Analysis
-
max time kernel
420s -
max time network
419s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 16:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bazaar.abuse.ch/sample/f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b/
Resource
win10v2004-20240802-en
General
-
Target
https://bazaar.abuse.ch/sample/f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b/
Malware Config
Extracted
remcos
RemoteHost
192.3.101.137:5980
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-DO8TMQ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4696 powershell.exe 1668 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe -
Executes dropped EXE 2 IoCs
pid Process 2704 f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe 2328 f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2704 set thread context of 2328 2704 f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe 117 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133721882941664834" chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1092 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3608 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3572 chrome.exe 3572 chrome.exe 2704 f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe 2704 f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe 2704 f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe 2704 f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe 2704 f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe 2704 f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe 2704 f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe 2704 f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe 2704 f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe 2704 f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe 2704 f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe 2704 f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe 4696 powershell.exe 4696 powershell.exe 1668 powershell.exe 1668 powershell.exe 2704 f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe 2704 f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe 1668 powershell.exe 4696 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2328 f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeShutdownPrivilege 3572 chrome.exe Token: SeCreatePagefilePrivilege 3572 chrome.exe Token: SeRestorePrivilege 1544 7zG.exe Token: 35 1544 7zG.exe Token: SeSecurityPrivilege 1544 7zG.exe Token: SeSecurityPrivilege 1544 7zG.exe Token: SeDebugPrivilege 2704 f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe Token: SeDebugPrivilege 4696 powershell.exe Token: SeDebugPrivilege 1668 powershell.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 1544 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe 3572 chrome.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2328 f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe 3608 EXCEL.EXE 3608 EXCEL.EXE 3608 EXCEL.EXE 3608 EXCEL.EXE 3608 EXCEL.EXE 3608 EXCEL.EXE 3608 EXCEL.EXE 3608 EXCEL.EXE 3608 EXCEL.EXE 3608 EXCEL.EXE 3608 EXCEL.EXE 3608 EXCEL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3572 wrote to memory of 1852 3572 chrome.exe 85 PID 3572 wrote to memory of 1852 3572 chrome.exe 85 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 4936 3572 chrome.exe 86 PID 3572 wrote to memory of 1472 3572 chrome.exe 87 PID 3572 wrote to memory of 1472 3572 chrome.exe 87 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88 PID 3572 wrote to memory of 396 3572 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://bazaar.abuse.ch/sample/f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff5a86cc40,0x7fff5a86cc4c,0x7fff5a86cc582⤵PID:1852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,2428927943318256069,16632399220979819583,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,2428927943318256069,16632399220979819583,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2172 /prefetch:32⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,2428927943318256069,16632399220979819583,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2464 /prefetch:82⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,2428927943318256069,16632399220979819583,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,2428927943318256069,16632399220979819583,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4548,i,2428927943318256069,16632399220979819583,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4560 /prefetch:12⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4832,i,2428927943318256069,16632399220979819583,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4888 /prefetch:82⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5004,i,2428927943318256069,16632399220979819583,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3372 /prefetch:82⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5064
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1072
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3608
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap20562:190:7zEvent231561⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1544
-
C:\Users\Admin\Downloads\f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe"C:\Users\Admin\Downloads\f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads\f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JhWUOJ.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JhWUOJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD889.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1092
-
-
C:\Users\Admin\Downloads\f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe"C:\Users\Admin\Downloads\f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2328
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\PushConfirm.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222B
MD588a3b7805392ae7a8f1f898637a350cf
SHA1be03526b35c23b79156378d156be61ebd3212a6a
SHA25616b5bf9457aeb3ba4767124f1539eaa04c9494f45b3747a53d0633bb423b2b30
SHA512f2d912e190f23d03ac8f0975519e6e0fb21a7898ec24302b31376a65d08bfc483569a0631ee5d0c43276f32bf9fc12a12c3c0e03a474cf0bec91b93643d9128e
-
Filesize
446B
MD53bb7f5a2a70c622d2686bedaa916bf06
SHA13ff90abb8a545a8e375045a44f8800e273f47460
SHA256b5807c8433515c64e6c34128c513e0803b50fa996c3d20213ae0d0b547738ac7
SHA512dd2a50ccab6782e9b2eda616fb9ca256b273ab796350943e45f3c68b5d637a82be7613c67882f429aabcd4bb8dab7b97bfbb9846e7238320b07a4b7b6878ee18
-
Filesize
649B
MD53209040ef508258e33c30470f0a32451
SHA1b7f5e4101f9e90a8b1796486af7975bde732b068
SHA256af4eca6ef82443446a81144173f4953f34d959cb82ffc406a553ee0245236085
SHA5129867340a3ade625c1468c5557cae75b2666015b46e64866909c1f6c3ebd6321bdf9e086294859cb825140a73fe14101f1a7b83e16ed484197d8936b5c2f227fc
-
Filesize
213KB
MD5f942900ff0a10f251d338c612c456948
SHA14a283d3c8f3dc491e43c430d97c3489ee7a3d320
SHA25638b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6
SHA5129b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41
-
Filesize
480B
MD559fcbcb22a276f4ff79a44440fc600cd
SHA12c63eb3b098f6883ac92a440e46ce2e8268b5db2
SHA256a4fcc09f5bf387332520b441a7f2874068775f17da41789088722f3aec0d550b
SHA5122bab59be3a3bc5211ec2d4794018d83e3828763d99d9d44b605be18ebbcdaf980d9ad52e3ffcc2d1f101536eab86f20d6fa22045194d75b4667c3a51a2845b14
-
Filesize
2KB
MD5250c0bbe4fae3e2da68ce611c55d82d0
SHA171089566fa308accb468b1c5d0515b7b9d15b9de
SHA2568fd770f44d3b2762ec3f253e96164b9da125dcbee88f74039180ce6e32f6d6ef
SHA5124cfaec5fa4469ecdae4c764e6c34da16bd63aebf7ebe32c2e8082b0da2e0c915d507e94e3569d6ede09de4e6fa69ddde2567d7731b8208b240220b89a382850c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
688B
MD55bf8e3a7f14f0f1dbbe6160c370e84a3
SHA1186cf0e30c09167cbbc4038b60320cb09beee717
SHA2569305f10140cd5a304c1bd238728bca990a67fd5961a5d41dfbc02cab22b53e2c
SHA512d2f43cf336579d1f18f47f0ef8e03921784c4760736eb50007af72f0590b4924f06220ac7673e63c07601b3121112ae194d79b690ed9fd280687803dd0d7b65e
-
Filesize
688B
MD5647cd182f7cf3f45f99b1d1df39a65ea
SHA1832ec069bfc7b14160876032e2184ab9857ff7f6
SHA25690aa04ec85e983e29403e80924458ab9c7bdaf7e77bba02bf59294cc20954048
SHA51226f0ce4dde25239e347a19fb7c9b961521252db97aefeb52f7e1143edc70eea288da35c6d105354c574bf81a95f9dd62e24edc4c1353d137b32df51dbbb57ecf
-
Filesize
9KB
MD55cd3e67646784a8a6ed64af9cff7a95b
SHA1a1ceed3a649e313120d781bdf39b14edd8afa024
SHA256cf9962459ccd7b9adfbb1fec667b8ecc3cd606110d1a782002da050ee11ae0e9
SHA5122d618b5cd806e31cc43eedb3ba986229df0bba91f747fd114e7af0554c3375b028ba9d3c5d02f5db3071ca207784793e9fd2e3917e7334a46fbb697eeb368edc
-
Filesize
9KB
MD5c05f7ad95e788761ca260b1e2526b3d8
SHA1cca338c2b0ba0589826f1ac9479fca60c81e214b
SHA256ec390cd159fbdbea43eed59d03841e3a7c45f482c949dd6c0bfb5365db8883e9
SHA5124de8208784d10d625de59b3c69859df0b98a33bfdd9eef5125c2e6938ed85ef1223688fdd2ae61157fd0e68c6df81ad2942425572474270d3736c5c2c49dd654
-
Filesize
99KB
MD542113c08fa18ce0fa775e939d102f0d6
SHA1232f85acf9a07f10af58f70fb4847fc656530b9f
SHA256db5b09071304bcfea5debce02485517a7c43527b07c8da5747630536e0a3309c
SHA51225d377629a4715939a5be8b19f7f180305b753d2761c2f640dedf9918fad97a4a587c0340ba4fec369c2325e1ebdff3b2695c25539073b1f70d48b73f8b6e17e
-
Filesize
99KB
MD535a2f995d0d18f57e0ded5bafc9772b4
SHA184302fbfed3fc22b8dc0babceb47bbfe6698e783
SHA256c4afe3a9f7d24d7103a8cd6b9218ee3478f2f4d7f254d214645e2409d4c27dce
SHA512936f633800b63034580ababc65709950147c36d66d8af6d2707733b846253bacba971d4646832504481f89094646ed3c7c59ca582c0195b9f351b7e637e9621e
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5de28a7f9f993c51952133457a642c5af
SHA163c057f70c06769f1e548781d3a774c523e85d2b
SHA2561ced593465d45aea24d9e21ca2a5485e743530229da59e51e85efb2faf7ed09f
SHA512fa360a7769d1ef5378fd20474a8db64f502a20326c395f342f23961cf505b476c11d7fd51f35a7c6c6501d7ff0472138336564af66e0b8c7c1141531fb3f8f0a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD586e67ed09f3432523ac3116e9725e8f8
SHA1ba1a5d6fe96ef3683fd0d793d80de55964406a38
SHA25623fb7743692d006f8dc235f9374708900359cbf51c88951c0587b1cc14f3eb1b
SHA5124ce01f87f8529c29de0caaf20f8184a4aa323e982022478e910861a4693c65f29e81707994a890de3982affba4c8a45d3e41a274423a9c2ef80b72ad08c60c6c
-
Filesize
319B
MD5a9c306eeceabe78204b398c3b109df6c
SHA13db4fbda845c2b4cc720a6ccaf385d1d524ef2b0
SHA256ac04d34695bbf5ae91a4ad5cc21c04b975e9d6406080289497269142671ccb57
SHA5123fefd1b46aee55519447ffdd3000f308b8751786a94153ce348fdca7a5f286e7e0d543402ee32d8cf04062bed9b6c1fcda94aa7021253e4d844ac09dd7df38af
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5be701c3b08f5218a930be288cad25593
SHA1b89c166ac8c0607c599ccb13ff68b3a18321dc28
SHA25608188cccb8aa021f4b0e93a8b13fc60ad1c39751abc75d0ffbfb680af6c24f0d
SHA512b3e332b0c7420bbc1c094a802a3b1018f59cd3092a143296f6e4967bff335b6227eb8a63b72d0f5514f1c5bca018c60a0adb167c0ba8cade46a69acb07763285
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5e2af71ccd1439f3b1a76f7d824af28de
SHA1e2dc2820d4d686364a3ba4ecf9a98821696e808a
SHA256e7476652a0e79d02bfe49479e97ef5253f9cf1c7d3bbcaa552e71a34d6769459
SHA512fae059acc3e4aa213e196c02aea8dbbd0d5bcf28c833bb2e671d543fbc274eecc7074b0522df6fddbf59e72f32f7562d7f3ca3c7df600828e6f795a0c99ca037
-
Filesize
908KB
MD57b9844639ef183122af8383ce901b8e0
SHA187514d622f74e94720cd77243326dd8c8217dfae
SHA256f62f5c6710e7609e4ba0172304f9887df37064c6f1aec70efac871eb3683085b
SHA512c98ad33821fbe4f71480a3ea36133d47dafbbb41dda3c3dc31ff4d6755491ea42a5418179e3f7f9d27fddb55a9b933ae221650b850a53096c6a216d39e151bf0
-
Filesize
854KB
MD5c2c83c072880d1bdc4859daea5c7361a
SHA116aa0f8080fba4472c33f3a65ec69e32fd72f628
SHA256e22a8036f75ce550ae164ad47c6629941279bf4b5d7eaa206973877ee26d9da3
SHA512324b0088e1d84a382dd89dd774750d8182e041e52f0f88b5945f1f83b173735f3cca51be1e3e07b34d0b697e3324d2b00074c3952d55628e22c239f6a33d2019