Analysis
-
max time kernel
320s -
max time network
321s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
25-09-2024 18:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://lawyerconsult.top/AUGUST.exe
Resource
win11-20240802-en
General
-
Target
http://lawyerconsult.top/AUGUST.exe
Malware Config
Extracted
remcos
Back-September
fullimmersion777.com:8090
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
hello.exe
-
copy_folder
windw
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
rimcsl-94LESJ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 2816 AUGUST.exe 3936 DZIPR.exe 3780 DZIPR.exe -
Loads dropped DLL 2 IoCs
pid Process 3936 DZIPR.exe 3780 DZIPR.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3780 set thread context of 1104 3780 DZIPR.exe 97 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File created C:\Windows\Tasks\lnfast_x64.job cmd.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\AUGUST.exe:Zone.Identifier chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AUGUST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DZIPR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DZIPR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133717636163071062" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2842058299-443432012-2465494467-1000_Classes\Local Settings chrome.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\AUGUST.exe:Zone.Identifier chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4380 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4112 chrome.exe 4112 chrome.exe 3936 DZIPR.exe 3780 DZIPR.exe 3780 DZIPR.exe 1104 cmd.exe 1104 cmd.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe 3640 chrome.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3780 DZIPR.exe 1104 cmd.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4112 chrome.exe 4112 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe Token: SeShutdownPrivilege 4112 chrome.exe Token: SeCreatePagefilePrivilege 4112 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe 4112 chrome.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4112 wrote to memory of 3924 4112 chrome.exe 78 PID 4112 wrote to memory of 3924 4112 chrome.exe 78 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 920 4112 chrome.exe 79 PID 4112 wrote to memory of 4780 4112 chrome.exe 80 PID 4112 wrote to memory of 4780 4112 chrome.exe 80 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81 PID 4112 wrote to memory of 3128 4112 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://lawyerconsult.top/AUGUST.exe1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1715cc40,0x7ffa1715cc4c,0x7ffa1715cc582⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1776,i,17902692808147537386,4404900631961234235,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1768 /prefetch:22⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2044,i,17902692808147537386,4404900631961234235,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2100 /prefetch:32⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2176,i,17902692808147537386,4404900631961234235,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2188 /prefetch:82⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3012,i,17902692808147537386,4404900631961234235,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3028 /prefetch:12⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3180,i,17902692808147537386,4404900631961234235,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=4840,i,17902692808147537386,4404900631961234235,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4872 /prefetch:82⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=4792,i,17902692808147537386,4404900631961234235,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5012 /prefetch:82⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5204,i,17902692808147537386,4404900631961234235,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5024,i,17902692808147537386,4404900631961234235,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5312 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:4348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4144,i,17902692808147537386,4404900631961234235,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1000 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3640
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1852
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:348
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5040
-
C:\Users\Admin\Downloads\AUGUST.exe"C:\Users\Admin\Downloads\AUGUST.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Users\Admin\DZIPR.exe"C:\Users\Admin\DZIPR.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3936 -
C:\Users\Admin\AppData\Roaming\Ruy_driverv2\DZIPR.exeC:\Users\Admin\AppData\Roaming\Ruy_driverv2\DZIPR.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1104 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:4364
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\UnprotectWrite.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD5fade41a7dcc05bbd27d8214d5519d8be
SHA1b8639b35d8cf0747e9139766deed277f74c9b024
SHA25615c56a07588ca8b63e183b9ca0dec431bb18364731c5aa7afdccdcad97cd2887
SHA512e5140c110e91e1f9d858cea31be60a86f2544239e718a9fbb997d7a2508c4c07cadb47a846ab96b11dff97822e9e7113ce705494a9d72327532aabc26f803e7c
-
Filesize
962B
MD575ee4ddfbed0297ac7edf4c762fa5a5d
SHA1bc1cd92f87e55ae3b289f09e693c23142a4954b7
SHA25653f664b0f5464ac838b2a39ddde94469255ac7dda2cc625ec1aecbc89144697b
SHA512765ae001387e413d1ed75c22ca04a38e026c8af527b68a5104d66bda875cbcb0c41e5aded5f065a9bc832f946010cc79265aeb5ea5406e82f6c04d62fe203876
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD52ca710cb3574c7bd3d1e743dc6e43c10
SHA1934980ff39f7427cdf1dd50d698d3f681262bb97
SHA25645cb8cb88a1312e1c79e88b96bfd2b82d19ce35820d4366b547ed7d43a4eea4f
SHA512cf63506958926316a656a0fefc3610e936f5294a82809a0372b31188c99d8e6f1fe961fbcf06cfd78f9bfadfc7d95cfe6b827445ae6cca358b54cf8e04d4c23f
-
Filesize
9KB
MD5c7a1572fa83c7bafacd4445c472ff2a4
SHA183894bf43d8527855992f0a98bdf6c52d27418e8
SHA256644938eab2e076f2b774094390326e40eb853124cf47258ae9c8ba1725c2f60b
SHA512a0ba352343d7d89f7261705b773a550bcf8c5f6f1b236c6855aa7e3385e8fec275900a719fb7c1a5ffef856346b39bb6a5df6c5319883b722440978d21d63ce3
-
Filesize
9KB
MD588fc4513bb1588c83f8ae7322159fa4d
SHA15a7af83c355581c792246320b8712c86f82d7390
SHA256a54d514361654ba6c2092d71bb8bf5159614c3ec45508cb6706a3c1615584dcf
SHA5126af24a59797f86019e94c8d57fca83f754b40986c1771c85a72b38f75c6eb85ab21c76067bd64dcfcc41ce659099d6a2ee516cba83661933b0fdf672ca83364f
-
Filesize
9KB
MD590e80ae03e440bf98ad96fadf89744b7
SHA169a4364a9da1bb263869ab6d927f524cd8774f5b
SHA25606c5ab2167b1de9361c3ee2d3f3b2d67f0f067ecf0649b6b14fa5ce317f4e2d4
SHA5128e386a92b7d7b2b5e7c962a88c2bf8e28fe882f697ab795001c9375c8822fa9efe43e38f4e381633312aa203a8e41e42728d434be3fb8439ce4be1c7833df72f
-
Filesize
9KB
MD55834701549efc1c5c8e6162a49f8e1fa
SHA1f9c77c2e90087d9e6c48910cea7c46483ca57290
SHA256c071fe3b1d1a03f9c7854456916d57fd43ac1804cfe0faa23e784888fe7544fc
SHA51270d0c5e2a863942eb7c32f4d02fee842f63a396e71072c62d33f88c965389c4f873ea9491d8156ff5b79de4f9c0263b920fb5615fe90efa4369fef8a9c8e0368
-
Filesize
9KB
MD5980d8633150fd7f884acdedf2d9ec044
SHA1c15f1bab28bc105e2d7ee54f9ad4b7f1cf46154f
SHA256787592454a563288d6a213285b8e081d74bfe70fd55b7361360c6b5489055d3c
SHA5121a407a1dfb9b353bb8aa0ddee4eab8bc4a44095e3f270432a5277edf0db7b3ec5311ee673b63f2c67cd0723845d45a08025b1e5bd50003833e8942f03a197470
-
Filesize
9KB
MD53fef15e77851a83a14c702ab289753e9
SHA1071fa59b379ee98e57ef6b8b71133016de145747
SHA25696e4f181934e9985aa8934cbe8010064259657ad2ea96b3b1a0c2f54e2056c90
SHA512afca7cf687977c2177ad534259bd3a78f391802cbb61a1de010179296782e23377326eb1a2f6f7a246e3b2a296a55c6269b44342bcc4c4974c09f64f32442cba
-
Filesize
9KB
MD558f4f8503c39ac40181d43b763573eff
SHA1553d42ad25674933d75979cfe9c23fb364786661
SHA2566c327d009cef49077b752bc4cf0924fe8e165e19e0c195d98de83108d011491f
SHA51289c499a186f314687cb1812383e169fd6971027cc6114757fd41fb30695fd5162f01d132b0a6301a14b6411df0be47d5dfcdf456d9923100e3aabfecd0083090
-
Filesize
9KB
MD55d093a0fd7280b9c86db98b70b2d6a00
SHA17232136d3bf1ce7f230922d837530d54cce02993
SHA256f21a5ad4f09698cabc47ad24af957bebca00b375199382ab9732425556dd0a89
SHA51223af2356c249d6434d58773f81bdd26cea00d402d73f144b2cffb94a03640ca6c2eaea5836490436af88639d814df704ba620fc87faf480ce1f11454c1808682
-
Filesize
9KB
MD549b5242dcd770a10b8e91e0dac5d9ccf
SHA13f4036a88580be1dd6f47349eba8963e844aa532
SHA256496596c968f49acffad6171d229b1770c3a408d1181d4581c7e9bc1758c8d0a0
SHA512b38d911928d88316eb3ce813fd2938fe59084ddaa1b48c9aebc19a5bfa817115113ba63f2020d78df004df814a7e093ab4030e481e18aed71bccdd31cb90d476
-
Filesize
9KB
MD5f7b8acd4bec24680fe34b47097fc4b82
SHA164614e5bf491a02022476e22fdb2106d232a492e
SHA256bdcfb3e86f7dcd44fb559dfa2c57b121b671c7c03254a2c411b45ce6c6fa5d9d
SHA51245da876fe8de37880d92c7f0859f18e731ca7292c0451f0c40029eb5e9e3c1fd0cee30b5a46a75b82e09880bb8ff408cc054b7655a9434742cf26c274e40d797
-
Filesize
9KB
MD5e36db221540cdf356c266b2653f7ab1a
SHA14111e238033f59080c95f41de801be522c4d1754
SHA256615460dece94f94badf54de025346b14859f61ef118965c80b9d5fd42bf308db
SHA5126679c2212f30f0ffc80a501fd8165e3b950cb6e1d53721a11aabedf3b6ca4eb9027460da4d907459ee4b42dd328a2a2660d4d45d701633c73279380780ba7e0a
-
Filesize
9KB
MD5de204fcda7c674bbcf67a72842bf0040
SHA11d66fde3402ce74aff29ee72f002575c9d7bedae
SHA256508af04ae3cc17741f0ffe5bede55fc3c23163677114d4e93c9c41bed56eb76a
SHA512148688c4ae282b1817cb9f82f9e747468cb895070122d477daaa0ffc769621d1a4245fea78efdc3995d826369b7b75a9539234715fb8307ecbed077178a6e8fa
-
Filesize
9KB
MD5deebd7e3c27875f11a59d2535f89acc3
SHA144627ff47398ef0bab49824b7e6773ef0f42ab63
SHA2560da73ee6f5d108658d1abf749436531a3d3461c8ead3787d8143cb03a296a0cf
SHA512ead8a31178c1de3d9a455432305944427b2bc512bf172672ccf8000d6c3d6f2fd39d3118ab9ea07f6feced7c64651298430f3b2320bfbd9d48be01c6a05c2563
-
Filesize
9KB
MD5e41d8f558a03f90f517c0a70791c23e9
SHA1402a16a42c06f16953fd997b5c3d3f0f04a30161
SHA256e55a15e03f80c13e19a15cf760294d28b9aedef687b5fb2e316622d48c51dfee
SHA512164cde642326e5604ea61da7a8421dfeab6ac4f4b3d771161492b8d0b0dcfcbd481865e45e4446398031d21087c7c8ddce854a1806882f2801c69cfc178e2348
-
Filesize
9KB
MD53cd13d1f768aa7595fc60f22161054c7
SHA1453e3526b8c984a8e6fcc5ff0ed28ba43ae63016
SHA256fdfcd314a6390a78423860f8a4fb8a73e0734ea63edaa9b0819be67e0216d40d
SHA512882ccef22df5df7263aab2d9b2ed40caa68a419b1031a0d2c4760825af92d27900e43eb2b07c230688cd84660f7651dcc47b9ebbb3c1b7b9e5e1f3e42ae50954
-
Filesize
9KB
MD591ebc8305df05784cee10e46b206bf14
SHA16e88b867ba6c077825e047c067fd27c75a472122
SHA256ef18d1e29d9805eaad78ecd6e21e1e7e98436e2c26b4e852fa3e3cf238786589
SHA512c305475b2dc14715ae1e4e1805c0dde67f33de7a19c4420130c8a600a2e758bdea9dab5e5ab545c63b207cc044abde11d87a9417023ff5607326ea8169670991
-
Filesize
9KB
MD56b34e6fa60dabeb870e7f6a1e0299e38
SHA120955ef7ce1bd593c9b2a8f21922513cc0025977
SHA25662595df2e41d3b5979d4279b2c56a30465771e5f5bce3d9210d673fa9dca7773
SHA512414ddac2b15121df8ad02bf1870fe4d4c773a85dc2f27cec8b25102f28d861401f23e93fc8ebe66d81e5277470e465183e78fa92a1d32b826d8a6ac0c77ea82c
-
Filesize
9KB
MD5f2809e663e35d03da4eddf7cd90bc8aa
SHA13a14505a46cc28bc30469767875bfa77821429aa
SHA256965f8af67c3551ad52873d9d57bba7f0e22b3468524919a42102528e5df680be
SHA512769f5921ee4a59fb74b1f50b3151f7dc9656e3d8684b0fe9a7535bb36fe619fd385067c1a4ca6469bc839130254d70cc77945b1dcbc95282cb64d641d9ba7be5
-
Filesize
195KB
MD55fa6700c80626682fe68b34ea1d49300
SHA1cc33bd8b93ffa48142b19a0dc43fee6f3d820398
SHA256cb2be85d5804540b72e354651db466e6fafc70edb261c1bf62d75a7563e0ebef
SHA5124b60e3f6acd616526b4f79dc5c50a627fe72352da8e9005f95939aa89d73a62f7970b1f4d3286c956d7f56a333496af2bfe20140b819aaf1572cd18f706ad03e
-
Filesize
195KB
MD5d70541fef19548c4daca5d4f961b6040
SHA15fa63a7c4bc106f1f0dc7f5d00b7ed9ba49bcc1a
SHA2569c32091f6b4924a96b016ba4598366af1c928460ba8755fe4fc339bae5b5b363
SHA512101f75a7fb12f9cd6788aae63b6a5f335f0827abb3915e02f7bf24e608c386ecb7682de31fbabec842ab3ab0a237bc560828f5b36274639f4ece161b99e2d229
-
Filesize
1.2MB
MD5e3c1305648943696e29d87f538c0fd04
SHA13becb5d187abdae23dc3c07e3397ced024462fc5
SHA256c47c0a8609bd173015aa8a0cd6df0841184d568207ef116c5eae5a220e0403ae
SHA512e3296d6b66ab8fdaeef4a55c31160980284e337cfc416427612a6a09f97ab8612788fffede61a59801a10362495bc17158bdd2f6e601bbea62a2d2b1d1cb5d8d
-
Filesize
274B
MD5df1702034e379527708dc1d5d2dbe820
SHA122b3a8fdc7dabd2c179cfbff8f8f7f8921e4a7f9
SHA256010b466a9daf3d09c221128d14b4240b8f03fc8f7e241ff39c0133f5d28d4956
SHA5127abe0b6786aa1fbc64cae396b885c5a271131c619eeb43ba9774e792c588e322efd49bae08c2e2f796be8e5d62e9a96b219b7827e60388152861516b3113845c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5d868fc4cf7b943a81418c3e5cac9f5f5
SHA1e30337e5f53c69a77c8f250cd5a34cfbd3ef3ed9
SHA256b452740a6638deb578890890ea2efccb1753412e496a19e2b1c424d35dadd24d
SHA5125398f742b81af720e736097c9a97cbb09fce7c48d9527e3af49e17a6f27da9a9662b634019bcd22b4c898a0ba4bcd7ba583ee84b132da792eee83eaff0213d28
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5b3fa2dc696854ffc69aa9e1fe5a17ef7
SHA1fe2e6bc59bb6296dab5a68a3a9864af58b6a745a
SHA25687ba807acb532172c42506b7e8a14f0c54779989459960a6fdbab901d3bae8ac
SHA51279453346e6124952738804791904455a1518321cc4fc972f33980ad45fb8e416beaf0a78614c3c80bf5c5e601b62a6daa9ad393f90831fe3441ea666e9b993a2
-
Filesize
346KB
MD5ad28d4167571382569d2384ffd7bd2a9
SHA1efc7534bcb1645d4056702e073519f571d8db77b
SHA256f919a8e63ec0f2f05ac01a6cab4088c13fbf14a38b071cfa9f710c9e069462eb
SHA5128f28867b46dd7a801cbf70d8d7fe5f2bfb8654a417c40ba264faf81af8bb1a28e1a1200fdc9828a4a4c6df0a13817055290c16f9468d311b8d8049a2439348d9
-
Filesize
8.4MB
MD5ec9ce1d67f98072281015c7726fba245
SHA1e89b16265acf4a251b527ddf22830f2650987263
SHA2569ab4145d5525ae741b80f4e66f505abba59adcbe01868dfef84fbe4450634cc1
SHA51221db8f3ae325021589de9c2489ab2ce6814722a17a92476a56147478aa9767ce5c4769169f287060cc08ad76019178ba547fcef32074ef1afb1926845e7158e1
-
Filesize
4.6MB
MD525860926414bf43383246f7c773a8d6c
SHA1760390a4a14df085f4c841067f52c79409cdc93e
SHA256a8e552944846a2f5e8fefea4a250046da29d74d1f58f7a868258e6ded9597958
SHA51261825ef1b03f5516f2820faae3dad01911054debb714b2162fd28cdc7c26199eb6174eddb3e48a4b200c350a083a561a58bd2724496fcb71e87d4492e2ec5a07
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
3.3MB
MD5deef6c92694c8b75c065c76f8c25757b
SHA1cda0424e80a79c0b9ed8d9e8690a3ab4d63ac854
SHA2562017c397fbd9b2b6f0213df9401c3c8e6f98853cc323ec8a1a2ce2549dc51ee0
SHA512d9c10a20cd99c0fd9b856aaa1ddad87726f14000dafd2d581d49b3c800b50b06afc2496d2adb9bd49b5455d03c6d7675ab0468bf87ac19db92fc28f601061d38
-
Filesize
952KB
MD54649f3a4e58c6040b07f6d486c149a71
SHA164f8fc631c5fb4e5f6bc20c207047d8e2b500587
SHA2565d81ca77492946aa2cfe00349342de8cceb317d8649bedbfd95992dca885f184
SHA5124e1b229d30403b594e992fe0893e568161c8d901fe20461093d11159ab03b5dd410d1834bc64ac4ccc39d4f6b072946703f06eeb982d79b1c9a1b773b57013b7
-
Filesize
70KB
MD5f125e72b3968ca233ef3c7e2f4db34e7
SHA14fb34044ef18cedbd3ede4272c44416d3f11735c
SHA256ced30560c6c0fc15cbdbdbc0d480dca6b41ce3183057e43b419dd6814a33db92
SHA512b645d1eb685a69b9ca9bbdb1f4638af8ae151ddfb9527c423f7779971246ed60f981ce26ce8af2fc7b63164e7c13e9c6e98a7f148831a1e59318e60e5a39f881