Windows Analysis Report
OMICS_Online_1.one

Overview

General Information

Sample Name: OMICS_Online_1.one
Analysis ID: 828485
MD5: 238f7e8cd973a386b61348ab2629a912
SHA1: f87f164125c9506a16ca21cb03104f6a04321592
SHA256: 1c3a7f886a544fc56e91b7232402a1d86282165e2699b7bf36e2b1781cb2adc2
Tags: one
Infos:

Detection

Emotet
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Malicious OneNote
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Sigma detected: Run temp file via regsvr32
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Document exploit detected (process start blacklist hit)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Stores files to the Windows start menu directory
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to call native functions
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Connects to several IPs in different countries
Creates a start menu entry (Start Menu\Programs\Startup)
Registers a DLL
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

AV Detection

barindex
Source: OMICS_Online_1.one ReversingLabs: Detection: 38%
Source: OMICS_Online_1.one Virustotal: Detection: 16% Perma Link
Source: https://91.207.28.33:8080/jhiryhxgp/kxgycfcaqegfa/5 Avira URL Cloud: Label: malware
Source: https://91.121.146.47:8080/jhiryhxgp/kxgycfcaqegfa/ Avira URL Cloud: Label: malware
Source: https://213.239.212.5/jhiryhxgp/kxgycfcaqegfa/fa/t Avira URL Cloud: Label: malware
Source: https://119.59.103.152:8080/jhiryhxgp/kxgycfcaqegfa/ Avira URL Cloud: Label: malware
Source: https://45.235.8.30:8080/jhiryhxgp/kxgycfcaqegfa/ Avira URL Cloud: Label: malware
Source: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dlli Avira URL Cloud: Label: malware
Source: https://103.43.75.120/jhiryhxgp/kxgycfcaqegfa/ Avira URL Cloud: Label: malware
Source: https://penshorn.org/admin/Ses8712iGR8du/am Avira URL Cloud: Label: malware
Source: https://91.121.146.47:8080/$N Avira URL Cloud: Label: malware
Source: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/798 Avira URL Cloud: Label: malware
Source: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/wM Avira URL Cloud: Label: malware
Source: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dll Avira URL Cloud: Label: malware
Source: https://www.gomespontes.com.br/logs/pd/vM Avira URL Cloud: Label: malware
Source: http://softwareulike.com/cWIYxWMPkK/ Avira URL Cloud: Label: malware
Source: http://ozmeydan.com/cekici/9/ Avira URL Cloud: Label: malware
Source: https://45.235.8.30:8080/ Avira URL Cloud: Label: malware
Source: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/ Avira URL Cloud: Label: malware
Source: https://penshorn.org/admin/Ses8712iGR8du/tM Avira URL Cloud: Label: malware
Source: https://www.gomespontes.com.br/logs/pd/ Avira URL Cloud: Label: malware
Source: https://82.223.21.224:8080/jhiryhxgp/kxgycfcaqegfa/ Avira URL Cloud: Label: malware
Source: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/uM Avira URL Cloud: Label: malware
Source: https://206.189.28.199:8080/jhiryhxgp/kxgycfcaqegfa/ Avira URL Cloud: Label: malware
Source: https://penshorn.org/admin/Ses8712iGR8du/ Avira URL Cloud: Label: malware
Source: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/RJ Avira URL Cloud: Label: malware
Source: https://45.235.8.30:8080/7 Avira URL Cloud: Label: malware
Source: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/ Avira URL Cloud: Label: malware
Source: https://103.43.75.120/jhiryhxgp/kxgycfcaqegfa/fa/f Avira URL Cloud: Label: malware
Source: https://119.59.103.152:8080/ Avira URL Cloud: Label: malware
Source: https://45.235.8.30:8080/? Avira URL Cloud: Label: malware
Source: https://1.234.2.232:8080/jhiryhxgp/kxgycfcaqegfa/ Avira URL Cloud: Label: malware
Source: https://103.43.75.120/ Avira URL Cloud: Label: malware
Source: http://softwareulike.com/cWIYxWMPkK/yM Avira URL Cloud: Label: malware
Source: https://45.235.8.30:8080/jhiryhxgp/kxgycfcaqegfa/lS Avira URL Cloud: Label: malware
Source: https://149.56.131.28:8080/jhiryhxgp/kxgycfcaqegfa/ Avira URL Cloud: Label: malware
Source: https://182.162.143.56/jhiryhxgp/kxgycfcaqegfa/ Avira URL Cloud: Label: malware
Source: https://91.121.146.47:8080/jhiryhxgp/kxgycfcaqegfa/lN Avira URL Cloud: Label: malware
Source: http://ozmeydan.com/cekici/9/xM Avira URL Cloud: Label: malware
Source: https://72.15.201.15:8080/jhiryhxgp/kxgycfcaqegfa/ Avira URL Cloud: Label: malware
Source: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/zM Avira URL Cloud: Label: malware
Source: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6H Avira URL Cloud: Label: malware
Source: http://softwareulike.com/cWIYxWMPkK Avira URL Cloud: Label: malware
Source: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/ Avira URL Cloud: Label: malware
Source: https://103.43.75.120:443/jhiryhxgp/kxgycfcaqegfa/ Avira URL Cloud: Label: malware
Source: https://91.121.146.47:8080/jhiryhxgp/kxgycfcaqegfa/Z Avira URL Cloud: Label: malware
Source: C:\Users\user\AppData\Local\Temp\rad98E2D.tmp.dll ReversingLabs: Detection: 58%
Source: C:\Windows\System32\SfTfmTSAbIwWdRVZ\mmatLGgYnezL.dll (copy) ReversingLabs: Detection: 58%
Source: 0000000D.00000002.829371998.0000000000D28000.00000004.00000020.00020000.00000000.sdmp Malware Configuration Extractor: Emotet {"C2 list": ["91.121.146.47:8080", "66.228.32.31:7080", "182.162.143.56:443", "187.63.160.88:80", "167.172.199.165:8080", "164.90.222.65:443", "104.168.155.143:8080", "163.44.196.120:8080", "160.16.142.56:8080", "159.89.202.34:443", "159.65.88.10:8080", "186.194.240.217:443", "149.56.131.28:8080", "72.15.201.15:8080", "1.234.2.232:8080", "82.223.21.224:8080", "206.189.28.199:8080", "169.57.156.166:8080", "107.170.39.149:8080", "103.43.75.120:443", "91.207.28.33:8080", "213.239.212.5:443", "45.235.8.30:8080", "119.59.103.152:8080", "164.68.99.3:8080", "95.217.221.146:8080", "153.126.146.25:7080", "197.242.150.244:8080", "202.129.205.3:8080", "103.132.242.26:8080", "139.59.126.41:443", "110.232.117.186:8080", "183.111.227.137:8080", "5.135.159.50:443", "201.94.166.162:443", "103.75.201.2:443", "79.137.35.198:8080", "172.105.226.75:8080", "94.23.45.86:4143", "115.68.227.76:8080", "153.92.5.27:8080", "167.172.253.162:8080", "188.44.20.25:443", "147.139.166.154:8080", "129.232.188.93:443", "173.212.193.249:8080", "185.4.135.165:8080", "45.176.232.124:443"], "Public Key": ["RUNTMSAAAABAX3S2xNjcDD0fBno33Ln5t71eii+mofIPoXkNFOX1MeiwCh48iz97kB0mJjGGZXwardnDXKxI8GCHGNl0PFj5U16acAAdAJA=", "RUNLMSAAAADzozW1Di4r9DVWzQpMKT588RDdy7BPILP6AiDOTLYMHkSWvrQO5slbmr1OvZ2Pz+AQWzRMggQmAtO6rPH7nyx2v16OcAAZAJA="]}
Source: unknown HTTPS traffic detected: 203.26.41.131:443 -> 192.168.2.3:49698 version: TLS 1.2
Source: unknown HTTPS traffic detected: 182.162.143.56:443 -> 192.168.2.3:49703 version: TLS 1.2
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180008D28 FindFirstFileExW, 12_2_0000000180008D28

Software Vulnerabilities

barindex
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process created: C:\Windows\SysWOW64\wscript.exe

Networking

barindex
Source: C:\Windows\System32\regsvr32.exe Network Connect: 159.65.88.10 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 164.90.222.65 443 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 213.239.212.5 443 Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Domain query: penshorn.org
Source: C:\Windows\System32\regsvr32.exe Network Connect: 186.194.240.217 443 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 104.168.155.143 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 119.59.103.152 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 159.89.202.34 443 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 160.16.142.56 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 91.121.146.47 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 91.207.28.33 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 103.43.75.120 443 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 45.235.8.30 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 72.15.201.15 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 163.44.196.120 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 206.189.28.199 8080 Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Network Connect: 203.26.41.131 443 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 107.170.39.149 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 187.63.160.88 80 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 66.228.32.31 7080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 82.223.21.224 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 149.56.131.28 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 169.57.156.166 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 182.162.143.56 443 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 1.234.2.232 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 167.172.199.165 8080 Jump to behavior
Source: Traffic Snort IDS: 2404312 ET CNC Feodo Tracker Reported CnC Server TCP group 7 192.168.2.3:49703 -> 182.162.143.56:443
Source: Traffic Snort IDS: 2404344 ET CNC Feodo Tracker Reported CnC Server TCP group 23 192.168.2.3:49700 -> 91.121.146.47:8080
Source: Traffic Snort IDS: 2404330 ET CNC Feodo Tracker Reported CnC Server TCP group 16 192.168.2.3:49702 -> 66.228.32.31:7080
Source: Traffic Snort IDS: 2404308 ET CNC Feodo Tracker Reported CnC Server TCP group 5 192.168.2.3:49705 -> 167.172.199.165:8080
Source: Traffic Snort IDS: 2404302 ET CNC Feodo Tracker Reported CnC Server TCP group 2 192.168.2.3:49710 -> 104.168.155.143:8080
Source: Traffic Snort IDS: 2404318 ET CNC Feodo Tracker Reported CnC Server TCP group 10 192.168.2.3:49726 -> 206.189.28.199:8080
Source: Traffic Snort IDS: 2404320 ET CNC Feodo Tracker Reported CnC Server TCP group 11 192.168.2.3:49734 -> 213.239.212.5:443
Source: Traffic Snort IDS: 2404324 ET CNC Feodo Tracker Reported CnC Server TCP group 13 192.168.2.3:49738 -> 45.235.8.30:8080
Source: Traffic Snort IDS: 2404304 ET CNC Feodo Tracker Reported CnC Server TCP group 3 192.168.2.3:49739 -> 119.59.103.152:8080
Source: Malware configuration extractor IPs: 91.121.146.47:8080
Source: Malware configuration extractor IPs: 66.228.32.31:7080
Source: Malware configuration extractor IPs: 182.162.143.56:443
Source: Malware configuration extractor IPs: 187.63.160.88:80
Source: Malware configuration extractor IPs: 167.172.199.165:8080
Source: Malware configuration extractor IPs: 164.90.222.65:443
Source: Malware configuration extractor IPs: 104.168.155.143:8080
Source: Malware configuration extractor IPs: 163.44.196.120:8080
Source: Malware configuration extractor IPs: 160.16.142.56:8080
Source: Malware configuration extractor IPs: 159.89.202.34:443
Source: Malware configuration extractor IPs: 159.65.88.10:8080
Source: Malware configuration extractor IPs: 186.194.240.217:443
Source: Malware configuration extractor IPs: 149.56.131.28:8080
Source: Malware configuration extractor IPs: 72.15.201.15:8080
Source: Malware configuration extractor IPs: 1.234.2.232:8080
Source: Malware configuration extractor IPs: 82.223.21.224:8080
Source: Malware configuration extractor IPs: 206.189.28.199:8080
Source: Malware configuration extractor IPs: 169.57.156.166:8080
Source: Malware configuration extractor IPs: 107.170.39.149:8080
Source: Malware configuration extractor IPs: 103.43.75.120:443
Source: Malware configuration extractor IPs: 91.207.28.33:8080
Source: Malware configuration extractor IPs: 213.239.212.5:443
Source: Malware configuration extractor IPs: 45.235.8.30:8080
Source: Malware configuration extractor IPs: 119.59.103.152:8080
Source: Malware configuration extractor IPs: 164.68.99.3:8080
Source: Malware configuration extractor IPs: 95.217.221.146:8080
Source: Malware configuration extractor IPs: 153.126.146.25:7080
Source: Malware configuration extractor IPs: 197.242.150.244:8080
Source: Malware configuration extractor IPs: 202.129.205.3:8080
Source: Malware configuration extractor IPs: 103.132.242.26:8080
Source: Malware configuration extractor IPs: 139.59.126.41:443
Source: Malware configuration extractor IPs: 110.232.117.186:8080
Source: Malware configuration extractor IPs: 183.111.227.137:8080
Source: Malware configuration extractor IPs: 5.135.159.50:443
Source: Malware configuration extractor IPs: 201.94.166.162:443
Source: Malware configuration extractor IPs: 103.75.201.2:443
Source: Malware configuration extractor IPs: 79.137.35.198:8080
Source: Malware configuration extractor IPs: 172.105.226.75:8080
Source: Malware configuration extractor IPs: 94.23.45.86:4143
Source: Malware configuration extractor IPs: 115.68.227.76:8080
Source: Malware configuration extractor IPs: 153.92.5.27:8080
Source: Malware configuration extractor IPs: 167.172.253.162:8080
Source: Malware configuration extractor IPs: 188.44.20.25:443
Source: Malware configuration extractor IPs: 147.139.166.154:8080
Source: Malware configuration extractor IPs: 129.232.188.93:443
Source: Malware configuration extractor IPs: 173.212.193.249:8080
Source: Malware configuration extractor IPs: 185.4.135.165:8080
Source: Malware configuration extractor IPs: 45.176.232.124:443
Source: Joe Sandbox View ASN Name: RACKCORP-APRackCorpAU RACKCORP-APRackCorpAU
Source: Joe Sandbox View JA3 fingerprint: ce5f3254611a8c095a3d821d44539877
Source: global traffic HTTP traffic detected: POST /jhiryhxgp/kxgycfcaqegfa/ HTTP/1.1Connection: Keep-AliveContent-Length: 0Host: 182.162.143.56
Source: Joe Sandbox View IP Address: 110.232.117.186 110.232.117.186
Source: global traffic HTTP traffic detected: GET /admin/Ses8712iGR8du/ HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: penshorn.org
Source: global traffic TCP traffic: 192.168.2.3:49700 -> 91.121.146.47:8080
Source: global traffic TCP traffic: 192.168.2.3:49702 -> 66.228.32.31:7080
Source: global traffic TCP traffic: 192.168.2.3:49705 -> 167.172.199.165:8080
Source: global traffic TCP traffic: 192.168.2.3:49710 -> 104.168.155.143:8080
Source: global traffic TCP traffic: 192.168.2.3:49711 -> 163.44.196.120:8080
Source: global traffic TCP traffic: 192.168.2.3:49712 -> 160.16.142.56:8080
Source: global traffic TCP traffic: 192.168.2.3:49717 -> 159.65.88.10:8080
Source: global traffic TCP traffic: 192.168.2.3:49722 -> 149.56.131.28:8080
Source: global traffic TCP traffic: 192.168.2.3:49723 -> 72.15.201.15:8080
Source: global traffic TCP traffic: 192.168.2.3:49724 -> 1.234.2.232:8080
Source: global traffic TCP traffic: 192.168.2.3:49725 -> 82.223.21.224:8080
Source: global traffic TCP traffic: 192.168.2.3:49726 -> 206.189.28.199:8080
Source: global traffic TCP traffic: 192.168.2.3:49727 -> 169.57.156.166:8080
Source: global traffic TCP traffic: 192.168.2.3:49728 -> 107.170.39.149:8080
Source: global traffic TCP traffic: 192.168.2.3:49733 -> 91.207.28.33:8080
Source: global traffic TCP traffic: 192.168.2.3:49738 -> 45.235.8.30:8080
Source: global traffic TCP traffic: 192.168.2.3:49739 -> 119.59.103.152:8080
Source: unknown Network traffic detected: IP country count 17
Source: unknown Network traffic detected: HTTP traffic on port 49708 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49721
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49720
Source: unknown Network traffic detected: HTTP traffic on port 49706 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49731 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49729 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49719 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49720 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49719
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49718
Source: unknown Network traffic detected: HTTP traffic on port 49713 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49715 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49716
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49715
Source: unknown Network traffic detected: HTTP traffic on port 49736 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49737
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49714
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49736
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49713
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49735
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49734
Source: unknown Network traffic detected: HTTP traffic on port 49698 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49709 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49732
Source: unknown Network traffic detected: HTTP traffic on port 49734 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49698
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49731
Source: unknown Network traffic detected: HTTP traffic on port 49707 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49730
Source: unknown Network traffic detected: HTTP traffic on port 49732 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49730 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49703 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49721 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49709
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49708
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49707
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49729
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49706
Source: unknown Network traffic detected: HTTP traffic on port 49716 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49714 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49703
Source: unknown Network traffic detected: HTTP traffic on port 49718 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49735 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49737 -> 443
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 66.228.32.31
Source: unknown TCP traffic detected without corresponding DNS query: 66.228.32.31
Source: unknown TCP traffic detected without corresponding DNS query: 66.228.32.31
Source: unknown TCP traffic detected without corresponding DNS query: 66.228.32.31
Source: unknown TCP traffic detected without corresponding DNS query: 66.228.32.31
Source: unknown TCP traffic detected without corresponding DNS query: 66.228.32.31
Source: unknown TCP traffic detected without corresponding DNS query: 66.228.32.31
Source: unknown TCP traffic detected without corresponding DNS query: 66.228.32.31
Source: unknown TCP traffic detected without corresponding DNS query: 66.228.32.31
Source: unknown TCP traffic detected without corresponding DNS query: 66.228.32.31
Source: unknown TCP traffic detected without corresponding DNS query: 182.162.143.56
Source: unknown TCP traffic detected without corresponding DNS query: 182.162.143.56
Source: unknown TCP traffic detected without corresponding DNS query: 182.162.143.56
Source: unknown TCP traffic detected without corresponding DNS query: 182.162.143.56
Source: unknown TCP traffic detected without corresponding DNS query: 182.162.143.56
Source: unknown TCP traffic detected without corresponding DNS query: 182.162.143.56
Source: unknown TCP traffic detected without corresponding DNS query: 182.162.143.56
Source: unknown TCP traffic detected without corresponding DNS query: 182.162.143.56
Source: unknown TCP traffic detected without corresponding DNS query: 182.162.143.56
Source: unknown TCP traffic detected without corresponding DNS query: 187.63.160.88
Source: unknown TCP traffic detected without corresponding DNS query: 187.63.160.88
Source: unknown TCP traffic detected without corresponding DNS query: 187.63.160.88
Source: unknown TCP traffic detected without corresponding DNS query: 187.63.160.88
Source: unknown TCP traffic detected without corresponding DNS query: 187.63.160.88
Source: unknown TCP traffic detected without corresponding DNS query: 187.63.160.88
Source: unknown TCP traffic detected without corresponding DNS query: 187.63.160.88
Source: unknown TCP traffic detected without corresponding DNS query: 187.63.160.88
Source: unknown TCP traffic detected without corresponding DNS query: 187.63.160.88
Source: unknown TCP traffic detected without corresponding DNS query: 187.63.160.88
Source: unknown TCP traffic detected without corresponding DNS query: 167.172.199.165
Source: unknown TCP traffic detected without corresponding DNS query: 167.172.199.165
Source: wscript.exe, 0000000A.00000002.355343827.0000000005F1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351172369.0000000005F1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.353077144.0000000005F1C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.829371998.0000000000DB7000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.418840821.0000000000DB7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: regsvr32.exe, 0000000D.00000003.413431427.0000000002E24000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.413937408.0000000002E26000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ctldl.windowsupdate.com/
Source: regsvr32.exe, 0000000D.00000003.418840821.0000000000D6C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.829371998.0000000000D6C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
Source: regsvr32.exe, 0000000D.00000002.829371998.0000000000DB7000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.418840821.0000000000DB7000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.13.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: regsvr32.exe, 0000000D.00000003.419039741.0000000000DE9000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.829371998.0000000000DE9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab(
Source: regsvr32.exe, 0000000D.00000003.418840821.0000000000E04000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.829371998.0000000000E04000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.413464726.0000000000E1C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?25d031a652ab4
Source: wscript.exe, wscript.exe, 0000000A.00000003.348753046.0000000005DF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350978145.0000000005B2A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340831402.0000000005AA4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.347768220.0000000005C30000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.348179950.0000000005D37000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350269475.0000000005D3F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.341363850.0000000005AF2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.341316300.0000000005AFC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.342250004.0000000005BD4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.335230812.00000000035CF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.335230812.00000000035B8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338361754.0000000005A66000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.348373935.0000000005D8F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.347768220.0000000005C5A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.334706320.00000000035AD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350515217.0000000005EAF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.347919526.0000000005D29000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343691393.0000000005B84000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352843978.0000000005D76000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336614509.00000000059BF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ozmeydan.com/cekici/9/
Source: wscript.exe, 0000000A.00000003.351427235.0000000005684000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ozmeydan.com/cekici/9/xM
Source: wscript.exe, 0000000A.00000003.335620877.00000000035A8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352736179.00000000035A8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.337612568.00000000035A8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://softwareulike.com/cWIYxWMPkK
Source: wscript.exe, wscript.exe, 0000000A.00000003.348753046.0000000005DF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350978145.0000000005B2A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340831402.0000000005AA4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.347768220.0000000005C30000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.348179950.0000000005D37000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350269475.0000000005D3F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.341363850.0000000005AF2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.341316300.0000000005AFC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.342250004.0000000005BD4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.335230812.00000000035CF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.335230812.00000000035B8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338361754.0000000005A66000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.348373935.0000000005D8F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.347768220.0000000005C5A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.334706320.00000000035AD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350515217.0000000005EAF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.347919526.0000000005D29000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343691393.0000000005B84000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352843978.0000000005D76000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336614509.00000000059BF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://softwareulike.com/cWIYxWMPkK/
Source: wscript.exe, 0000000A.00000003.351427235.0000000005684000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://softwareulike.com/cWIYxWMPkK/yM
Source: wscript.exe, wscript.exe, 0000000A.00000003.348753046.0000000005DF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350978145.0000000005B2A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340831402.0000000005AA4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.347768220.0000000005C30000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.348179950.0000000005D37000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350269475.0000000005D3F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.341363850.0000000005AF2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.341316300.0000000005AFC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.342250004.0000000005BD4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.335230812.00000000035CF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.335230812.00000000035B8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338361754.0000000005A66000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.348373935.0000000005D8F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.347768220.0000000005C5A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.334706320.00000000035AD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350515217.0000000005EAF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.347919526.0000000005D29000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343691393.0000000005B84000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352843978.0000000005D76000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336614509.00000000059BF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/
Source: wscript.exe, 0000000A.00000003.350515217.0000000005EAF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351034904.0000000005EC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350578583.0000000005EBA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.355161456.0000000005ECB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350476503.0000000005EA9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/RJ
Source: wscript.exe, 0000000A.00000003.351427235.0000000005684000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/zM
Source: regsvr32.exe, 0000000D.00000002.831696209.0000000002E1F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://1.234.2.232:8080/jhiryhxgp/kxgycfcaqegfa/
Source: regsvr32.exe, 0000000D.00000002.831876513.0000000002FB0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://10.235.8.30:8080/
Source: regsvr32.exe, 0000000D.00000002.831876513.0000000002FB4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://103.43.75.120/
Source: regsvr32.exe, 0000000D.00000002.829371998.0000000000E04000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://103.43.75.120/jhiryhxgp/kxgycfcaqegfa/
Source: regsvr32.exe, 0000000D.00000002.829371998.0000000000E04000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://103.43.75.120/jhiryhxgp/kxgycfcaqegfa/fa/f
Source: regsvr32.exe, 0000000D.00000002.831696209.0000000002E1F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://103.43.75.120:443/jhiryhxgp/kxgycfcaqegfa/
Source: regsvr32.exe, 0000000D.00000002.831696209.0000000002E38000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://103.44.196.120:8080/
Source: regsvr32.exe, 0000000D.00000002.829371998.0000000000E04000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://119.59.103.152:8080/
Source: regsvr32.exe, 0000000D.00000002.829371998.0000000000DE9000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.831696209.0000000002E1F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://119.59.103.152:8080/jhiryhxgp/kxgycfcaqegfa/
Source: regsvr32.exe, 0000000D.00000002.831696209.0000000002E1F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://149.56.131.28:8080/jhiryhxgp/kxgycfcaqegfa/
Source: regsvr32.exe, 0000000D.00000002.829371998.0000000000D6C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://160.16.142.56:8080/
Source: regsvr32.exe, 0000000D.00000002.831696209.0000000002E1F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://206.189.28.199:8080/jhiryhxgp/kxgycfcaqegfa/
Source: regsvr32.exe, 0000000D.00000002.829371998.0000000000E04000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://213.239.212.5/jhiryhxgp/kxgycfcaqegfa/fa/t
Source: regsvr32.exe, 0000000D.00000002.829371998.0000000000DE9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://45.235.8.30:8080/
Source: regsvr32.exe, 0000000D.00000002.829371998.0000000000DE9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://45.235.8.30:8080/7
Source: regsvr32.exe, 0000000D.00000002.829371998.0000000000DE9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://45.235.8.30:8080/?
Source: regsvr32.exe, 0000000D.00000002.829371998.0000000000E04000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.829371998.0000000000DE9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://45.235.8.30:8080/jhiryhxgp/kxgycfcaqegfa/
Source: regsvr32.exe, 0000000D.00000002.829371998.0000000000E04000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://45.235.8.30:8080/jhiryhxgp/kxgycfcaqegfa/lS
Source: regsvr32.exe, 0000000D.00000002.831876513.0000000002FB4000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://459.59.103.152:8080/
Source: regsvr32.exe, 0000000D.00000002.829371998.0000000000E04000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://72.15.201.15:8080/jhiryhxgp/kxgycfcaqegfa/
Source: regsvr32.exe, 0000000D.00000002.831696209.0000000002E1F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://82.223.21.224:8080/jhiryhxgp/kxgycfcaqegfa/
Source: regsvr32.exe, 0000000D.00000002.829371998.0000000000D28000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://91.121.146.47:8080/$N
Source: regsvr32.exe, 0000000D.00000002.829371998.0000000000D28000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://91.121.146.47:8080/jhiryhxgp/kxgycfcaqegfa/
Source: regsvr32.exe, 0000000D.00000003.418840821.0000000000DA1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.829371998.0000000000DA3000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://91.121.146.47:8080/jhiryhxgp/kxgycfcaqegfa/Z
Source: regsvr32.exe, 0000000D.00000002.829371998.0000000000D28000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://91.121.146.47:8080/jhiryhxgp/kxgycfcaqegfa/lN
Source: regsvr32.exe, 0000000D.00000002.829371998.0000000000E04000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://91.207.28.33:8080/jhiryhxgp/kxgycfcaqegfa/5
Source: wscript.exe, 0000000A.00000003.348753046.0000000005DF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349152202.0000000005E00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349845444.0000000005E51000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.348523417.0000000005DF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349372624.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349551261.0000000005E41000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350131095.0000000005E5B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.355075856.0000000005E63000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349251383.0000000005E0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6H
Source: wscript.exe, wscript.exe, 0000000A.00000003.348753046.0000000005DF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350978145.0000000005B2A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340831402.0000000005AA4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.347768220.0000000005C30000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.348179950.0000000005D37000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350269475.0000000005D3F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.341363850.0000000005AF2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.341316300.0000000005AFC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.342250004.0000000005BD4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.335230812.00000000035CF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.335230812.00000000035B8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338361754.0000000005A66000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.348373935.0000000005D8F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.347768220.0000000005C5A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.334706320.00000000035AD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350515217.0000000005EAF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.347919526.0000000005D29000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343691393.0000000005B84000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352843978.0000000005D76000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336614509.00000000059BF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/
Source: wscript.exe, 0000000A.00000003.348753046.0000000005DF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349152202.0000000005E00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350169852.0000000005E6F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349845444.0000000005E51000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.348523417.0000000005DF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350313117.0000000005E76000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350446103.0000000005E8B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349372624.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349551261.0000000005E41000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350378483.0000000005E82000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349251383.0000000005E0B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350068964.0000000005E65000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dll
Source: wscript.exe, 0000000A.00000003.350703760.0000000005E94000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dlli
Source: wscript.exe, 0000000A.00000003.351427235.0000000005684000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/uM
Source: wscript.exe, 0000000A.00000002.355343827.0000000005F1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351172369.0000000005F1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.353077144.0000000005F1C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://penshorn.org/
Source: wscript.exe, 0000000A.00000003.350978145.0000000005B2A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340831402.0000000005AA4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.347768220.0000000005C30000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351609879.000000000565D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.348179950.0000000005D37000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350269475.0000000005D3F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.341363850.0000000005AF2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.341316300.0000000005AFC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.342250004.0000000005BD4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.335230812.00000000035CF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.335230812.00000000035B8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338361754.0000000005A66000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.348373935.0000000005D8F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.347768220.0000000005C5A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.334706320.00000000035AD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350515217.0000000005EAF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.347919526.0000000005D29000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343691393.0000000005B84000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352843978.0000000005D76000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336614509.00000000059BF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.353575116.0000000005DA8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://penshorn.org/admin/Ses8712iGR8du/
Source: wscript.exe, 0000000A.00000003.350515217.0000000005EAF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351034904.0000000005EC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350578583.0000000005EBA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.355161456.0000000005ECB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350476503.0000000005EA9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://penshorn.org/admin/Ses8712iGR8du/am
Source: wscript.exe, 0000000A.00000003.351427235.0000000005684000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://penshorn.org/admin/Ses8712iGR8du/tM
Source: wscript.exe, 0000000A.00000003.353397957.0000000005F04000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351362338.0000000005F04000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.355271644.0000000005F04000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://penshorn.org/in
Source: wscript.exe, wscript.exe, 0000000A.00000003.348753046.0000000005DF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350978145.0000000005B2A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340831402.0000000005AA4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.347768220.0000000005C30000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.348179950.0000000005D37000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350269475.0000000005D3F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.341363850.0000000005AF2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.341316300.0000000005AFC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.342250004.0000000005BD4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.335230812.00000000035CF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.335230812.00000000035B8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338361754.0000000005A66000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.348373935.0000000005D8F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.347768220.0000000005C5A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.334706320.00000000035AD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350515217.0000000005EAF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.347919526.0000000005D29000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343691393.0000000005B84000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352843978.0000000005D76000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336614509.00000000059BF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/
Source: wscript.exe, 0000000A.00000003.348753046.0000000005DF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349152202.0000000005E00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349845444.0000000005E51000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.348523417.0000000005DF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349372624.0000000005E14000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349551261.0000000005E41000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349251383.0000000005E0B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/798
Source: wscript.exe, 0000000A.00000003.351427235.0000000005684000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/wM
Source: wscript.exe, wscript.exe, 0000000A.00000003.348753046.0000000005DF7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350978145.0000000005B2A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.340831402.0000000005AA4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.347768220.0000000005C30000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.348179950.0000000005D37000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350269475.0000000005D3F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.341363850.0000000005AF2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.341316300.0000000005AFC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.342250004.0000000005BD4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.335230812.00000000035CF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.335230812.00000000035B8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338361754.0000000005A66000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.348373935.0000000005D8F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.347768220.0000000005C5A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.334706320.00000000035AD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350515217.0000000005EAF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.347919526.0000000005D29000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343691393.0000000005B84000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352843978.0000000005D76000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336614509.00000000059BF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.gomespontes.com.br/logs/pd/
Source: wscript.exe, 0000000A.00000003.350515217.0000000005EAF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351034904.0000000005EC3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350578583.0000000005EBA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.355161456.0000000005ECB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350476503.0000000005EA9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.gomespontes.com.br/logs/pd/les;C:
Source: wscript.exe, 0000000A.00000003.351427235.0000000005684000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.gomespontes.com.br/logs/pd/vM
Source: unknown HTTP traffic detected: POST /jhiryhxgp/kxgycfcaqegfa/ HTTP/1.1Connection: Keep-AliveContent-Length: 0Host: 182.162.143.56
Source: unknown DNS traffic detected: queries for: penshorn.org
Source: global traffic HTTP traffic detected: GET /admin/Ses8712iGR8du/ HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: penshorn.org
Source: unknown HTTPS traffic detected: 203.26.41.131:443 -> 192.168.2.3:49698 version: TLS 1.2
Source: unknown HTTPS traffic detected: 182.162.143.56:443 -> 192.168.2.3:49703 version: TLS 1.2

E-Banking Fraud

barindex
Source: Yara match File source: 0000000D.00000002.829371998.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 13.2.regsvr32.exe.ce0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.regsvr32.exe.d00000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.regsvr32.exe.ce0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.regsvr32.exe.d00000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000C.00000002.331944852.0000000000D00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.830903189.0000000000E21000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.332682576.0000000000D31000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.829181595.0000000000CE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: 0000000A.00000003.349816910.0000000005E26000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: WEBSHELL_asp_generic date = 2021-03-07, author = Arnim Rupp, description = Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, score = a8c63c418609c1c291b3e731ca85ded4b3e0fba83f3489c21a3199173b176a75, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
Source: 0000000A.00000003.350703760.0000000005E94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: WEBSHELL_asp_generic date = 2021-03-07, author = Arnim Rupp, description = Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, score = a8c63c418609c1c291b3e731ca85ded4b3e0fba83f3489c21a3199173b176a75, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
Source: C:\Windows\System32\regsvr32.exe File created: C:\Windows\system32\SfTfmTSAbIwWdRVZ\ Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180006818 12_2_0000000180006818
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_000000018000B878 12_2_000000018000B878
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180007110 12_2_0000000180007110
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180008D28 12_2_0000000180008D28
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180014555 12_2_0000000180014555
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00CF0000 12_2_00CF0000
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D4709C 12_2_00D4709C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3CC14 12_2_00D3CC14
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D4A000 12_2_00D4A000
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D37D6C 12_2_00D37D6C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3263C 12_2_00D3263C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D38BC8 12_2_00D38BC8
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D48FC8 12_2_00D48FC8
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D43CD4 12_2_00D43CD4
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D314D4 12_2_00D314D4
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D318DC 12_2_00D318DC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D45CC4 12_2_00D45CC4
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3F8C4 12_2_00D3F8C4
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D408CC 12_2_00D408CC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D380CC 12_2_00D380CC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D33CF4 12_2_00D33CF4
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D390F8 12_2_00D390F8
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D348FC 12_2_00D348FC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D420E0 12_2_00D420E0
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3AC94 12_2_00D3AC94
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D4CC84 12_2_00D4CC84
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D45880 12_2_00D45880
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D34C84 12_2_00D34C84
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D4A8B0 12_2_00D4A8B0
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D594BC 12_2_00D594BC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3DCB8 12_2_00D3DCB8
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D398AC 12_2_00D398AC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D55450 12_2_00D55450
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D4C058 12_2_00D4C058
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D37840 12_2_00D37840
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D4C44C 12_2_00D4C44C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D46C70 12_2_00D46C70
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3D474 12_2_00D3D474
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D32C78 12_2_00D32C78
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3C078 12_2_00D3C078
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3B07C 12_2_00D3B07C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D4B460 12_2_00D4B460
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D5181C 12_2_00D5181C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D31000 12_2_00D31000
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D39408 12_2_00D39408
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D37C08 12_2_00D37C08
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D41030 12_2_00D41030
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D4EC30 12_2_00D4EC30
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3B83C 12_2_00D3B83C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D415C8 12_2_00D415C8
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D4D5F0 12_2_00D4D5F0
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D395BC 12_2_00D395BC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D4BDA0 12_2_00D4BDA0
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D59910 12_2_00D59910
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D47518 12_2_00D47518
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D58500 12_2_00D58500
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D4610C 12_2_00D4610C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D37530 12_2_00D37530
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D4B130 12_2_00D4B130
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D36138 12_2_00D36138
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D41924 12_2_00D41924
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D44D20 12_2_00D44D20
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D4AD28 12_2_00D4AD28
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D496D4 12_2_00D496D4
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D4EAC0 12_2_00D4EAC0
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3D6CC 12_2_00D3D6CC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D392F0 12_2_00D392F0
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3BE90 12_2_00D3BE90
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D44A90 12_2_00D44A90
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D54E8C 12_2_00D54E8C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D38A8C 12_2_00D38A8C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D4A6BC 12_2_00D4A6BC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3AAB8 12_2_00D3AAB8
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D34EB8 12_2_00D34EB8
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D33ABC 12_2_00D33ABC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3B258 12_2_00D3B258
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3F65C 12_2_00D3F65C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D4A244 12_2_00D4A244
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D40A70 12_2_00D40A70
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D33274 12_2_00D33274
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3A660 12_2_00D3A660
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D34214 12_2_00D34214
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3461C 12_2_00D3461C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D45A00 12_2_00D45A00
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D58A00 12_2_00D58A00
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D4020C 12_2_00D4020C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D48E08 12_2_00D48E08
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D33E0C 12_2_00D33E0C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D48A2C 12_2_00D48A2C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D40E2C 12_2_00D40E2C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D4662C 12_2_00D4662C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3BA2C 12_2_00D3BA2C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D43FD0 12_2_00D43FD0
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D32FD4 12_2_00D32FD4
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D333D4 12_2_00D333D4
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D497CC 12_2_00D497CC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3A7F0 12_2_00D3A7F0
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D527EC 12_2_00D527EC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D31B94 12_2_00D31B94
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D45384 12_2_00D45384
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D38FB0 12_2_00D38FB0
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3FFB8 12_2_00D3FFB8
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D48BB8 12_2_00D48BB8
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3DBA0 12_2_00D3DBA0
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D4E750 12_2_00D4E750
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D34758 12_2_00D34758
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3975C 12_2_00D3975C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D4D770 12_2_00D4D770
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D4CF70 12_2_00D4CF70
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D38378 12_2_00D38378
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3F77C 12_2_00D3F77C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D43B14 12_2_00D43B14
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D4E310 12_2_00D4E310
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3EF14 12_2_00D3EF14
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D44F18 12_2_00D44F18
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3D33C 12_2_00D3D33C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CD0000 13_2_00CD0000
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E308CC 13_2_00E308CC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3A000 13_2_00E3A000
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2640A 13_2_00E2640A
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2CC14 13_2_00E2CC14
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E27D6C 13_2_00E27D6C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E26E42 13_2_00E26E42
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E40618 13_2_00E40618
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E263F4 13_2_00E263F4
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E28BC8 13_2_00E28BC8
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E38FC8 13_2_00E38FC8
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E33FD0 13_2_00E33FD0
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E473A4 13_2_00E473A4
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E29B79 13_2_00E29B79
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E320E0 13_2_00E320E0
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E23CF4 13_2_00E23CF4
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E290F8 13_2_00E290F8
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E248FC 13_2_00E248FC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2F8C4 13_2_00E2F8C4
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E35CC4 13_2_00E35CC4
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E280CC 13_2_00E280CC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E41CD4 13_2_00E41CD4
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E214D4 13_2_00E214D4
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E33CD4 13_2_00E33CD4
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E218DC 13_2_00E218DC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E444A8 13_2_00E444A8
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E298AC 13_2_00E298AC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3A8B0 13_2_00E3A8B0
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E494BC 13_2_00E494BC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2DCB8 13_2_00E2DCB8
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E35880 13_2_00E35880
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E24C84 13_2_00E24C84
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3CC84 13_2_00E3CC84
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E4488C 13_2_00E4488C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E41494 13_2_00E41494
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2AC94 13_2_00E2AC94
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3709C 13_2_00E3709C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3B460 13_2_00E3B460
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E45868 13_2_00E45868
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E36C70 13_2_00E36C70
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2D474 13_2_00E2D474
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E22C78 13_2_00E22C78
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2C078 13_2_00E2C078
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2B07C 13_2_00E2B07C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E27840 13_2_00E27840
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3C44C 13_2_00E3C44C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E45450 13_2_00E45450
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3C058 13_2_00E3C058
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E31030 13_2_00E31030
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3EC30 13_2_00E3EC30
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2B83C 13_2_00E2B83C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E21000 13_2_00E21000
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E29408 13_2_00E29408
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E27C08 13_2_00E27C08
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E27410 13_2_00E27410
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E4181C 13_2_00E4181C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3D5F0 13_2_00E3D5F0
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E315C8 13_2_00E315C8
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3BDA0 13_2_00E3BDA0
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E295BC 13_2_00E295BC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E44D64 13_2_00E44D64
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E34D20 13_2_00E34D20
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E31924 13_2_00E31924
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3AD28 13_2_00E3AD28
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3B130 13_2_00E3B130
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E26138 13_2_00E26138
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E48500 13_2_00E48500
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E42100 13_2_00E42100
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3610C 13_2_00E3610C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E49910 13_2_00E49910
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E37518 13_2_00E37518
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E292F0 13_2_00E292F0
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E436FC 13_2_00E436FC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3EAC0 13_2_00E3EAC0
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2D6CC 13_2_00E2D6CC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E396D4 13_2_00E396D4
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E42AB0 13_2_00E42AB0
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2AAB8 13_2_00E2AAB8
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E24EB8 13_2_00E24EB8
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E37EBE 13_2_00E37EBE
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E23ABC 13_2_00E23ABC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3A6BC 13_2_00E3A6BC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E42E84 13_2_00E42E84
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E44E8C 13_2_00E44E8C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E28A8C 13_2_00E28A8C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2BE90 13_2_00E2BE90
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E34A90 13_2_00E34A90
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2A660 13_2_00E2A660
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E30A70 13_2_00E30A70
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E23274 13_2_00E23274
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3A244 13_2_00E3A244
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E46E48 13_2_00E46E48
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2B258 13_2_00E2B258
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2F65C 13_2_00E2F65C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2BA2C 13_2_00E2BA2C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E38A2C 13_2_00E38A2C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E30E2C 13_2_00E30E2C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3662C 13_2_00E3662C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2263C 13_2_00E2263C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E35A00 13_2_00E35A00
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E48A00 13_2_00E48A00
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E38E08 13_2_00E38E08
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E23E0C 13_2_00E23E0C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3020C 13_2_00E3020C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E24214 13_2_00E24214
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2461C 13_2_00E2461C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E427EC 13_2_00E427EC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2A7F0 13_2_00E2A7F0
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3FFFC 13_2_00E3FFFC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E397CC 13_2_00E397CC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E22FD4 13_2_00E22FD4
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E233D4 13_2_00E233D4
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2DBA0 13_2_00E2DBA0
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E447A8 13_2_00E447A8
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E28FB0 13_2_00E28FB0
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2FFB8 13_2_00E2FFB8
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E38BB8 13_2_00E38BB8
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E35384 13_2_00E35384
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E21B94 13_2_00E21B94
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3779A 13_2_00E3779A
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E48B68 13_2_00E48B68
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3D770 13_2_00E3D770
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3CF70 13_2_00E3CF70
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E28378 13_2_00E28378
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2F77C 13_2_00E2F77C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3E750 13_2_00E3E750
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E24758 13_2_00E24758
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2975C 13_2_00E2975C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2D33C 13_2_00E2D33C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3E310 13_2_00E3E310
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E48310 13_2_00E48310
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E2EF14 13_2_00E2EF14
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E33B14 13_2_00E33B14
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E45B1C 13_2_00E45B1C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E34F18 13_2_00E34F18
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180010C10 LdrFindResource_U,LdrAccessResource,NtAllocateVirtualMemory, 12_2_0000000180010C10
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180010AC0 ExitProcess,RtlQueueApcWow64Thread,NtTestAlert, 12_2_0000000180010AC0
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180010DB0 ZwOpenSymbolicLinkObject,ZwOpenSymbolicLinkObject, 12_2_0000000180010DB0
Source: C:\Windows\SysWOW64\regsvr32.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Section loaded: sfc.dll Jump to behavior
Source: Joe Sandbox View Dropped File: C:\Users\user\AppData\Local\Temp\rad98E2D.tmp.dll 2F39C2879989DDD7F9ECF52B6232598E5595F8BF367846FF188C9DFBF1251253
Source: OMICS_Online_1.one ReversingLabs: Detection: 38%
Source: OMICS_Online_1.one Virustotal: Detection: 16%
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA Jump to behavior
Source: unknown Process created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE" "C:\Users\user\Desktop\OMICS_Online_1.one
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process created: C:\Windows\SysWOW64\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Local\Temp\click.wsf"
Source: C:\Windows\SysWOW64\wscript.exe Process created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\rad98E2D.tmp.dll
Source: C:\Windows\SysWOW64\regsvr32.exe Process created: C:\Windows\System32\regsvr32.exe "C:\Users\user\AppData\Local\Temp\rad98E2D.tmp.dll"
Source: C:\Windows\System32\regsvr32.exe Process created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\SfTfmTSAbIwWdRVZ\mmatLGgYnezL.dll"
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE /tsr
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process created: C:\Windows\SysWOW64\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Local\Temp\click.wsf" Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE /tsr Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\rad98E2D.tmp.dll Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe Process created: C:\Windows\System32\regsvr32.exe "C:\Users\user\AppData\Local\Temp\rad98E2D.tmp.dll" Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Process created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\SfTfmTSAbIwWdRVZ\mmatLGgYnezL.dll" Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{06290BD0-48AA-11D2-8432-006008C3FBFC}\InprocServer32 Jump to behavior
Source: Send to OneNote.lnk.0.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE File created: C:\Users\user\Documents\{38961FCB-A541-47B3-93FA-F85A63ADB473} Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE File created: C:\Users\user\AppData\Local\Temp\{E1FDBD5F-A947-4781-AC62-AF16841F3906} - OProcSessId.dat Jump to behavior
Source: classification engine Classification label: mal100.troj.expl.evad.winONE@11/441@1/49
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE File read: C:\Program Files (x86)\desktop.ini Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D38BC8 Process32FirstW,CreateToolhelp32Snapshot,FindCloseChangeNotification, 12_2_00D38BC8
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE Mutant created: \Sessions\1\BaseNamedObjects\OneNoteM:AppShared
Source: C:\Windows\SysWOW64\wscript.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\regsvr32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180005C69 push rdi; ret 12_2_0000000180005C72
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00000001800056DD push rdi; ret 12_2_00000001800056E4
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D480D7 push ebp; retf 12_2_00D480D8
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D36CDE push esi; iretd 12_2_00D36CDF
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3A0FC push ebp; iretd 12_2_00D3A0FD
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D36C9F pushad ; ret 12_2_00D36CAA
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3A1D2 push ebp; iretd 12_2_00D3A1D3
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D47987 push ebp; iretd 12_2_00D4798F
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D39D51 push ebp; retf 12_2_00D39D5A
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D48157 push ebp; retf 12_2_00D48158
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D47D4E push ebp; iretd 12_2_00D47D4F
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D47D3C push ebp; retf 12_2_00D47D3D
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D47D25 push 4D8BFFFFh; retf 12_2_00D47D2A
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D39E8B push eax; retf 12_2_00D39E8E
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D47EAF push 458BCC5Ah; retf 12_2_00D47EBC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D3A26E push ebp; ret 12_2_00D3A26F
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00D4C731 push esi; iretd 12_2_00D4C732
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E26CDE push esi; iretd 13_2_00E26CDF
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E26C9F pushad ; ret 13_2_00E26CAA
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E37D4E push ebp; iretd 13_2_00E37D4F
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E37D25 push 4D8BFFFFh; retf 13_2_00E37D2A
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E46D34 push edi; ret 13_2_00E46D36
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E37D3C push ebp; retf 13_2_00E37D3D
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E37EAF push 458BCC5Ah; retf 13_2_00E37EBC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00E3C731 push esi; iretd 13_2_00E3C732
Source: rad98E2D.tmp.dll.10.dr Static PE information: section name: _RDATA
Source: C:\Windows\SysWOW64\wscript.exe Process created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\rad98E2D.tmp.dll
Source: C:\Windows\SysWOW64\wscript.exe File created: C:\Users\user\AppData\Local\Temp\rad98E2D.tmp.dll Jump to dropped file
Source: C:\Windows\System32\regsvr32.exe File created: C:\Windows\System32\SfTfmTSAbIwWdRVZ\mmatLGgYnezL.dll (copy) Jump to dropped file
Source: C:\Windows\System32\regsvr32.exe File created: C:\Windows\System32\SfTfmTSAbIwWdRVZ\mmatLGgYnezL.dll (copy) Jump to dropped file
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Send to OneNote.lnk Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Send to OneNote.lnk Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\regsvr32.exe File opened: C:\Windows\system32\SfTfmTSAbIwWdRVZ\mmatLGgYnezL.dll:Zone.Identifier read attributes | delete Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe TID: 2432 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Windows\System32\regsvr32.exe TID: 5300 Thread sleep time: -690000s >= -30000s Jump to behavior
Source: C:\Windows\System32\regsvr32.exe API coverage: 9.4 %
Source: C:\Windows\SysWOW64\wscript.exe Window found: window name: WSH-Timer Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180008D28 FindFirstFileExW, 12_2_0000000180008D28
Source: C:\Windows\System32\regsvr32.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: wscript.exe, 0000000A.00000002.355343827.0000000005F1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351172369.0000000005F1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.353077144.0000000005F1C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW4
Source: wscript.exe, 0000000A.00000002.355343827.0000000005F1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351172369.0000000005F1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.353077144.0000000005F1C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.355224552.0000000005EF3000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.829371998.0000000000DB7000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.418840821.0000000000DB7000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: regsvr32.exe, 0000000D.00000003.418840821.0000000000D6C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.829371998.0000000000D6C000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180001C48 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 12_2_0000000180001C48
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_000000018000A878 GetProcessHeap, 12_2_000000018000A878
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180010C10 LdrFindResource_U,LdrAccessResource,NtAllocateVirtualMemory, 12_2_0000000180010C10
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180001C48 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 12_2_0000000180001C48
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00000001800082EC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 12_2_00000001800082EC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00000001800017DC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 12_2_00000001800017DC

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\regsvr32.exe Network Connect: 159.65.88.10 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 164.90.222.65 443 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 213.239.212.5 443 Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Domain query: penshorn.org
Source: C:\Windows\System32\regsvr32.exe Network Connect: 186.194.240.217 443 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 104.168.155.143 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 119.59.103.152 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 159.89.202.34 443 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 160.16.142.56 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 91.121.146.47 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 91.207.28.33 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 103.43.75.120 443 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 45.235.8.30 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 72.15.201.15 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 163.44.196.120 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 206.189.28.199 8080 Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Network Connect: 203.26.41.131 443 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 107.170.39.149 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 187.63.160.88 80 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 66.228.32.31 7080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 82.223.21.224 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 149.56.131.28 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 169.57.156.166 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 182.162.143.56 443 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 1.234.2.232 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 167.172.199.165 8080 Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\rad98E2D.tmp.dll Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00000001800070A0 cpuid 12_2_00000001800070A0
Source: C:\Windows\SysWOW64\wscript.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180001D98 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, 12_2_0000000180001D98

Stealing of Sensitive Information

barindex
Source: Yara match File source: OMICS_Online_1.one, type: SAMPLE
Source: Yara match File source: 0000000D.00000002.829371998.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 13.2.regsvr32.exe.ce0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.regsvr32.exe.d00000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.regsvr32.exe.ce0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.regsvr32.exe.d00000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000C.00000002.331944852.0000000000D00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.830903189.0000000000E21000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.332682576.0000000000D31000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.829181595.0000000000CE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY

Remote Access Functionality

barindex
Source: Yara match File source: OMICS_Online_1.one, type: SAMPLE
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs