Source: Yara match | File source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.ambiparous.exe.39e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.ambiparous.exe.39e0000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 2.2.ambiparous.exe.3600000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 2.2.ambiparous.exe.3600000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000008.00000002.3786705466.0000000004EDE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.3786396527.0000000003200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.3786431770.0000000003212000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: ambiparous.exe PID: 7880, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: svchost.exe PID: 7900, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: ambiparous.exe PID: 8128, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: svchost.exe PID: 8168, type: MEMORYSTR |
Source: Yara match | File source: C:\ProgramData\remcos\logs.dat, type: DROPPED |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003A445A GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_003A445A |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003AC6D1 FindFirstFileW,FindClose, | 0_2_003AC6D1 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003AC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_003AC75C |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003AEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_003AEF95 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003AF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_003AF0F2 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003AF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_003AF3F3 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003A37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_003A37EF |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003A3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_003A3B12 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003ABCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_003ABCBC |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B5445A GetFileAttributesW,FindFirstFileW,FindClose, | 2_2_00B5445A |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B5C6D1 FindFirstFileW,FindClose, | 2_2_00B5C6D1 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B5C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 2_2_00B5C75C |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B5EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_00B5EF95 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B5F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_00B5F0F2 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B5F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_00B5F3F3 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B537EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_00B537EF |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B53B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_00B53B12 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B5BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_00B5BCBC |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 3_2_0040928E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, | 3_2_0041C322 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, | 3_2_0040C388 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 3_2_004096A0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, | 3_2_00408847 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00407877 FindFirstFileW,FindNextFileW, | 3_2_00407877 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0044E8F9 FindFirstFileExA, | 3_2_0044E8F9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 3_2_0040BB6B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW, | 3_2_00419B86 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 3_2_0040BD72 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 8_2_0040928E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, | 8_2_0041C322 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, | 8_2_0040C388 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 8_2_004096A0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, | 8_2_00408847 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00407877 FindFirstFileW,FindNextFileW, | 8_2_00407877 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0044E8F9 FindFirstFileExA, | 8_2_0044E8F9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 8_2_0040BB6B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW, | 8_2_00419B86 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 8_2_0040BD72 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: unknown | TCP traffic detected without corresponding DNS query: 192.3.64.152 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003CCABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 0_2_003CCABC |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B7CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW, | 2_2_00B7CABC |
Source: Yara match | File source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.ambiparous.exe.39e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.ambiparous.exe.39e0000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 2.2.ambiparous.exe.3600000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 2.2.ambiparous.exe.3600000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000008.00000002.3786705466.0000000004EDE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.3786396527.0000000003200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.3786431770.0000000003212000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: ambiparous.exe PID: 7880, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: svchost.exe PID: 7900, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: ambiparous.exe PID: 8128, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: svchost.exe PID: 8168, type: MEMORYSTR |
Source: Yara match | File source: C:\ProgramData\remcos\logs.dat, type: DROPPED |
Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 7.2.ambiparous.exe.39e0000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 7.2.ambiparous.exe.39e0000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 7.2.ambiparous.exe.39e0000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 7.2.ambiparous.exe.39e0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 7.2.ambiparous.exe.39e0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 7.2.ambiparous.exe.39e0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 2.2.ambiparous.exe.3600000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 2.2.ambiparous.exe.3600000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 2.2.ambiparous.exe.3600000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 2.2.ambiparous.exe.3600000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 2.2.ambiparous.exe.3600000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 2.2.ambiparous.exe.3600000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Author: unknown |
Source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen |
Source: Process Memory Space: ambiparous.exe PID: 7880, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: svchost.exe PID: 7900, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: ambiparous.exe PID: 8128, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: Process Memory Space: svchost.exe PID: 8168, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 Author: unknown |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: This is a third-party compiled AutoIt script. | 0_2_00343B3A |
Source: OKkUGRkZV7.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | |
Source: OKkUGRkZV7.exe, 00000000.00000003.1354253807.0000000003F03000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_0038f306-f |
Source: OKkUGRkZV7.exe, 00000000.00000003.1354253807.0000000003F03000.00000004.00001000.00020000.00000000.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_04113fad-b |
Source: OKkUGRkZV7.exe, 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_c5e7771d-c |
Source: OKkUGRkZV7.exe, 00000000.00000002.1355281769.00000000003F4000.00000002.00000001.01000000.00000003.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_477a71c8-f |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: This is a third-party compiled AutoIt script. | 2_2_00AF3B3A |
Source: ambiparous.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | |
Source: ambiparous.exe, 00000002.00000000.1354777001.0000000000BA4000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_4e3926b0-c |
Source: ambiparous.exe, 00000002.00000000.1354777001.0000000000BA4000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_5c467cf6-8 |
Source: ambiparous.exe, 00000007.00000002.1536966033.0000000000BA4000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_6a610fee-f |
Source: ambiparous.exe, 00000007.00000002.1536966033.0000000000BA4000.00000002.00000001.01000000.00000004.sdmp | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_6a189d7e-6 |
Source: OKkUGRkZV7.exe | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_4e0972f8-d |
Source: OKkUGRkZV7.exe | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_87205f43-7 |
Source: ambiparous.exe.0.dr | String found in binary or memory: This is a third-party compiled AutoIt script. | memstr_8c376ad4-3 |
Source: ambiparous.exe.0.dr | String found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer` | memstr_beb5ec92-7 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_0034E6A0 | 0_2_0034E6A0 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_0036D975 | 0_2_0036D975 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_0034FCE0 | 0_2_0034FCE0 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003621C5 | 0_2_003621C5 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003762D2 | 0_2_003762D2 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003C03DA | 0_2_003C03DA |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_0037242E | 0_2_0037242E |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003625FA | 0_2_003625FA |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_0039E616 | 0_2_0039E616 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003566E1 | 0_2_003566E1 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_0037878F | 0_2_0037878F |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_00358808 | 0_2_00358808 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003C0857 | 0_2_003C0857 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_00376844 | 0_2_00376844 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003A8889 | 0_2_003A8889 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_0036CB21 | 0_2_0036CB21 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_00376DB6 | 0_2_00376DB6 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_00356F9E | 0_2_00356F9E |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_00353030 | 0_2_00353030 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_00363187 | 0_2_00363187 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_0036F1D9 | 0_2_0036F1D9 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_00341287 | 0_2_00341287 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_00361484 | 0_2_00361484 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_00355520 | 0_2_00355520 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_00367696 | 0_2_00367696 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_00355760 | 0_2_00355760 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_00361978 | 0_2_00361978 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_00379AB5 | 0_2_00379AB5 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_0036BDA6 | 0_2_0036BDA6 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_00361D90 | 0_2_00361D90 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003C7DDB | 0_2_003C7DDB |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_0034DF00 | 0_2_0034DF00 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_00353FE0 | 0_2_00353FE0 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_01697680 | 0_2_01697680 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00AFE6A0 | 2_2_00AFE6A0 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B1D975 | 2_2_00B1D975 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00AFFCE0 | 2_2_00AFFCE0 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B121C5 | 2_2_00B121C5 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B262D2 | 2_2_00B262D2 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B703DA | 2_2_00B703DA |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B2242E | 2_2_00B2242E |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B125FA | 2_2_00B125FA |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B066E1 | 2_2_00B066E1 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B4E616 | 2_2_00B4E616 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B2878F | 2_2_00B2878F |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B58889 | 2_2_00B58889 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B08808 | 2_2_00B08808 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B70857 | 2_2_00B70857 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B26844 | 2_2_00B26844 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B1CB21 | 2_2_00B1CB21 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B26DB6 | 2_2_00B26DB6 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B06F9E | 2_2_00B06F9E |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B03030 | 2_2_00B03030 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B13187 | 2_2_00B13187 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B1F1D9 | 2_2_00B1F1D9 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00AF1287 | 2_2_00AF1287 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B11484 | 2_2_00B11484 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B05520 | 2_2_00B05520 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B17696 | 2_2_00B17696 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B05760 | 2_2_00B05760 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B11978 | 2_2_00B11978 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B29AB5 | 2_2_00B29AB5 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B1BDA6 | 2_2_00B1BDA6 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B11D90 | 2_2_00B11D90 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B77DDB | 2_2_00B77DDB |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B03FE0 | 2_2_00B03FE0 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00AFDF00 | 2_2_00AFDF00 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_01188928 | 2_2_01188928 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0043706A | 3_2_0043706A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00414005 | 3_2_00414005 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0043E11C | 3_2_0043E11C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_004541D9 | 3_2_004541D9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_004381E8 | 3_2_004381E8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0041F18B | 3_2_0041F18B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00446270 | 3_2_00446270 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0043E34B | 3_2_0043E34B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_004533AB | 3_2_004533AB |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0042742E | 3_2_0042742E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00437566 | 3_2_00437566 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0043E5A8 | 3_2_0043E5A8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_004387F0 | 3_2_004387F0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0043797E | 3_2_0043797E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_004339D7 | 3_2_004339D7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0044DA49 | 3_2_0044DA49 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00427AD7 | 3_2_00427AD7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0041DBF3 | 3_2_0041DBF3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00427C40 | 3_2_00427C40 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00437DB3 | 3_2_00437DB3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00435EEB | 3_2_00435EEB |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0043DEED | 3_2_0043DEED |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00426E9F | 3_2_00426E9F |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_02FD2720 | 4_2_02FD2720 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 7_2_012BA270 | 7_2_012BA270 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0043706A | 8_2_0043706A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00414005 | 8_2_00414005 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0043E11C | 8_2_0043E11C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_004541D9 | 8_2_004541D9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_004381E8 | 8_2_004381E8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0041F18B | 8_2_0041F18B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00446270 | 8_2_00446270 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0043E34B | 8_2_0043E34B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_004533AB | 8_2_004533AB |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0042742E | 8_2_0042742E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00437566 | 8_2_00437566 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0043E5A8 | 8_2_0043E5A8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_004387F0 | 8_2_004387F0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0043797E | 8_2_0043797E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_004339D7 | 8_2_004339D7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0044DA49 | 8_2_0044DA49 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00427AD7 | 8_2_00427AD7 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0041DBF3 | 8_2_0041DBF3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00427C40 | 8_2_00427C40 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00437DB3 | 8_2_00437DB3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00435EEB | 8_2_00435EEB |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0043DEED | 8_2_0043DEED |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00426E9F | 8_2_00426E9F |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 00402213 appears 38 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 004052FD appears 32 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 0040417E appears 46 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 00402093 appears 100 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 00401E65 appears 68 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 00434E70 appears 108 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 00401FAB appears 38 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 004020DF appears 40 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 00434801 appears 82 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 00457AA8 appears 34 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 00445951 appears 56 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 0044854A appears 36 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 00411FA2 appears 32 times | |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: String function: 004046F7 appears 34 times | |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: String function: 00AF7DE1 appears 36 times | |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: String function: 00B18900 appears 42 times | |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: String function: 00B10AE3 appears 70 times | |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: String function: 00360AE3 appears 70 times | |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: String function: 00347DE1 appears 35 times | |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: String function: 00368900 appears 42 times | |
Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 7.2.ambiparous.exe.39e0000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 7.2.ambiparous.exe.39e0000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 7.2.ambiparous.exe.39e0000.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 7.2.ambiparous.exe.39e0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 7.2.ambiparous.exe.39e0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 7.2.ambiparous.exe.39e0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 2.2.ambiparous.exe.3600000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 2.2.ambiparous.exe.3600000.1.raw.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 2.2.ambiparous.exe.3600000.1.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 2.2.ambiparous.exe.3600000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 2.2.ambiparous.exe.3600000.1.unpack, type: UNPACKEDPE | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 2.2.ambiparous.exe.3600000.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda |
Source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) |
Source: Process Memory Space: ambiparous.exe PID: 7880, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: svchost.exe PID: 7900, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: ambiparous.exe PID: 8128, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: Process Memory Space: svchost.exe PID: 8168, type: MEMORYSTR | Matched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rstrtmgr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sxs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: vbscript.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: amsi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: msisip.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wshext.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrobj.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mlang.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: scrrun.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: appresolver.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: slc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: sppc.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecorecommonproxystub.dll | Jump to behavior |
Source: C:\Windows\System32\wscript.exe | Section loaded: onecoreuapcommonproxystub.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Section loaded: wsock32.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Section loaded: mpr.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rstrtmgr.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\svchost.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003448D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, | 0_2_003448D7 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003C5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, | 0_2_003C5376 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00AF48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput, | 2_2_00AF48D7 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B75376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed, | 2_2_00B75376 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003A445A GetFileAttributesW,FindFirstFileW,FindClose, | 0_2_003A445A |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003AC6D1 FindFirstFileW,FindClose, | 0_2_003AC6D1 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003AC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 0_2_003AC75C |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003AEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_003AEF95 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003AF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 0_2_003AF0F2 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003AF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_003AF3F3 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003A37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_003A37EF |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003A3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 0_2_003A3B12 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_003ABCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 0_2_003ABCBC |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B5445A GetFileAttributesW,FindFirstFileW,FindClose, | 2_2_00B5445A |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B5C6D1 FindFirstFileW,FindClose, | 2_2_00B5C6D1 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B5C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf, | 2_2_00B5C75C |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B5EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_00B5EF95 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B5F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose, | 2_2_00B5F0F2 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B5F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_00B5F3F3 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B537EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_00B537EF |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B53B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose, | 2_2_00B53B12 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B5BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose, | 2_2_00B5BCBC |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 3_2_0040928E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, | 3_2_0041C322 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, | 3_2_0040C388 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 3_2_004096A0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, | 3_2_00408847 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00407877 FindFirstFileW,FindNextFileW, | 3_2_00407877 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0044E8F9 FindFirstFileExA, | 3_2_0044E8F9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 3_2_0040BB6B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW, | 3_2_00419B86 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 3_2_0040BD72 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 8_2_0040928E |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose, | 8_2_0041C322 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose, | 8_2_0040C388 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose, | 8_2_004096A0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose, | 8_2_00408847 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00407877 FindFirstFileW,FindNextFileW, | 8_2_00407877 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0044E8F9 FindFirstFileExA, | 8_2_0044E8F9 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose, | 8_2_0040BB6B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW, | 8_2_00419B86 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose, | 8_2_0040BD72 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_01697570 mov eax, dword ptr fs:[00000030h] | 0_2_01697570 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_01697510 mov eax, dword ptr fs:[00000030h] | 0_2_01697510 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_01695ED0 mov eax, dword ptr fs:[00000030h] | 0_2_01695ED0 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_01187178 mov eax, dword ptr fs:[00000030h] | 2_2_01187178 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_011887B8 mov eax, dword ptr fs:[00000030h] | 2_2_011887B8 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_01188818 mov eax, dword ptr fs:[00000030h] | 2_2_01188818 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00443355 mov eax, dword ptr fs:[00000030h] | 3_2_00443355 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_02FD3060 mov eax, dword ptr fs:[00000030h] | 4_2_02FD3060 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_02FD3060 mov eax, dword ptr fs:[00000030h] | 4_2_02FD3060 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_02FD3060 mov eax, dword ptr fs:[00000030h] | 4_2_02FD3060 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_02FD3060 mov eax, dword ptr fs:[00000030h] | 4_2_02FD3060 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_02FD3540 mov eax, dword ptr fs:[00000030h] | 4_2_02FD3540 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_02FD3540 mov eax, dword ptr fs:[00000030h] | 4_2_02FD3540 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_02FD3540 mov eax, dword ptr fs:[00000030h] | 4_2_02FD3540 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_02FD56A0 mov eax, dword ptr fs:[00000030h] | 4_2_02FD56A0 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_02FD56A0 mov ecx, dword ptr fs:[00000030h] | 4_2_02FD56A0 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_02FD4610 mov eax, dword ptr fs:[00000030h] | 4_2_02FD4610 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_02FD4610 mov eax, dword ptr fs:[00000030h] | 4_2_02FD4610 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_02FD4610 mov eax, dword ptr fs:[00000030h] | 4_2_02FD4610 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_02FD4610 mov eax, dword ptr fs:[00000030h] | 4_2_02FD4610 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_02FD4410 mov eax, dword ptr fs:[00000030h] | 4_2_02FD4410 |
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe | Code function: 4_2_02FD4410 mov eax, dword ptr fs:[00000030h] | 4_2_02FD4410 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 7_2_012BA100 mov eax, dword ptr fs:[00000030h] | 7_2_012BA100 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 7_2_012BA160 mov eax, dword ptr fs:[00000030h] | 7_2_012BA160 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 7_2_012B8AC0 mov eax, dword ptr fs:[00000030h] | 7_2_012B8AC0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00443355 mov eax, dword ptr fs:[00000030h] | 8_2_00443355 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_0036A124 SetUnhandledExceptionFilter, | 0_2_0036A124 |
Source: C:\Users\user\Desktop\OKkUGRkZV7.exe | Code function: 0_2_0036A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 0_2_0036A155 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B1A124 SetUnhandledExceptionFilter, | 2_2_00B1A124 |
Source: C:\Users\user\AppData\Local\lecheries\ambiparous.exe | Code function: 2_2_00B1A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 2_2_00B1A155 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 3_2_0043503C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 3_2_00434A8A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 3_2_0043BB71 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 3_2_00434BD8 SetUnhandledExceptionFilter, | 3_2_00434BD8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, | 8_2_0043503C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 8_2_00434A8A |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, | 8_2_0043BB71 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: 8_2_00434BD8 SetUnhandledExceptionFilter, | 8_2_00434BD8 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 3_2_0045201B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 3_2_004520B6 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 3_2_00452143 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 3_2_00452393 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 3_2_00448484 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 3_2_004524BC |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 3_2_004525C3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 3_2_00452690 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 3_2_0044896D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoA, | 3_2_0040F90C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 3_2_00451D58 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 3_2_00451FD0 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 8_2_0045201B |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 8_2_004520B6 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, | 8_2_00452143 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 8_2_00452393 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 8_2_00448484 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, | 8_2_004524BC |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 8_2_004525C3 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, | 8_2_00452690 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoW, | 8_2_0044896D |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: GetLocaleInfoA, | 8_2_0040F90C |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW, | 8_2_00451D58 |
Source: C:\Windows\SysWOW64\svchost.exe | Code function: EnumSystemLocalesW, | 8_2_00451FD0 |
Source: Yara match | File source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.ambiparous.exe.39e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.ambiparous.exe.39e0000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 2.2.ambiparous.exe.3600000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 2.2.ambiparous.exe.3600000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000008.00000002.3786705466.0000000004EDE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.3786396527.0000000003200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.3786431770.0000000003212000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: ambiparous.exe PID: 7880, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: svchost.exe PID: 7900, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: ambiparous.exe PID: 8128, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: svchost.exe PID: 8168, type: MEMORYSTR |
Source: Yara match | File source: C:\ProgramData\remcos\logs.dat, type: DROPPED |
Source: Yara match | File source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.ambiparous.exe.39e0000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 7.2.ambiparous.exe.39e0000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 2.2.ambiparous.exe.3600000.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 2.2.ambiparous.exe.3600000.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000008.00000002.3786705466.0000000004EDE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000002.00000002.1398020611.0000000003600000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.3786396527.0000000003200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000007.00000002.1537946128.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.3785910612.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000008.00000002.3786431770.0000000003212000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000003.00000002.1395816177.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: ambiparous.exe PID: 7880, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: svchost.exe PID: 7900, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: ambiparous.exe PID: 8128, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: svchost.exe PID: 8168, type: MEMORYSTR |
Source: Yara match | File source: C:\ProgramData\remcos\logs.dat, type: DROPPED |