Dead or Alive? An Emotet Story
Tags
cmtmf-attack-pattern: Application Layer Protocol Process Injection
maec-delivery-vectors: Watering Hole
attack-pattern: Data Direct Application Layer Protocol - T1437 Authentication Package - T1547.002 Cdns - T1596.004 Component Object Model - T1559.001 Credentials - T1589.001 Dns - T1071.004 Dns - T1590.002 Domain Account - T1087.002 Domain Account - T1136.002 Domain Groups - T1069.002 Domain Trust Discovery - T1482 Dynamic-Link Library Injection - T1055.001 Email Accounts - T1585.002 Email Accounts - T1586.002 Email Addresses - T1589.002 Exfiltration To Cloud Storage - T1567.002 Kerberoasting - T1558.003 Lateral Tool Transfer - T1570 Lsass Memory - T1003.001 Malicious File - T1204.002 Malware - T1587.001 Malware - T1588.001 System Information Discovery - T1426 Pass The Hash - T1550.002 Phishing - T1660 Phishing - T1566 Powershell - T1059.001 Process Hollowing - T1055.012 Process Injection - T1631 Python - T1059.006 Registry Run Keys / Startup Folder - T1547.001 Regsvr32 - T1218.010 Server - T1583.004 Server - T1584.004 Smb/Windows Admin Shares - T1021.002 Spearphishing Attachment - T1566.001 Spearphishing Attachment - T1598.002 Ssh - T1021.004 Thread Execution Hijacking - T1055.003 Tool - T1588.002 Account Discovery - T1087 Standard Application Layer Protocol - T1071 Authentication Package - T1131 Connection Proxy - T1090 Kerberoasting - T1208 Network Share Discovery - T1135 Pass The Hash - T1075 Powershell - T1086 Process Hollowing - T1093 Process Injection - T1055 Registry Run Keys / Start Folder - T1060 Regsvr32 - T1117 Remote Access Tools - T1219 Remote System Discovery - T1018 Spearphishing Attachment - T1193 System Information Discovery - T1082 Remote System Discovery Spearphishing Attachment
Common Information
Type Value
UUID ec1794f9-945d-4940-9132-e6aff26b4abd
Fingerprint 400a87f29bde675
Analysis status DONE
Considered CTI value 2
Text language
Published Sept. 12, 2022, 12:32 a.m.
Added to db Sept. 12, 2022, 3:29 a.m.
Last updated Nov. 17, 2024, 11:40 p.m.
Headline Dead or Alive? An Emotet Story
Title Dead or Alive? An Emotet Story
Detected Hints/Tags/Attributes 156/3/268
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 249 The DFIR Report https://thedfirreport.com/feed/ 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details Domain 538
pic.twitter.com
Details Domain 21
1768.py
Details Domain 1
lopespublicidade.com
Details Domain 1
bosny.com
Details Domain 1
seasidesolutions.com
Details Domain 1
borgelin.org
Details Domain 1
loa-hk.com
Details Domain 11
jquery.com
Details Domain 24
mega.io
Details Domain 1175
gmail.com
Details Domain 179
hotmail.com
Details Domain 119
yandex.ru
Details Domain 246
mail.ru
Details Domain 272
outlook.com
Details Domain 396
protonmail.com
Details Domain 1
dropmail.me
Details Domain 74
thedfirreport.com
Details Domain 2
joeware.net
Details File 172
dllhost.exe
Details File 3
find.bat
Details File 9
p.bat
Details File 8
1.msi
Details File 23
c:\windows\system32\regsvr32.exe
Details File 459
regsvr32.exe
Details File 1
lljymiovft.dll
Details File 18
1768.py
Details File 1260
explorer.exe
Details File 1122
svchost.exe
Details File 92
c:\windows\system32\svchost.exe
Details File 1
uomcgbxygce.exe
Details File 1
c:\users\user\appdata\local\frlxbdurbdvabvbs\uomcgbxygce.exe
Details File 2
c:\programdata\1.dll
Details File 6
c:\windows\system32\searchindexer.exe
Details File 29
c:\windows\system32\lsass.exe
Details File 36
c:\windows\system32\ntdll.dll
Details File 20
c:\windows\system32\kernelbase.dll
Details File 3
c:\program files\common files\microsoft shared\ink\ipsplugin.dll
Details File 23
c:\windows\system32\kernel32.dll
Details File 409
c:\windows\system32\cmd.exe
Details File 53
adfind.exe
Details File 22
find.exe
Details File 16
ad_users.txt
Details File 16
ad_computers.txt
Details File 12
ad_ous.txt
Details File 7
trustdmp.txt
Details File 7
subnets.txt
Details File 12
ad_group.txt
Details File 8
servers.txt
Details File 9
res.txt
Details File 2
dir.exe
Details File 37
1.dll
Details File 218
min.js
Details File 9
%windir%\\syswow64\\dllhost.exe
Details File 9
%windir%\\sysnative\\dllhost.exe
Details File 37
rclone.exe
Details File 1
info_1805.xls
Details File 7
ateraagent.exe
Details File 17
attack.exe
Details File 1
project1.dll
Details File 1
runsuite.log
Details File 1
f73.exe
Details File 9
32.exe
Details File 2
project.dll
Details File 9
32.dll
Details File 1
vlu405yd87.dll
Details File 1
xx.cpp
Details File 1
xxtype.cpp
Details md5 23
72a589da586844d7f0818ce684948eea
Details md5 15
f176ba63b4d68e576b5ba345bec2c7b7
Details md5 1
acd3d4e8f63f52eaf57467a76ca2389d
Details md5 1
27d0b9e38cdc9a31fa9271c0bbf5d393
Details md5 1
c96b2b5b52ef0013b841d136ddab0f49
Details md5 1
adf2b487134ffcd7999e419318dfdf8d
Details md5 1
e984f812689ec7af136a151a19b2d56c
Details md5 1
592155bbbab05ac1f818cfd9eb53b672
Details md5 1
066c972d2129d0e167d371a0abfcf03b
Details md5 1
bcf185f1308ffd9e4249849d206d9d0c
Details md5 1
d1aef4e37a548a43a95d44bd2f8c0afc
Details md5 1
4e03b8b675969416fb0d10e8ab11f7c2
Details sha1 1
4a42b5e7e7fd43ddefc856f45bb95d97656ddca6
Details sha1 1
e96980812c287c9d27be9181bcf08727cc9f457a
Details sha1 1
22cc2bc032ae327de9f975e9122b692e4474ac15
Details sha1 1
91c54877440d14538be22d662e7f47e29ab219bf
Details sha1 1
88591ad3806c0a1e451c744d4942e99e9a5d2ff7
Details sha1 1
82070d19c26e0f7e255168e1f2364174215aa0de
Details sha256 1
e598b9700e13f2cb1c30c6d9230152ed5716a6d6e25db702576fefeb6638005e
Details sha256 1
1b9c9e4ed6dab822b36e3716b1e8f046e92546554dff9bdbd18c822e18ab226b
Details sha256 1
5a5c601ede80d53e87e9ccb16b3b46f704e63ec7807e51f37929f65266158f4c
Details sha256 1
fd72a9313f8564b57ebd18791a438216d289d4a97df3f860f1fc585a001265d9
Details sha256 1
2b2e00ed89ce6898b9e58168488e72869f8e09f98fecb052143e15e98e5da9df
Details sha256 1
f4c085ef1ba7e78a17a9185e4d5e06163fe0e39b6b0dc3088b4c1ed11c0d726b
Details sha256 1
76bfb4a73dc0d3f382d3877a83ce62b50828f713744659bb21c30569d368caf8
Details sha256 2
5bc00ad792d4ddac7d8568f98a717caff9d5ef389ed355a15b892cc10ab2887b
Details sha256 8
b1102ed4bca6dae6f2f498ade2f73f76af527fa803f0e0b46e100d4cf5150682
Details IPv4 4
103.133.214.242
Details IPv4 5
103.41.204.169
Details IPv4 4
103.42.58.120
Details IPv4 5
103.56.149.105
Details IPv4 3
103.8.26.17
Details IPv4 4
104.248.225.227
Details IPv4 4
110.235.83.107
Details IPv4 6
116.124.128.206
Details IPv4 5
118.98.72.86
Details IPv4 3
134.122.119.23
Details IPv4 7
139.196.72.155
Details IPv4 5
159.69.237.188
Details IPv4 5
175.126.176.79
Details IPv4 5
178.62.112.199
Details IPv4 5
185.148.168.220
Details IPv4 5
188.225.32.231
Details IPv4 4
190.90.233.66
Details IPv4 4
194.9.172.107
Details IPv4 8
195.154.146.35
Details IPv4 8
195.77.239.39
Details IPv4 9
196.44.98.190
Details IPv4 6
202.134.4.210
Details IPv4 5
202.28.34.99
Details IPv4 5
202.29.239.162
Details IPv4 5
203.153.216.46
Details IPv4 7
207.148.81.119
Details IPv4 5
210.57.209.142
Details IPv4 7
217.182.143.207
Details IPv4 4
36.67.23.59
Details IPv4 8
37.44.244.177
Details IPv4 7
37.59.209.141
Details IPv4 4
45.71.195.104
Details IPv4 5
5.56.132.177
Details IPv4 4
51.68.141.164
Details IPv4 6
54.37.106.167
Details IPv4 8
54.37.228.122
Details IPv4 6
54.38.143.246
Details IPv4 7
54.38.242.185
Details IPv4 8
59.148.253.194
Details IPv4 5
62.171.178.147
Details IPv4 7
66.42.57.149
Details IPv4 4
68.183.91.111
Details IPv4 4
68.183.93.250
Details IPv4 8
78.46.73.125
Details IPv4 8
78.47.204.80
Details IPv4 7
85.214.67.203
Details IPv4 5
85.25.120.45
Details IPv4 4
87.106.97.83
Details IPv4 7
88.217.172.165
Details IPv4 5
93.104.209.107
Details IPv4 1
59.95.98.204
Details MITRE ATT&CK Techniques 59
T1059.006
Details MITRE ATT&CK Techniques 118
T1570
Details MITRE ATT&CK Techniques 59
T1055.001
Details MITRE ATT&CK Techniques 31
T1559.001
Details MITRE ATT&CK Techniques 460
T1059.001
Details MITRE ATT&CK Techniques 44
T1218.010
Details MITRE ATT&CK Techniques 38
T1550.002
Details MITRE ATT&CK Techniques 74
T1069.002
Details MITRE ATT&CK Techniques 99
T1087.002
Details MITRE ATT&CK Techniques 124
T1482
Details MITRE ATT&CK Techniques 365
T1204.002
Details MITRE ATT&CK Techniques 139
T1021.002
Details MITRE ATT&CK Techniques 440
T1055
Details MITRE ATT&CK Techniques 100
T1567.002
Details MITRE ATT&CK Techniques 20
T1055.003
Details MITRE ATT&CK Techniques 243
T1018
Details MITRE ATT&CK Techniques 1006
T1082
Details MITRE ATT&CK Techniques 444
T1071
Details MITRE ATT&CK Techniques 176
T1135
Details MITRE ATT&CK Techniques 36
T1558.003
Details MITRE ATT&CK Techniques 173
T1003.001
Details MITRE ATT&CK Techniques 380
T1547.001
Details MITRE ATT&CK Techniques 409
T1566
Details MITRE ATT&CK Techniques 310
T1566.001
Details Url 1
http://praachichemfood.com/wp-content/mwmos/","..\hvxda.ocx
Details Url 1
https://lopespublicidade.com/cgi-bin/e5r5og4ieaqnxqrzdh/","..\hvxda.ocx
Details Url 1
https://bosny.com/aspnet_client/rnmp0ofr/","..\hvxda.ocx
Details Url 1
http://seasidesolutions.com/cgi-bin/wloo6sezycj3ltlc/","..\hvxda.ocx
Details Url 1
http://borgelin.org/belzebub/okwrwz1c/","..\hvxda.ocx
Details Url 1
http://loa-hk.com/wp-content/ffbag/","..\hvxda.ocx
Details Url 1
https://lopespublicidade.com/cgi-bin/e5r5og4ieaqnxqrzdh
Details Url 1
https://bosny.com/aspnet_client/rnmp0ofr
Details Url 1
http://seasidesolutions.com/cgi-bin/wloo6sezycj3ltlc
Details Url 1
http://borgelin.org/belzebub/okwrwz1c
Details Url 1
http://loa-hk.com/wp-content/ffbag
Details Url 1
https://103.133.214.242
Details Url 1
https://103.133.214.242:8080
Details Url 1
https://103.41.204.169
Details Url 1
https://103.41.204.169:8080
Details Url 1
https://103.42.58.120
Details Url 1
https://103.42.58.120:7080
Details Url 1
https://103.56.149.105
Details Url 1
https://103.56.149.105:8080
Details Url 1
https://103.8.26.17
Details Url 1
https://103.8.26.17:8080
Details Url 1
https://104.248.225.227
Details Url 1
https://104.248.225.227:8080
Details Url 1
https://110.235.83.107
Details Url 1
https://110.235.83.107:7080
Details Url 1
https://116.124.128.206
Details Url 1
https://116.124.128.206:8080
Details Url 1
https://118.98.72.86
Details Url 1
https://134.122.119.23
Details Url 1
https://134.122.119.23:8080
Details Url 1
https://139.196.72.155:8080
Details Url 1
https://159.69.237.188
Details Url 1
https://175.126.176.79
Details Url 1
https://175.126.176.79:8080
Details Url 1
https://178.62.112.199
Details Url 1
https://178.62.112.199:8080
Details Url 1
https://185.148.168.220
Details Url 1
https://185.148.168.220:8080
Details Url 1
https://188.225.32.231
Details Url 1
https://188.225.32.231:4143
Details Url 1
https://190.90.233.66
Details Url 1
https://194.9.172.107
Details Url 1
https://194.9.172.107:8080
Details Url 1
https://195.154.146.35
Details Url 1
https://195.77.239.39
Details Url 2
https://195.77.239.39:8080
Details Url 1
https://196.44.98.190
Details Url 2
https://196.44.98.190:8080
Details Url 1
https://202.134.4.210
Details Url 1
https://202.134.4.210:7080
Details Url 1
https://202.28.34.99
Details Url 1
https://202.28.34.99:8080
Details Url 1
https://202.29.239.162
Details Url 1
https://203.153.216.46
Details Url 1
https://207.148.81.119
Details Url 2
https://207.148.81.119:8080
Details Url 1
https://210.57.209.142
Details Url 1
https://210.57.209.142:8080
Details Url 1
https://217.182.143.207
Details Url 1
https://36.67.23.59
Details Url 1
https://37.44.244.177
Details Url 2
https://37.44.244.177:8080
Details Url 1
https://37.59.209.141
Details Url 2
https://37.59.209.141:8080
Details Url 1
https://45.71.195.104:8080
Details Url 1
https://5.56.132.177:8080
Details Url 1
https://51.68.141.164:8080
Details Url 1
https://54.37.106.167:8080
Details Url 1
https://54.37.228.122
Details Url 1
https://54.38.143.246
Details Url 1
https://54.38.143.246:7080
Details Url 1
https://54.38.242.185
Details Url 1
https://59.148.253.194
Details Url 1
https://62.171.178.147:8080
Details Url 1
https://66.42.57.149
Details Url 1
https://68.183.91.111
Details Url 1
https://68.183.91.111:8080
Details Url 1
https://68.183.93.250
Details Url 1
https://78.46.73.125
Details Url 1
https://78.47.204.80
Details Url 1
https://85.214.67.203
Details Url 2
https://85.214.67.203:8080
Details Url 1
https://85.25.120.45
Details Url 1
https://85.25.120.45:8080
Details Url 1
https://87.106.97.83
Details Url 1
https://87.106.97.83:7080
Details Url 1
https://88.217.172.165
Details Url 1
https://88.217.172.165:8080
Details Url 1
https://93.104.209.107
Details Url 1
https://93.104.209.107:8080
Details Url 1
http://59.95.98.204:8080/jquery-3.3.1.min.js
Details Url 15
https://thedfirreport.com
Details Yara rule 1
import "pe"

rule UOmCgbXygCe_14335 {
	meta:
		description = "UOmCgbXygCe.exe"
		author = "The DFIR Report"
		reference = "https://thedfirreport.com"
		date = "2022-09-12"
		hash1 = "f4c085ef1ba7e78a17a9185e4d5e06163fe0e39b6b0dc3088b4c1ed11c0d726b"
	strings:
		$s1 = "runsuite.log" ascii fullword
		$s2 = "AppPolicyGetProcessTerminationMethod" ascii fullword
		$s3 = "f73.exe" ascii fullword
		$s4 = "Processing test line %ld %s leaked %d" ascii fullword
		$s5 = "Internal error: xmlSchemaTypeFixup, complex type '%s': the <simpleContent><restriction> is missing a <simpleType> child, but was"
		$s6 = "The target namespace of the included/redefined schema '%s' has to be absent or the same as the including/redefining schema's tar"
		$s7 = "The target namespace of the included/redefined schema '%s' has to be absent, since the including/redefining schema has no target"
		$s8 = "A <simpleType> is expected among the children of <restriction>, if <simpleContent> is used and the base type '%s' is a complex t"
		$s9 = "there is at least one entity reference in the node-tree currently being validated. Processing of entities with this XML Schema p"
		$s10 = "## %s test suite for Schemas version %s" ascii fullword
		$s11 = "Internal error: %s, " ascii fullword
		$s12 = "If <simpleContent> and <restriction> is used, the base type must be a simple type or a complex type with mixed content and parti"
		$s13 = "For a string to be a valid default, the type definition must be a simple type or a complex type with simple content or mixed con"
		$s14 = "For a string to be a valid default, the type definition must be a simple type or a complex type with mixed content and a particl"
		$s15 = "Could not open the log file, running in verbose mode" ascii fullword
		$s16 = "not validating will not read content for PE entity %s" ascii fullword
		$s17 = "Skipping import of schema located at '%s' for the namespace '%s', since this namespace was already imported with the schema loca"
		$s18 = "(annotation?, (simpleContent | complexContent | ((group | all | choice | sequence)?, ((attribute | attributeGroup)*, anyAttribut"
		$s19 = "get namespace" ascii fullword
		$s20 = "instance %s fails to parse" ascii fullword
	condition:
		uint16(0) == 0x5a4d and filesize < 7000KB and (pe.imphash() == "bcf185f1308ffd9e4249849d206d9d0c" and pe.exports("xmlEscapeFormatString") or 12 of them)
}
Details Yara rule 1
rule info_1805_14335 {
	meta:
		description = "info_1805.xls"
		author = "The DFIR Report"
		reference = "https://thedfirreport.com"
		date = "2022-09-12"
		hash1 = "e598b9700e13f2cb1c30c6d9230152ed5716a6d6e25db702576fefeb6638005e"
	strings:
		$s1 = "32.exe" ascii fullword
		$s2 = "System32\\X" ascii fullword
		$s3 = "DocumentOwnerPassword" wide fullword
		$s4 = "DocumentUserPassword" wide fullword
		$s5 = "t\"&\"t\"&\"p\"&\"s:\"&\"//lo\"&\"pe\"&\"sp\"&\"ub\"&\"li\"&\"ci\"&\"da\"&\"de.c\"&\"o\"&\"m/cgi-bin/e\"&\"5R\"&\"5o\"&\"G4\"&\""
		$s6 = "UniresDLL" ascii fullword
		$s7 = "OEOGAJPGJPAG" ascii fullword
		$s8 = "\\Windows\\" ascii fullword
		$s9 = "_-* #,##0.00_-;\\-* #,##0.00_-;_-* \"-\"??_-; [email protected] _-" ascii fullword
		$s10 = "_-* #,##0_-;\\-* #,##0_-;_-* \"-\"_-; [email protected] _-" ascii fullword
		$s11 = "_-;_-* \"" ascii fullword
		$s12 = "^{)P -z)" ascii fullword
		$s13 = "ResOption1" ascii fullword
		$s14 = "DocumentSummaryInformation" wide fullword
		$s15 = "Root Entry" wide fullword
		$s16 = "SummaryInformation" wide fullword
		$s17 = "A\",\"JJCCBB\"" ascii fullword
		$s18 = "Excel 4.0" ascii fullword
		$s19 = "Microsoft Print to PDF" wide fullword
		$s20 = "\"_-;\\-* #,##0.00\\ \"" wide fullword
	condition:
		uint16(0) == 0xcfd0 and filesize < 200KB and all of them
}
Details Yara rule 1
import "pe"

rule cobalt_strike_14435_dll_1 {
	meta:
		description = "1.dll"
		author = "The DFIR Report"
		reference = "https://thedfirreport.com"
		date = "2022-09-12"
		hash1 = "1b9c9e4ed6dab822b36e3716b1e8f046e92546554dff9bdbd18c822e18ab226b"
	strings:
		$s1 = "curity><requestedPrivileges><requestedExecutionLevel level=\"asInvoker\" uiAccess=\"false\"></requestedExecutionLevel></requeste"
		$s2 = "CDNS Project.dll" ascii fullword
		$s3 = "hemas.microsoft.com/SMI/2005/WindowsSettings\">true</dpiAware></windowsSettings></application></assembly>" ascii fullword
		$s4 = "Hostname to lookup:" wide fullword
		$s5 = "Hostnames:" wide fullword
		$s6 = "wOshV- D3\" [email protected] \\" ascii fullword
		$s7 = "T4jk{zrvG#@KRO* d'z" ascii fullword
		$s8 = "CDNS Project Version 1.0" wide fullword
		$s9 = "zK$%S.cPO>rtW" ascii fullword
		$s10 = "vOsh.HSDiXRI" ascii fullword
		$s11 = "l4p.oZewOsh7zP" ascii fullword
		$s12 = "5p2o.ewOsh7H" ascii fullword
		$s13 = "h7H.DiX" ascii fullword
		$s14 = "l4pWo.ewOsh[H%DiXRI" ascii fullword
		$s15 = "rEWS).lpp~o" ascii fullword
		$s16 = ",m}_lOG" ascii fullword
		$s17 = "<assembly xmlns=\"urn:schemas-microsoft-com:asm.v1\" manifestVersion=\"1.0\"><trustInfo xmlns=\"urn:schemas-microsoft-com:asm.v3"
		$s18 = "vileges></security></trustInfo><application xmlns=\"urn:schemas-microsoft-com:asm.v3\"><windowsSettings><dpiAware xmlns=\"http:/"
		$s19 = "tn9- 2" ascii fullword
		$s20 = "PDiXRI7" ascii fullword
	condition:
		uint16(0) == 0x5a4d and filesize < 8000KB and (pe.imphash() == "d1aef4e37a548a43a95d44bd2f8c0afc" or 8 of them)
}
Details Yara rule 1
import "pe"

rule cobalt_strike_14435_dll_2 {
	meta:
		description = "32.dll"
		author = "The DFIR Report"
		reference = "https://thedfirreport.com"
		date = "2022-09-12"
		hash1 = "76bfb4a73dc0d3f382d3877a83ce62b50828f713744659bb21c30569d368caf8"
	strings:
		$x1 = "mail glide drooping dismiss collation production mm refresh murderer start parade subscription accident retorted carter stalls r"
		$s2 = "vlu405yd87.dll" ascii fullword
		$s3 = "XYVZSWWVU" ascii fullword
		$s4 = "ZYWVWSXVT" ascii fullword
		$s5 = "WXVZTVVUVX" ascii fullword
		$s6 = "ZYXZXSWZW" ascii fullword
		$s7 = "SZWVSZTVU" ascii fullword
		$s8 = "VXVWUWVZYY" ascii fullword
		$s9 = "VSXZZYSVU" ascii fullword
		$s10 = "VXUZUVWVU" ascii fullword
		$s11 = "SVVZZXZUVW" ascii fullword
		$s12 = "USVZVSWVZ" ascii fullword
		$s13 = "SWVVTVSVWWXZZVVV" ascii fullword
		$s14 = "VSXVUXXZS" ascii fullword
		$s15 = "WSVZYWZWWW" ascii fullword
		$s16 = "XUSZXXVVW" ascii fullword
		$s17 = "ZWZWZVZWWWZ" ascii fullword
		$s18 = "STZVYVVZYS" ascii fullword
		$s19 = "ZWZWYSZXUZ" ascii fullword
		$s20 = "SVVWWVVVWW" ascii fullword
	condition:
		uint16(0) == 0x5a4d and filesize < 2000KB and (pe.imphash() == "4e03b8b675969416fb0d10e8ab11f7c2" or (1 of ($x*) or 12 of them))
}
Details Yara rule 1
rule find_bat_14335 {
	meta:
		description = "Find.bat using AdFind"
		author = "The DFIR Report"
		reference = "https://thedfirreport.com"
		date = "2022-09-12"
		hash1 = "5bc00ad792d4ddac7d8568f98a717caff9d5ef389ed355a15b892cc10ab2887b"
	strings:
		$x1 = "find.exe" ascii wide nocase
		$s1 = "objectcategory" ascii wide nocase
		$s2 = "person" ascii wide nocase
		$s3 = "computer" ascii wide nocase
		$s4 = "organizationalUnit" ascii wide nocase
		$s5 = "trustdmp" ascii wide nocase
	condition:
		filesize < 1000 and 1 of ($x*) and 4 of ($s*)
}
Details Yara rule 1
rule adfind_14335 {
	meta:
		description = "Find.bat using AdFind"
		author = "The DFIR Report"
		reference = "https://thedfirreport.com"
		date = "2022-09-12"
		hash1 = "b1102ed4bca6dae6f2f498ade2f73f76af527fa803f0e0b46e100d4cf5150682"
	strings:
		$x1 = "joeware.net" ascii wide nocase
		$s1 = "xx.cpp" ascii wide nocase
		$s2 = "xxtype.cpp" ascii wide nocase
		$s3 = "Joe Richards" ascii wide nocase
		$s4 = "RFC 2253" ascii wide nocase
		$s5 = "RFC 2254" ascii wide nocase
	condition:
		uint16(0) == 0x5a4d and filesize < 2000KB and 1 of ($x*) or 4 of ($s*)
}
Details Yara rule 1
rule p_bat_14335 {
	meta:
		description = "Finding bat files that is used for enumeration"
		author = "The DFIR Report"
		reference = "https://thedfirreport.com"
		date = "2022-09-12"
	strings:
		$a1 = "for /f %%i in" ascii wide nocase
		$a2 = "do ping %%i" ascii wide nocase
		$a3 = "-n 1 >>" ascii wide nocase
		$a4 = "res.txt" ascii wide nocase
	condition:
		filesize < 2000KB and all of ($a*)
}