Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
31-01-2025 17:22
Static task
static1
Behavioral task
behavioral1
Sample
Document53374pdf.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Document53374pdf.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
Bestikkelsesanklager.ps1
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Bestikkelsesanklager.ps1
Resource
win10v2004-20250129-en
General
-
Target
Document53374pdf.exe
-
Size
916KB
-
MD5
9086c60c9ad908adaf0656122f0670fe
-
SHA1
b21a437c8319d751df3d62302c5182162f1999d1
-
SHA256
c2a0d55f2c24ea39b05e847cd7e0c1a08289af1d24545e689bd88add8a26b599
-
SHA512
f4144165f652508a6730fc52a9b7fe71158a57c76b92b9d25dbf2d7998f68dda33b6200c637ac018e8ceacd22a25729053a4ea73e030b7ebc1ce56d709956af2
-
SSDEEP
24576:oe56hiS2BhRz6eKlZjZZz7AZ0Ig/X96PIwHHXgrFJcgps:Z6sSG7KjZ9AZ0rUP1H32FJ7s
Malware Config
Extracted
remcos
TRYTHIS
trfsgysu28opask01.duckdns.org:9702
trfsgysu28opask01.duckdns.org:35889
trfsgysu28opask02.duckdns.org:9702
detuthi.duckdns.org:9702
detuthi.duckdns.org:35889
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
mziseotosg.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
mbvieortc-QTTQ37
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/2244-114-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/4348-119-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/4436-118-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/4348-119-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/4436-118-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5036 Chrome.exe 3588 Chrome.exe 1352 msedge.exe 3848 msedge.exe 4264 msedge.exe 1980 Chrome.exe 5104 msedge.exe 4128 msedge.exe 4708 Chrome.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4174397412-4125106315-2776226590-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts msiexec.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4174397412-4125106315-2776226590-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Poisons = "%Dumstolte% -windowstyle 1 $Statices=(gi 'HKCU:\\Software\\Grievers\\').GetValue('Vgtfyldernes');%Dumstolte% ($Statices)" reg.exe -
Blocklisted process makes network request 10 IoCs
flow pid Process 32 2448 msiexec.exe 35 2448 msiexec.exe 37 2448 msiexec.exe 39 2448 msiexec.exe 41 2448 msiexec.exe 49 2448 msiexec.exe 51 2448 msiexec.exe 52 2448 msiexec.exe 53 2448 msiexec.exe 54 2448 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 30 drive.google.com 32 drive.google.com -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2448 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3300 powershell.exe 2448 msiexec.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2448 set thread context of 4436 2448 msiexec.exe 98 PID 2448 set thread context of 4348 2448 msiexec.exe 99 PID 2448 set thread context of 2244 2448 msiexec.exe 100 -
pid Process 3300 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Document53374pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3300 powershell.exe 3300 powershell.exe 3300 powershell.exe 3300 powershell.exe 3300 powershell.exe 3300 powershell.exe 3300 powershell.exe 3300 powershell.exe 3300 powershell.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2244 msiexec.exe 2244 msiexec.exe 4436 msiexec.exe 4436 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 1980 Chrome.exe 1980 Chrome.exe 2448 msiexec.exe 2448 msiexec.exe 4436 msiexec.exe 4436 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 3300 powershell.exe 2448 msiexec.exe 2448 msiexec.exe 2448 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 39 IoCs
description pid Process Token: SeDebugPrivilege 3300 powershell.exe Token: SeIncreaseQuotaPrivilege 3300 powershell.exe Token: SeSecurityPrivilege 3300 powershell.exe Token: SeTakeOwnershipPrivilege 3300 powershell.exe Token: SeLoadDriverPrivilege 3300 powershell.exe Token: SeSystemProfilePrivilege 3300 powershell.exe Token: SeSystemtimePrivilege 3300 powershell.exe Token: SeProfSingleProcessPrivilege 3300 powershell.exe Token: SeIncBasePriorityPrivilege 3300 powershell.exe Token: SeCreatePagefilePrivilege 3300 powershell.exe Token: SeBackupPrivilege 3300 powershell.exe Token: SeRestorePrivilege 3300 powershell.exe Token: SeShutdownPrivilege 3300 powershell.exe Token: SeDebugPrivilege 3300 powershell.exe Token: SeSystemEnvironmentPrivilege 3300 powershell.exe Token: SeRemoteShutdownPrivilege 3300 powershell.exe Token: SeUndockPrivilege 3300 powershell.exe Token: SeManageVolumePrivilege 3300 powershell.exe Token: 33 3300 powershell.exe Token: 34 3300 powershell.exe Token: 35 3300 powershell.exe Token: 36 3300 powershell.exe Token: SeDebugPrivilege 2244 msiexec.exe Token: SeShutdownPrivilege 1980 Chrome.exe Token: SeCreatePagefilePrivilege 1980 Chrome.exe Token: SeShutdownPrivilege 1980 Chrome.exe Token: SeCreatePagefilePrivilege 1980 Chrome.exe Token: SeShutdownPrivilege 1980 Chrome.exe Token: SeCreatePagefilePrivilege 1980 Chrome.exe Token: SeShutdownPrivilege 1980 Chrome.exe Token: SeCreatePagefilePrivilege 1980 Chrome.exe Token: SeShutdownPrivilege 1980 Chrome.exe Token: SeCreatePagefilePrivilege 1980 Chrome.exe Token: SeShutdownPrivilege 1980 Chrome.exe Token: SeCreatePagefilePrivilege 1980 Chrome.exe Token: SeShutdownPrivilege 1980 Chrome.exe Token: SeCreatePagefilePrivilege 1980 Chrome.exe Token: SeShutdownPrivilege 1980 Chrome.exe Token: SeCreatePagefilePrivilege 1980 Chrome.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1980 Chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2448 msiexec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3608 wrote to memory of 3300 3608 Document53374pdf.exe 86 PID 3608 wrote to memory of 3300 3608 Document53374pdf.exe 86 PID 3608 wrote to memory of 3300 3608 Document53374pdf.exe 86 PID 3300 wrote to memory of 2448 3300 powershell.exe 91 PID 3300 wrote to memory of 2448 3300 powershell.exe 91 PID 3300 wrote to memory of 2448 3300 powershell.exe 91 PID 3300 wrote to memory of 2448 3300 powershell.exe 91 PID 2448 wrote to memory of 1960 2448 msiexec.exe 93 PID 2448 wrote to memory of 1960 2448 msiexec.exe 93 PID 2448 wrote to memory of 1960 2448 msiexec.exe 93 PID 1960 wrote to memory of 3124 1960 cmd.exe 95 PID 1960 wrote to memory of 3124 1960 cmd.exe 95 PID 1960 wrote to memory of 3124 1960 cmd.exe 95 PID 2448 wrote to memory of 1980 2448 msiexec.exe 96 PID 2448 wrote to memory of 1980 2448 msiexec.exe 96 PID 1980 wrote to memory of 1060 1980 Chrome.exe 97 PID 1980 wrote to memory of 1060 1980 Chrome.exe 97 PID 2448 wrote to memory of 4436 2448 msiexec.exe 98 PID 2448 wrote to memory of 4436 2448 msiexec.exe 98 PID 2448 wrote to memory of 4436 2448 msiexec.exe 98 PID 2448 wrote to memory of 4436 2448 msiexec.exe 98 PID 2448 wrote to memory of 4348 2448 msiexec.exe 99 PID 2448 wrote to memory of 4348 2448 msiexec.exe 99 PID 2448 wrote to memory of 4348 2448 msiexec.exe 99 PID 2448 wrote to memory of 4348 2448 msiexec.exe 99 PID 2448 wrote to memory of 2244 2448 msiexec.exe 100 PID 2448 wrote to memory of 2244 2448 msiexec.exe 100 PID 2448 wrote to memory of 2244 2448 msiexec.exe 100 PID 2448 wrote to memory of 2244 2448 msiexec.exe 100 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 4884 1980 Chrome.exe 101 PID 1980 wrote to memory of 808 1980 Chrome.exe 102 PID 1980 wrote to memory of 808 1980 Chrome.exe 102 PID 1980 wrote to memory of 3016 1980 Chrome.exe 103 PID 1980 wrote to memory of 3016 1980 Chrome.exe 103 PID 1980 wrote to memory of 3016 1980 Chrome.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\Document53374pdf.exe"C:\Users\Admin\AppData\Local\Temp\Document53374pdf.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle 1 "$Biometrician=Get-Content -raw 'C:\Users\Admin\AppData\Local\Temp\Rann242\Panphobia\Bestikkelsesanklager.Qui';$Adelsbreves162=$Biometrician.SubString(53180,3);.$Adelsbreves162($Biometrician)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Poisons" /t REG_EXPAND_SZ /d "%Dumstolte% -windowstyle 1 $Statices=(gi 'HKCU:\Software\Grievers\').GetValue('Vgtfyldernes');%Dumstolte% ($Statices)"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Poisons" /t REG_EXPAND_SZ /d "%Dumstolte% -windowstyle 1 $Statices=(gi 'HKCU:\Software\Grievers\').GetValue('Vgtfyldernes');%Dumstolte% ($Statices)"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3124
-
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe--user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --window-position=-2400,-2400 --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffbcc7cc40,0x7fffbcc7cc4c,0x7fffbcc7cc585⤵PID:1060
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1916,i,9209590855991695101,4791295737637885280,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=1912 /prefetch:25⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2060,i,9209590855991695101,4791295737637885280,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=2104 /prefetch:35⤵PID:808
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,9209590855991695101,4791295737637885280,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=2476 /prefetch:85⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3224,i,9209590855991695101,4791295737637885280,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=3232 /prefetch:15⤵
- Uses browser remote debugging
PID:5036
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3256,i,9209590855991695101,4791295737637885280,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=3276 /prefetch:15⤵
- Uses browser remote debugging
PID:4708
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4668,i,9209590855991695101,4791295737637885280,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4676 /prefetch:15⤵
- Uses browser remote debugging
PID:3588
-
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\qleaxbaiyuh"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\afjsplljmczbrnf"4⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:4348
-
-
C:\Windows\SysWOW64\msiexec.exeC:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\lhplqewdakrocbbrxm"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe--user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --window-position=-2400,-2400 --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies registry class
PID:1352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7fffbc8646f8,0x7fffbc864708,0x7fffbc8647185⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,9917437031336334859,13913115292074247784,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:25⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,9917437031336334859,13913115292074247784,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:35⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,9917437031336334859,13913115292074247784,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:85⤵PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2020,9917437031336334859,13913115292074247784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:15⤵
- Uses browser remote debugging
PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2020,9917437031336334859,13913115292074247784,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:15⤵
- Uses browser remote debugging
PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2020,9917437031336334859,13913115292074247784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:15⤵
- Uses browser remote debugging
PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2020,9917437031336334859,13913115292074247784,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:15⤵
- Uses browser remote debugging
PID:4264
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5112
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD559b0b98cd78cde9e66a8e1195fa35be3
SHA1d9a9813e0983f69b6c11fbb7c5b2c28df207fd13
SHA2567ecd47a0c1aaf0942e55d6be3e11cf4a7e8485084de7f88d38722758fd3c7411
SHA5124478091235e926276545239847d6eab2eccc8755b05c4794eb6ba19c3afb4521cdd53dc935f9731b37d7ee3c0667b9fb997a3377f23203b40cb002392aed1e8a
-
Filesize
328KB
MD53a3e6c3212159e0a9e720f2d15d27f3a
SHA1a28ed3b6d8f3912cd680b7b871872d8550ac7778
SHA25693568aa10e44001cc3d216f6c63f02c839ce7b94e8c4bcea1d46810726769552
SHA5120fed541d780f69ce86fcaec63fbd2c3d61c1ae74aae27bb3360059acc89c7f94e3a13789ac2193ede9e03f68b090181aa8dd62a6c1af5adb458126ec718515ca
-
Filesize
152B
MD553f33935764023466bafd91a773ebeda
SHA1b9a7f43ec00510d92aeae71ef5ae92675d8efee6
SHA256bfb95cf6b5d997c70746f2c6334e6a765362be0911fb4c74d2915c620255c1ec
SHA5124dc6315d561a16ab40276b750f106ec36b1451a4f605a9b3d338a18e3fe955ec3b66c57c18d639f525fc4eb21c2d54c9cba2b36ae036d7acd8bd8304834c6719
-
Filesize
40B
MD5f252be0e34f07421dec70ef08d5c5d45
SHA1b166b7cd98093b22dcf71a47b49c6a2fbe80947f
SHA256abae1112a5228ad56be4e59694ffed621680c4b5efbcb4f5f5df6b9b038dfd3d
SHA512a8e81a67a004fd4a78e253349920ecfe0feab56a43f4b1bf3bcc59678f5140b1bb8d2832a2a65a0cf1aa4e9b982415afe78d80cf4c0b395f47f71368fbc083d7
-
Filesize
20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Network\87bfe06c-49f1-4e56-8737-f308beaa8a65.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
20KB
MD5a603e09d617fea7517059b4924b1df93
SHA131d66e1496e0229c6a312f8be05da3f813b3fa9e
SHA256ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7
SHA512eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc
-
Filesize
15KB
MD560fae70762f4f0ef0195cfe1d84202ef
SHA18a11054cc3a76bb2cd8c0b145a7cf26b1beb1ca6
SHA25657c01854a4792abf5fb8d8042e2982e42b4994cd71ece26df3ee77f50d711593
SHA51209ffc8b6fdda319129c1cd7fdb2c6387214112ef68409032ec67de5ecdba009e6b8998b0821ecc8a2ce5810580f47ac4e235c4bfa3770f488dcf84e1a978e5e9
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
124KB
MD507119d4b5e120f07949361239a2b1768
SHA151fb79b152d79ee1622ddd5ac71622d7397fdf0d
SHA256ffc592c57ff361122b33e6bc781f33ae90dae3b80c7cd69b8cc4acdfd9b7abc9
SHA5122b4b1a6f0475d1f49ad23c15da539277bf3bba55ac53f188e725365723d1e4dac4bc860e36a1de3d7985ac47d0f5cfd9ff2437b12d942eabb200ede449fda257
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD5602636ec0f565fc073f965104c453062
SHA14269ce342b8169d50b831ba03216919555325717
SHA2568e25d991be4c241761f66f71b429a82ea6929993f97637a01a219343507749f8
SHA512052e6f385c75d082653e5c4929b0eb9e443e03775f0e1d0e52e64b44534548403ffd0da39975acfe975e30f9c22b1956cc0b808d109b3b681d9331b82e566c10