Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
10-01-2022 03:47
Static task
static1
Behavioral task
behavioral1
Sample
0d56d229c20cb6f4959c2fce066f4d87b06c76bb45a55f308c0af1875e53623c.exe
Resource
win10-en-20211208
General
-
Target
0d56d229c20cb6f4959c2fce066f4d87b06c76bb45a55f308c0af1875e53623c.exe
-
Size
296KB
-
MD5
b0b3719583f4f61e5975a58df278f10c
-
SHA1
d2bf8c16ee4c454ccb30b227f8880970ac3fb6fe
-
SHA256
0d56d229c20cb6f4959c2fce066f4d87b06c76bb45a55f308c0af1875e53623c
-
SHA512
4a9521c2b07480520658b621fd4e037c4fa8a5b62a528239af78cd5c599be6ea9b2e2cdca4ced0a9dbb54a78ab06cf84c2c9af4e5e6569e38bd7b625a8b67982
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
tofsee
patmushta.info
parubey.info
Extracted
raccoon
1.8.4-hotfixs
Signatures
-
Panda Stealer Payload 3 IoCs
resource yara_rule behavioral1/memory/3508-212-0x0000000000B00000-0x0000000000C0F000-memory.dmp family_pandastealer behavioral1/memory/3508-215-0x0000000000B00000-0x0000000000C0F000-memory.dmp family_pandastealer behavioral1/memory/3508-216-0x0000000000B00000-0x0000000000C0F000-memory.dmp family_pandastealer -
PandaStealer
Panda Stealer is a fork of CollectorProject Stealer written in C++.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
description pid Process procid_target PID 3444 created 3040 3444 WerFault.exe 93 -
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
-
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Arkei Stealer Payload 5 IoCs
resource yara_rule behavioral1/memory/3412-137-0x0000000000400000-0x0000000002B86000-memory.dmp family_arkei behavioral1/memory/1232-194-0x0000000000170000-0x000000000052F000-memory.dmp family_arkei behavioral1/memory/1232-195-0x0000000000170000-0x000000000052F000-memory.dmp family_arkei behavioral1/memory/1232-197-0x0000000000170000-0x000000000052F000-memory.dmp family_arkei behavioral1/memory/1232-196-0x0000000000170000-0x000000000052F000-memory.dmp family_arkei -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
pid Process 4088 7D69.exe 3412 8431.exe 656 877D.exe 3444 8C80.exe 2216 ohbnxtih.exe 1348 8C80.exe 1232 E733.exe 3040 F02D.exe 3508 A6D.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion E733.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion E733.exe -
Deletes itself 1 IoCs
pid Process 3064 Process not Found -
Loads dropped DLL 3 IoCs
pid Process 1232 E733.exe 1232 E733.exe 1232 E733.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA E733.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 1232 E733.exe 1232 E733.exe 3508 A6D.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2712 set thread context of 3188 2712 0d56d229c20cb6f4959c2fce066f4d87b06c76bb45a55f308c0af1875e53623c.exe 69 PID 2216 set thread context of 1964 2216 ohbnxtih.exe 88 PID 3444 set thread context of 1348 3444 8C80.exe 85 -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3444 3040 WerFault.exe 93 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0d56d229c20cb6f4959c2fce066f4d87b06c76bb45a55f308c0af1875e53623c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0d56d229c20cb6f4959c2fce066f4d87b06c76bb45a55f308c0af1875e53623c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7D69.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7D69.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7D69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0d56d229c20cb6f4959c2fce066f4d87b06c76bb45a55f308c0af1875e53623c.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 E733.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString E733.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3352 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3188 0d56d229c20cb6f4959c2fce066f4d87b06c76bb45a55f308c0af1875e53623c.exe 3188 0d56d229c20cb6f4959c2fce066f4d87b06c76bb45a55f308c0af1875e53623c.exe 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3064 Process not Found -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3188 0d56d229c20cb6f4959c2fce066f4d87b06c76bb45a55f308c0af1875e53623c.exe 4088 7D69.exe 3064 Process not Found 3064 Process not Found 3064 Process not Found 3064 Process not Found -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 3444 8C80.exe Token: SeShutdownPrivilege 3064 Process not Found Token: SeCreatePagefilePrivilege 3064 Process not Found Token: SeShutdownPrivilege 3064 Process not Found Token: SeCreatePagefilePrivilege 3064 Process not Found Token: SeShutdownPrivilege 3064 Process not Found Token: SeCreatePagefilePrivilege 3064 Process not Found Token: SeShutdownPrivilege 3064 Process not Found Token: SeCreatePagefilePrivilege 3064 Process not Found Token: SeShutdownPrivilege 3064 Process not Found Token: SeCreatePagefilePrivilege 3064 Process not Found Token: SeShutdownPrivilege 3064 Process not Found Token: SeCreatePagefilePrivilege 3064 Process not Found Token: SeShutdownPrivilege 3064 Process not Found Token: SeCreatePagefilePrivilege 3064 Process not Found Token: SeShutdownPrivilege 3064 Process not Found Token: SeCreatePagefilePrivilege 3064 Process not Found Token: SeDebugPrivilege 1348 8C80.exe Token: SeShutdownPrivilege 3064 Process not Found Token: SeCreatePagefilePrivilege 3064 Process not Found Token: SeShutdownPrivilege 3064 Process not Found Token: SeCreatePagefilePrivilege 3064 Process not Found Token: SeShutdownPrivilege 3064 Process not Found Token: SeCreatePagefilePrivilege 3064 Process not Found Token: SeShutdownPrivilege 3064 Process not Found Token: SeCreatePagefilePrivilege 3064 Process not Found Token: SeShutdownPrivilege 3064 Process not Found Token: SeCreatePagefilePrivilege 3064 Process not Found Token: SeShutdownPrivilege 3064 Process not Found Token: SeCreatePagefilePrivilege 3064 Process not Found Token: SeShutdownPrivilege 3064 Process not Found Token: SeCreatePagefilePrivilege 3064 Process not Found Token: SeShutdownPrivilege 3064 Process not Found Token: SeCreatePagefilePrivilege 3064 Process not Found Token: SeShutdownPrivilege 3064 Process not Found Token: SeCreatePagefilePrivilege 3064 Process not Found Token: SeRestorePrivilege 3444 WerFault.exe Token: SeBackupPrivilege 3444 WerFault.exe Token: SeDebugPrivilege 3444 WerFault.exe Token: SeShutdownPrivilege 3064 Process not Found Token: SeCreatePagefilePrivilege 3064 Process not Found Token: SeShutdownPrivilege 3064 Process not Found Token: SeCreatePagefilePrivilege 3064 Process not Found Token: SeShutdownPrivilege 3064 Process not Found Token: SeCreatePagefilePrivilege 3064 Process not Found Token: SeShutdownPrivilege 3064 Process not Found Token: SeCreatePagefilePrivilege 3064 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2712 wrote to memory of 3188 2712 0d56d229c20cb6f4959c2fce066f4d87b06c76bb45a55f308c0af1875e53623c.exe 69 PID 2712 wrote to memory of 3188 2712 0d56d229c20cb6f4959c2fce066f4d87b06c76bb45a55f308c0af1875e53623c.exe 69 PID 2712 wrote to memory of 3188 2712 0d56d229c20cb6f4959c2fce066f4d87b06c76bb45a55f308c0af1875e53623c.exe 69 PID 2712 wrote to memory of 3188 2712 0d56d229c20cb6f4959c2fce066f4d87b06c76bb45a55f308c0af1875e53623c.exe 69 PID 2712 wrote to memory of 3188 2712 0d56d229c20cb6f4959c2fce066f4d87b06c76bb45a55f308c0af1875e53623c.exe 69 PID 2712 wrote to memory of 3188 2712 0d56d229c20cb6f4959c2fce066f4d87b06c76bb45a55f308c0af1875e53623c.exe 69 PID 3064 wrote to memory of 4088 3064 Process not Found 70 PID 3064 wrote to memory of 4088 3064 Process not Found 70 PID 3064 wrote to memory of 4088 3064 Process not Found 70 PID 3064 wrote to memory of 3412 3064 Process not Found 71 PID 3064 wrote to memory of 3412 3064 Process not Found 71 PID 3064 wrote to memory of 3412 3064 Process not Found 71 PID 3064 wrote to memory of 656 3064 Process not Found 72 PID 3064 wrote to memory of 656 3064 Process not Found 72 PID 3064 wrote to memory of 656 3064 Process not Found 72 PID 3064 wrote to memory of 3444 3064 Process not Found 73 PID 3064 wrote to memory of 3444 3064 Process not Found 73 PID 3064 wrote to memory of 3444 3064 Process not Found 73 PID 656 wrote to memory of 392 656 877D.exe 74 PID 656 wrote to memory of 392 656 877D.exe 74 PID 656 wrote to memory of 392 656 877D.exe 74 PID 656 wrote to memory of 3744 656 877D.exe 76 PID 656 wrote to memory of 3744 656 877D.exe 76 PID 656 wrote to memory of 3744 656 877D.exe 76 PID 656 wrote to memory of 696 656 877D.exe 78 PID 656 wrote to memory of 696 656 877D.exe 78 PID 656 wrote to memory of 696 656 877D.exe 78 PID 656 wrote to memory of 760 656 877D.exe 80 PID 656 wrote to memory of 760 656 877D.exe 80 PID 656 wrote to memory of 760 656 877D.exe 80 PID 656 wrote to memory of 3112 656 877D.exe 82 PID 656 wrote to memory of 3112 656 877D.exe 82 PID 656 wrote to memory of 3112 656 877D.exe 82 PID 3444 wrote to memory of 1348 3444 8C80.exe 85 PID 3444 wrote to memory of 1348 3444 8C80.exe 85 PID 3444 wrote to memory of 1348 3444 8C80.exe 85 PID 656 wrote to memory of 1320 656 877D.exe 86 PID 656 wrote to memory of 1320 656 877D.exe 86 PID 656 wrote to memory of 1320 656 877D.exe 86 PID 2216 wrote to memory of 1964 2216 ohbnxtih.exe 88 PID 2216 wrote to memory of 1964 2216 ohbnxtih.exe 88 PID 2216 wrote to memory of 1964 2216 ohbnxtih.exe 88 PID 2216 wrote to memory of 1964 2216 ohbnxtih.exe 88 PID 2216 wrote to memory of 1964 2216 ohbnxtih.exe 88 PID 3444 wrote to memory of 1348 3444 8C80.exe 85 PID 3444 wrote to memory of 1348 3444 8C80.exe 85 PID 3444 wrote to memory of 1348 3444 8C80.exe 85 PID 3444 wrote to memory of 1348 3444 8C80.exe 85 PID 3444 wrote to memory of 1348 3444 8C80.exe 85 PID 3064 wrote to memory of 1232 3064 Process not Found 92 PID 3064 wrote to memory of 1232 3064 Process not Found 92 PID 3064 wrote to memory of 1232 3064 Process not Found 92 PID 3064 wrote to memory of 3040 3064 Process not Found 93 PID 3064 wrote to memory of 3040 3064 Process not Found 93 PID 3064 wrote to memory of 3040 3064 Process not Found 93 PID 3064 wrote to memory of 3508 3064 Process not Found 94 PID 3064 wrote to memory of 3508 3064 Process not Found 94 PID 3064 wrote to memory of 3508 3064 Process not Found 94 PID 1232 wrote to memory of 2712 1232 E733.exe 97 PID 1232 wrote to memory of 2712 1232 E733.exe 97 PID 1232 wrote to memory of 2712 1232 E733.exe 97 PID 3064 wrote to memory of 2768 3064 Process not Found 98 PID 3064 wrote to memory of 2768 3064 Process not Found 98 PID 3064 wrote to memory of 2768 3064 Process not Found 98 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d56d229c20cb6f4959c2fce066f4d87b06c76bb45a55f308c0af1875e53623c.exe"C:\Users\Admin\AppData\Local\Temp\0d56d229c20cb6f4959c2fce066f4d87b06c76bb45a55f308c0af1875e53623c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\0d56d229c20cb6f4959c2fce066f4d87b06c76bb45a55f308c0af1875e53623c.exe"C:\Users\Admin\AppData\Local\Temp\0d56d229c20cb6f4959c2fce066f4d87b06c76bb45a55f308c0af1875e53623c.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3188
-
-
C:\Users\Admin\AppData\Local\Temp\7D69.exeC:\Users\Admin\AppData\Local\Temp\7D69.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4088
-
C:\Users\Admin\AppData\Local\Temp\8431.exeC:\Users\Admin\AppData\Local\Temp\8431.exe1⤵
- Executes dropped EXE
PID:3412
-
C:\Users\Admin\AppData\Local\Temp\877D.exeC:\Users\Admin\AppData\Local\Temp\877D.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\wzgjzdtr\2⤵PID:392
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ohbnxtih.exe" C:\Windows\SysWOW64\wzgjzdtr\2⤵PID:3744
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create wzgjzdtr binPath= "C:\Windows\SysWOW64\wzgjzdtr\ohbnxtih.exe /d\"C:\Users\Admin\AppData\Local\Temp\877D.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:696
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description wzgjzdtr "wifi internet conection"2⤵PID:760
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start wzgjzdtr2⤵PID:3112
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:1320
-
-
C:\Users\Admin\AppData\Local\Temp\8C80.exeC:\Users\Admin\AppData\Local\Temp\8C80.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\8C80.exeC:\Users\Admin\AppData\Local\Temp\8C80.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
C:\Windows\SysWOW64\wzgjzdtr\ohbnxtih.exeC:\Windows\SysWOW64\wzgjzdtr\ohbnxtih.exe /d"C:\Users\Admin\AppData\Local\Temp\877D.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:1964
-
-
C:\Users\Admin\AppData\Local\Temp\E733.exeC:\Users\Admin\AppData\Local\Temp\E733.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\E733.exe" & exit2⤵PID:2712
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:3352
-
-
-
C:\Users\Admin\AppData\Local\Temp\F02D.exeC:\Users\Admin\AppData\Local\Temp\F02D.exe1⤵
- Executes dropped EXE
PID:3040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 9042⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3444
-
-
C:\Users\Admin\AppData\Local\Temp\A6D.exeC:\Users\Admin\AppData\Local\Temp\A6D.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3508
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:2768
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3284
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1New Service
1Registry Run Keys / Startup Folder
1Defense Evasion
Disabling Security Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1