372237185a3b956c
SHA25640495077a292c313a58d5d42004097acf6372f0ab3f7e20c14872e7623edf6a2
SHA5121bb34d149e390a2668abe85e977ec9285002e15dc741315b0888df44e1b0b7ebf1c7a03b9ad041ad19f51325702176124e123ea3b5c3bd76a8f83bca5c10b5d5
-
Filesize
853KB
MD5c6ea0e7a228a5de6fdb682fd0a135d67
SHA1264d0950d5ac08b6dc784b5e372237185a3b956c
SHA25640495077a292c313a58d5d42004097acf6372f0ab3f7e20c14872e7623edf6a2
SHA5121bb34d149e390a2668abe85e977ec9285002e15dc741315b0888df44e1b0b7ebf1c7a03b9ad041ad19f51325702176124e123ea3b5c3bd76a8f83bca5c10b5d5
-
Filesize
853KB
MD5c6ea0e7a228a5de6fdb682fd0a135d67
SHA1264d0950d5ac08b6dc784b5e372237185a3b956c
SHA25640495077a292c313a58d5d42004097acf6372f0ab3f7e20c14872e7623edf6a2
SHA5121bb34d149e390a2668abe85e977ec9285002e15dc741315b0888df44e1b0b7ebf1c7a03b9ad041ad19f51325702176124e123ea3b5c3bd76a8f83bca5c10b5d5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
14KB
MD5c01eaa0bdcd7c30a42bbb35a9acbf574
SHA10aee3e1b873e41d040f1991819d0027b6cc68f54
SHA25632297224427103aa1834dba276bf5d49cd5dd6bda0291422e47ad0d0706c6d40
SHA512d26ff775ad39425933cd3df92209faa53ec5b701e65bfbcccc64ce8dd3e79f619a9bad7cc975a98a95f2006ae89e50551877fc315a3050e48d5ab89e0802e2b7
-
Filesize
853KB
MD5c6ea0e7a228a5de6fdb682fd0a135d67
SHA1264d0950d5ac08b6dc784b5e372237185a3b956c
SHA25640495077a292c313a58d5d42004097acf6372f0ab3f7e20c14872e7623edf6a2
SHA5121bb34d149e390a2668abe85e977ec9285002e15dc741315b0888df44e1b0b7ebf1c7a03b9ad041ad19f51325702176124e123ea3b5c3bd76a8f83bca5c10b5d5
-
Filesize
571KB
MD5f0ee9b49497460c19c470e2ba4a9db70
SHA14dcc8dd8b1f54fa6f0d7af9438b403fbf84f8b37
SHA25651e46ab5623646e8fea7fd1b13348f0adc510a0712e7b1b506d3117d6b066c19
SHA512b441f746cc666a68abf96778c4cc61aac41e4bac5c8ed950e9de432972e0b712a37e278f2107b005ec7c9c8f858495bab54cfb34deb259e579731a6941773482