Source: Yara match |
File source: 4.2.Allene.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.Allene.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 1.2.Allene.exe.3920000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 1.2.Allene.exe.3920000.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.Allene.exe.18b0000.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 1.2.Allene.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.Allene.exe.18b0000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 1.2.Allene.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000001.00000002.4155512160.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.1920045593.0000000001948000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.4156569703.00000000012B3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.1919987718.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.1919363155.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.4156176304.0000000001058000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.4157121061.0000000003DDE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.4157009146.0000000003920000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.4156339648.00000000010FD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: Allene.exe PID: 7132, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: Allene.exe PID: 2872, type: MEMORYSTR |
Source: Yara match |
File source: C:\ProgramData\remcos\logs.dat, type: DROPPED |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008E445A GetFileAttributesW,FindFirstFileW,FindClose, |
0_2_008E445A |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008EC6D1 FindFirstFileW,FindClose, |
0_2_008EC6D1 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008EC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, |
0_2_008EC75C |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008EEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
0_2_008EEF95 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008EF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
0_2_008EF0F2 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008EF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
0_2_008EF3F3 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008E37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, |
0_2_008E37EF |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008E3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, |
0_2_008E3B12 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008EBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
0_2_008EBCBC |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
1_2_0040B335 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, |
1_2_0041B42F |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
1_2_0040B53A |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, |
1_2_004089A9 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00406AC2 FindFirstFileW,FindNextFileW, |
1_2_00406AC2 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, |
1_2_00407A8C |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW, |
1_2_00418C69 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, |
1_2_00408DA7 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0063445A GetFileAttributesW,FindFirstFileW,FindClose, |
1_2_0063445A |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0063C6D1 FindFirstFileW,FindClose, |
1_2_0063C6D1 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0063C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, |
1_2_0063C75C |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0063EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
1_2_0063EF95 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0063F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
1_2_0063F0F2 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0063F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
1_2_0063F3F3 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_006337EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, |
1_2_006337EF |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00633B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, |
1_2_00633B12 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0063BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
1_2_0063BCBC |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49730 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49736 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49746 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49747 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49733 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49750 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49744 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49745 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49743 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49731 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49742 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49766 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49749 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49772 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49789 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49752 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49748 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49823 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49760 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49800 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49806 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49829 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49839 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49862 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49751 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49732 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49740 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49869 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49879 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49885 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49783 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49845 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49813 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49895 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49902 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49909 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49925 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49947 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49931 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49918 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49953 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49940 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49973 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49991 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49997 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49986 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49968 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49855 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50019 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50025 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49961 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:49978 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50045 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50032 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50067 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50052 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50065 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50064 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50077 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50063 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50078 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50072 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50003 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50061 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50084 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50083 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50070 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50075 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50060 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50038 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50086 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50071 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50087 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50088 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50089 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50062 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50079 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50068 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50073 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50080 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50012 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50082 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50081 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50066 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50069 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50074 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50076 -> 192.210.150.26:8787 |
Source: Network traffic |
Suricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.4:50085 -> 192.210.150.26:8787 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_0090CABC NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, |
0_2_0090CABC |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0065CABC NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, |
1_2_0065CABC |
Source: Yara match |
File source: 4.2.Allene.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.Allene.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 1.2.Allene.exe.3920000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 1.2.Allene.exe.3920000.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.Allene.exe.18b0000.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 1.2.Allene.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.Allene.exe.18b0000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 1.2.Allene.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000001.00000002.4155512160.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.1920045593.0000000001948000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.4156569703.00000000012B3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.1919987718.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.1919363155.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.4156176304.0000000001058000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.4157121061.0000000003DDE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.4157009146.0000000003920000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.4156339648.00000000010FD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: Allene.exe PID: 7132, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: Allene.exe PID: 2872, type: MEMORYSTR |
Source: Yara match |
File source: C:\ProgramData\remcos\logs.dat, type: DROPPED |
Source: 4.2.Allene.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 4.2.Allene.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 4.2.Allene.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 4.2.Allene.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 4.2.Allene.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 4.2.Allene.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 1.2.Allene.exe.3920000.2.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 1.2.Allene.exe.3920000.2.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 1.2.Allene.exe.3920000.2.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 1.2.Allene.exe.3920000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 1.2.Allene.exe.3920000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 1.2.Allene.exe.3920000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 4.2.Allene.exe.18b0000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 4.2.Allene.exe.18b0000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 4.2.Allene.exe.18b0000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 1.2.Allene.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 1.2.Allene.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 1.2.Allene.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 4.2.Allene.exe.18b0000.2.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 4.2.Allene.exe.18b0000.2.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 4.2.Allene.exe.18b0000.2.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 1.2.Allene.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 1.2.Allene.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 1.2.Allene.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000001.00000002.4155512160.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000001.00000002.4155512160.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000001.00000002.4155512160.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000004.00000002.1919987718.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000004.00000002.1919987718.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000004.00000002.1919987718.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000004.00000002.1919363155.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000004.00000002.1919363155.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000004.00000002.1919363155.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000001.00000002.4157009146.0000000003920000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000001.00000002.4157009146.0000000003920000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000001.00000002.4157009146.0000000003920000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: Process Memory Space: Allene.exe PID: 7132, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: Allene.exe PID: 2872, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_00883633 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow, |
0_2_00883633 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_0090C1AC PostMessageW,GetFocus,GetDlgCtrlID,_memset,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem,NtdllDialogWndProc_W, |
0_2_0090C1AC |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_0090C498 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W, |
0_2_0090C498 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_0090C5FE DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,_wcscat,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W, |
0_2_0090C5FE |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_0090C57D SendMessageW,NtdllDialogWndProc_W, |
0_2_0090C57D |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_0090C88F NtdllDialogWndProc_W, |
0_2_0090C88F |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_0090C8BE NtdllDialogWndProc_W, |
0_2_0090C8BE |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_0090C860 NtdllDialogWndProc_W, |
0_2_0090C860 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_0090C909 NtdllDialogWndProc_W, |
0_2_0090C909 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_0090C93E ClientToScreen,NtdllDialogWndProc_W, |
0_2_0090C93E |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_0090CABC NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, |
0_2_0090CABC |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_0090CA7C GetWindowLongW,NtdllDialogWndProc_W, |
0_2_0090CA7C |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_00881287 NtdllDialogWndProc_W,GetSysColor,SetBkColor,745EC8D0,NtdllDialogWndProc_W, |
0_2_00881287 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_00881290 NtdllDialogWndProc_W,GetClientRect,GetCursorPos,ScreenToClient, |
0_2_00881290 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_0090D3B8 NtdllDialogWndProc_W, |
0_2_0090D3B8 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_0090D43E GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W, |
0_2_0090D43E |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008816B5 NtdllDialogWndProc_W, |
0_2_008816B5 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008816DE GetParent,NtdllDialogWndProc_W, |
0_2_008816DE |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_0088167D NtdllDialogWndProc_W, |
0_2_0088167D |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_0090D78C NtdllDialogWndProc_W, |
0_2_0090D78C |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_0088189B NtdllDialogWndProc_W, |
0_2_0088189B |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_0090BC5D NtdllDialogWndProc_W,CallWindowProcW, |
0_2_0090BC5D |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_0090BF8C ReleaseCapture,ChrCmpIA,SetWindowTextW,SendMessageW,NtdllDialogWndProc_W, |
0_2_0090BF8C |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_0090BF30 NtdllDialogWndProc_W, |
0_2_0090BF30 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0041CA9E NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA, |
1_2_0041CA9E |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0041ACC1 OpenProcess,NtSuspendProcess,CloseHandle, |
1_2_0041ACC1 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0041ACED OpenProcess,NtResumeProcess,CloseHandle, |
1_2_0041ACED |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005D3633 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow, |
1_2_005D3633 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0065C1AC PostMessageW,GetFocus,GetDlgCtrlID,_memset,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem,NtdllDialogWndProc_W, |
1_2_0065C1AC |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0065C498 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W, |
1_2_0065C498 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0065C57D SendMessageW,NtdllDialogWndProc_W, |
1_2_0065C57D |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0065C5FE DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,_wcscat,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W, |
1_2_0065C5FE |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0065C860 NtdllDialogWndProc_W, |
1_2_0065C860 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0065C8BE NtdllDialogWndProc_W, |
1_2_0065C8BE |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0065C88F NtdllDialogWndProc_W, |
1_2_0065C88F |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0065C93E ClientToScreen,NtdllDialogWndProc_W, |
1_2_0065C93E |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0065C909 NtdllDialogWndProc_W, |
1_2_0065C909 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0065CA7C GetWindowLongW,NtdllDialogWndProc_W, |
1_2_0065CA7C |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0065CABC NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, |
1_2_0065CABC |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005D1290 NtdllDialogWndProc_W,GetClientRect,GetCursorPos,ScreenToClient, |
1_2_005D1290 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005D1287 NtdllDialogWndProc_W,GetSysColor,SetBkColor,745EC8D0,NtdllDialogWndProc_W, |
1_2_005D1287 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0065D3B8 NtdllDialogWndProc_W, |
1_2_0065D3B8 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0065D43E GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W, |
1_2_0065D43E |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005D167D NtdllDialogWndProc_W, |
1_2_005D167D |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005D16DE GetParent,NtdllDialogWndProc_W, |
1_2_005D16DE |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005D16B5 NtdllDialogWndProc_W, |
1_2_005D16B5 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0065D78C NtdllDialogWndProc_W, |
1_2_0065D78C |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005D189B NtdllDialogWndProc_W, |
1_2_005D189B |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0065BC5D NtdllDialogWndProc_W,CallWindowProcW, |
1_2_0065BC5D |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0065BF30 NtdllDialogWndProc_W, |
1_2_0065BF30 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0065BF8C ReleaseCapture,ChrCmpIA,SetWindowTextW,SendMessageW,NtdllDialogWndProc_W, |
1_2_0065BF8C |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_0088E6A0 |
0_2_0088E6A0 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008AD975 |
0_2_008AD975 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_0088FCE0 |
0_2_0088FCE0 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008A21C5 |
0_2_008A21C5 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008B62D2 |
0_2_008B62D2 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_009003DA |
0_2_009003DA |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008B242E |
0_2_008B242E |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008A25FA |
0_2_008A25FA |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008966E1 |
0_2_008966E1 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008DE616 |
0_2_008DE616 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008B878F |
0_2_008B878F |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008E8889 |
0_2_008E8889 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_00898808 |
0_2_00898808 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_00900857 |
0_2_00900857 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008B6844 |
0_2_008B6844 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008ACB21 |
0_2_008ACB21 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008B6DB6 |
0_2_008B6DB6 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_00896F9E |
0_2_00896F9E |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_00893030 |
0_2_00893030 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008A3187 |
0_2_008A3187 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008AF1D9 |
0_2_008AF1D9 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_00881287 |
0_2_00881287 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008A1484 |
0_2_008A1484 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_00895520 |
0_2_00895520 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008A7696 |
0_2_008A7696 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_00895760 |
0_2_00895760 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008A1978 |
0_2_008A1978 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008B9AB5 |
0_2_008B9AB5 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008A1D90 |
0_2_008A1D90 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008ABDA6 |
0_2_008ABDA6 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_00907DDB |
0_2_00907DDB |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_00893FE0 |
0_2_00893FE0 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_0088DF00 |
0_2_0088DF00 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_015FBF30 |
0_2_015FBF30 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0041D071 |
1_2_0041D071 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_004520D2 |
1_2_004520D2 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0043D098 |
1_2_0043D098 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00437150 |
1_2_00437150 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_004361AA |
1_2_004361AA |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00426254 |
1_2_00426254 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0043651C |
1_2_0043651C |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0044C739 |
1_2_0044C739 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_004367C6 |
1_2_004367C6 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_004267CB |
1_2_004267CB |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0043C9DD |
1_2_0043C9DD |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00432A49 |
1_2_00432A49 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00436A8D |
1_2_00436A8D |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0043CC0C |
1_2_0043CC0C |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00436D48 |
1_2_00436D48 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00434D22 |
1_2_00434D22 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00426E73 |
1_2_00426E73 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00440E20 |
1_2_00440E20 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0043CE3B |
1_2_0043CE3B |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00412F45 |
1_2_00412F45 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00452F00 |
1_2_00452F00 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00426FAD |
1_2_00426FAD |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005DE6A0 |
1_2_005DE6A0 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005FD975 |
1_2_005FD975 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005DFCE0 |
1_2_005DFCE0 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005F21C5 |
1_2_005F21C5 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_006062D2 |
1_2_006062D2 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_006503DA |
1_2_006503DA |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0060242E |
1_2_0060242E |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005F25FA |
1_2_005F25FA |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0062E616 |
1_2_0062E616 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005E66E1 |
1_2_005E66E1 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0060878F |
1_2_0060878F |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00606844 |
1_2_00606844 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00650857 |
1_2_00650857 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005E8808 |
1_2_005E8808 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00638889 |
1_2_00638889 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005FCB21 |
1_2_005FCB21 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00606DB6 |
1_2_00606DB6 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005E6F9E |
1_2_005E6F9E |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005E3030 |
1_2_005E3030 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005FF1D9 |
1_2_005FF1D9 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005F3187 |
1_2_005F3187 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005D1287 |
1_2_005D1287 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005F1484 |
1_2_005F1484 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005E5520 |
1_2_005E5520 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005F7696 |
1_2_005F7696 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005E5760 |
1_2_005E5760 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005F1978 |
1_2_005F1978 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00609AB5 |
1_2_00609AB5 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00657DDB |
1_2_00657DDB |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005F1D90 |
1_2_005F1D90 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005FBDA6 |
1_2_005FBDA6 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005DDF00 |
1_2_005DDF00 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005E3FE0 |
1_2_005E3FE0 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_010FBE90 |
1_2_010FBE90 |
Source: 4.2.Allene.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 4.2.Allene.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 4.2.Allene.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 4.2.Allene.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 4.2.Allene.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 4.2.Allene.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 1.2.Allene.exe.3920000.2.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 1.2.Allene.exe.3920000.2.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 1.2.Allene.exe.3920000.2.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 1.2.Allene.exe.3920000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 1.2.Allene.exe.3920000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 1.2.Allene.exe.3920000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 4.2.Allene.exe.18b0000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 4.2.Allene.exe.18b0000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 4.2.Allene.exe.18b0000.2.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 1.2.Allene.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 1.2.Allene.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 1.2.Allene.exe.400000.0.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 4.2.Allene.exe.18b0000.2.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 4.2.Allene.exe.18b0000.2.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 4.2.Allene.exe.18b0000.2.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 1.2.Allene.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 1.2.Allene.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 1.2.Allene.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000001.00000002.4155512160.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000001.00000002.4155512160.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000001.00000002.4155512160.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000004.00000002.1919987718.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000004.00000002.1919987718.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000004.00000002.1919987718.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000004.00000002.1919363155.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000004.00000002.1919363155.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000004.00000002.1919363155.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000001.00000002.4157009146.0000000003920000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000001.00000002.4157009146.0000000003920000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000001.00000002.4157009146.0000000003920000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: Process Memory Space: Allene.exe PID: 7132, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: Allene.exe PID: 2872, type: MEMORYSTR |
Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Section loaded: wsock32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: wsock32.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: sxs.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: vbscript.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: amsi.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: msisip.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: wshext.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: scrobj.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: mlang.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: scrrun.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: propsys.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: edputil.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: windows.staterepositoryps.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: appresolver.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: bcp47langs.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: slc.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: sppc.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: onecorecommonproxystub.dll |
Jump to behavior |
Source: C:\Windows\System32\wscript.exe |
Section loaded: onecoreuapcommonproxystub.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: userenv.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: winmm.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: wsock32.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008E848F push FFFFFF8Bh; iretd |
0_2_008E8491 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008AE70F push edi; ret |
0_2_008AE711 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008AE828 push esi; ret |
0_2_008AE82A |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008A8945 push ecx; ret |
0_2_008A8958 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008AEAEC push edi; ret |
0_2_008AEAEE |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008AEA03 push esi; ret |
0_2_008AEA05 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_004567E0 push eax; ret |
1_2_004567FE |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00455EAF push ecx; ret |
1_2_00455EC2 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00433FF6 push ecx; ret |
1_2_00434009 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005DC4C6 push A3005DBAh; retn 005Dh |
1_2_005DC50D |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0063848F push FFFFFF8Bh; iretd |
1_2_00638491 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005FE70F push edi; ret |
1_2_005FE711 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005FE828 push esi; ret |
1_2_005FE82A |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005F8945 push ecx; ret |
1_2_005F8958 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005FEA03 push esi; ret |
1_2_005FEA05 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005FEAEC push edi; ret |
1_2_005FEAEE |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005D2F12 push es; retf |
1_2_005D2F13 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008848D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, |
0_2_008848D7 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_00905376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, |
0_2_00905376 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_005D48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, |
1_2_005D48D7 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00655376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, |
1_2_00655376 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008E445A GetFileAttributesW,FindFirstFileW,FindClose, |
0_2_008E445A |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008EC6D1 FindFirstFileW,FindClose, |
0_2_008EC6D1 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008EC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, |
0_2_008EC75C |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008EEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
0_2_008EEF95 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008EF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
0_2_008EF0F2 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008EF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
0_2_008EF3F3 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008E37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, |
0_2_008E37EF |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008E3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, |
0_2_008E3B12 |
Source: C:\Users\user\Desktop\7056ZCiFdE.exe |
Code function: 0_2_008EBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
0_2_008EBCBC |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, |
1_2_0040B335 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose, |
1_2_0041B42F |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, |
1_2_0040B53A |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8, |
1_2_004089A9 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00406AC2 FindFirstFileW,FindNextFileW, |
1_2_00406AC2 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8, |
1_2_00407A8C |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW, |
1_2_00418C69 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose, |
1_2_00408DA7 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0063445A GetFileAttributesW,FindFirstFileW,FindClose, |
1_2_0063445A |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0063C6D1 FindFirstFileW,FindClose, |
1_2_0063C6D1 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0063C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, |
1_2_0063C75C |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0063EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
1_2_0063EF95 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0063F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, |
1_2_0063F0F2 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0063F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
1_2_0063F3F3 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_006337EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, |
1_2_006337EF |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_00633B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, |
1_2_00633B12 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: 1_2_0063BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, |
1_2_0063BCBC |
Source: 7056ZCiFdE.exe, 00000000.00000002.1732158041.0000000000934000.00000040.00000001.01000000.00000003.sdmp, Allene.exe, 00000001.00000002.4155616853.0000000000684000.00000040.00000001.01000000.00000004.sdmp, Allene.exe, 00000004.00000002.1919469392.0000000000684000.00000040.00000001.01000000.00000004.sdmp |
Binary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning |
Source: Allene.exe, 00000001.00000002.4156339648.00000000010FD000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program Manager0.26:8787 |
Source: Allene.exe, 00000001.00000002.4156569703.000000000121A000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program Manager |
Source: 7056ZCiFdE.exe, Allene.exe |
Binary or memory string: Shell_TrayWnd |
Source: Allene.exe, 00000001.00000002.4156339648.00000000010FD000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program Manager05\ |
Source: Allene.exe, 00000001.00000002.4156339648.00000000010FD000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program Manager0.26 |
Source: Allene.exe, 00000001.00000002.4156339648.00000000010FD000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program Manageres| |
Source: Allene.exe, 00000001.00000002.4156569703.00000000012B3000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program Manager0006689P |
Source: Allene.exe, 00000001.00000002.4156569703.000000000121A000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program Managerv |
Source: Allene.exe, 00000001.00000002.4156339648.00000000010FD000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program Manager05\7GB |
Source: Allene.exe, 00000001.00000002.4156569703.00000000012B3000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: |Program Manager| |
Source: Allene.exe, 00000001.00000002.4156176304.0000000001058000.00000004.00000020.00020000.00000000.sdmp, logs.dat.1.dr |
Binary or memory string: [Program Manager] |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: EnumSystemLocalesW, |
1_2_004470AE |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: GetLocaleInfoW, |
1_2_004510BA |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, |
1_2_004511E3 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: GetLocaleInfoW, |
1_2_004512EA |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, |
1_2_004513B7 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: GetLocaleInfoW, |
1_2_00447597 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: GetLocaleInfoA, |
1_2_0040E679 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, |
1_2_00450A7F |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: EnumSystemLocalesW, |
1_2_00450CF7 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: EnumSystemLocalesW, |
1_2_00450D42 |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: EnumSystemLocalesW, |
1_2_00450DDD |
Source: C:\Users\user\AppData\Local\Milburr\Allene.exe |
Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, |
1_2_00450E6A |
Source: Yara match |
File source: 4.2.Allene.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.Allene.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 1.2.Allene.exe.3920000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 1.2.Allene.exe.3920000.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.Allene.exe.18b0000.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 1.2.Allene.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.Allene.exe.18b0000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 1.2.Allene.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000001.00000002.4155512160.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.1920045593.0000000001948000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.4156569703.00000000012B3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.1919987718.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.1919363155.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.4156176304.0000000001058000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.4157121061.0000000003DDE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.4157009146.0000000003920000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.4156339648.00000000010FD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: Allene.exe PID: 7132, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: Allene.exe PID: 2872, type: MEMORYSTR |
Source: Yara match |
File source: C:\ProgramData\remcos\logs.dat, type: DROPPED |
Source: Yara match |
File source: 4.2.Allene.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.Allene.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 1.2.Allene.exe.3920000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 1.2.Allene.exe.3920000.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.Allene.exe.18b0000.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 1.2.Allene.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 4.2.Allene.exe.18b0000.2.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 1.2.Allene.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000001.00000002.4155512160.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.1920045593.0000000001948000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.4156569703.00000000012B3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.1919987718.00000000018B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000004.00000002.1919363155.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.4156176304.0000000001058000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.4157121061.0000000003DDE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.4157009146.0000000003920000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000001.00000002.4156339648.00000000010FD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: Allene.exe PID: 7132, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: Allene.exe PID: 2872, type: MEMORYSTR |
Source: Yara match |
File source: C:\ProgramData\remcos\logs.dat, type: DROPPED |