Malware Analysis Report

2025-01-18 04:56

Sample ID 220414-qvrytsaghl
Target 31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941
SHA256 31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941
Tags
masslogger collection spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941

Threat Level: Known bad

The file 31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941 was found to be: Known bad.

Malicious Activity Summary

masslogger collection spyware stealer

MassLogger

MassLogger Main Payload

Reads user/profile data of web browsers

Checks computer location settings

Looks up external IP address via web service

Accesses Microsoft Outlook profiles

Suspicious use of SetThreadContext

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Suspicious behavior: AddClipboardFormatListener

Suspicious behavior: EnumeratesProcesses

outlook_office_path

Suspicious use of SetWindowsHookEx

outlook_win_path

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-04-14 13:35

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-04-14 13:35

Reported

2022-04-14 14:54

Platform

win7-20220414-en

Max time kernel

9s

Max time network

47s

Command Line

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

Signatures

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1312 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 908 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 908 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 908 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 908 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 964 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 964 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 964 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 964 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 948 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 948 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 948 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 948 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1836 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1836 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1836 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1836 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1660 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1660 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1660 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1660 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1332 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1332 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1332 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1332 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1360 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1360 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1360 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1360 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 860 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 860 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 860 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 860 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 668 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 668 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 668 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 668 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1908 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1908 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1908 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1908 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1336 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1336 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1336 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1336 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1400 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1400 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1400 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1400 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1044 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1044 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1044 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1044 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1312 wrote to memory of 1640 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

Processes

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

Network

N/A

Files

memory/1312-54-0x0000000000160000-0x0000000000436000-memory.dmp

memory/1312-55-0x0000000075AE1000-0x0000000075AE3000-memory.dmp

memory/1312-56-0x00000000049F0000-0x0000000004A88000-memory.dmp

memory/1312-57-0x0000000002120000-0x000000000213C000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-04-14 13:35

Reported

2022-04-14 14:53

Platform

win10v2004-en-20220113

Max time kernel

134s

Max time network

140s

Command Line

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

Signatures

MassLogger

stealer spyware masslogger

MassLogger Main Payload

Description Indicator Process Target
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A

Reads user/profile data of web browsers

spyware stealer

Accesses Microsoft Outlook profiles

collection
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.ipify.org N/A N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1672 wrote to memory of 4072 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1672 wrote to memory of 4072 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1672 wrote to memory of 4072 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1672 wrote to memory of 4072 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1672 wrote to memory of 4072 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1672 wrote to memory of 4072 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1672 wrote to memory of 4072 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 1672 wrote to memory of 4072 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe
PID 4072 wrote to memory of 4036 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4072 wrote to memory of 4036 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4072 wrote to memory of 4036 N/A C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

outlook_office_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A

outlook_win_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe

"C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"powershell" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe'

Network

Country Destination Domain Proto
US 20.189.173.11:443 tcp
US 8.8.8.8:53 api.ipify.org udp
US 3.232.242.170:80 api.ipify.org tcp

Files

memory/1672-130-0x0000000000910000-0x0000000000BE6000-memory.dmp

memory/1672-131-0x0000000005B10000-0x00000000060B4000-memory.dmp

memory/1672-132-0x0000000005600000-0x0000000005692000-memory.dmp

memory/1672-133-0x00000000055A0000-0x00000000055AA000-memory.dmp

memory/1672-134-0x0000000007CA0000-0x0000000007D06000-memory.dmp

memory/4072-135-0x0000000000000000-mapping.dmp

memory/4072-136-0x0000000000400000-0x0000000000486000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\31053ec6498b7615703f08f5eb91b2900b92ae0d642f85a150641ebed8901941.exe.log

MD5 6dd2b2e332f641268ade3fbee81828a0
SHA1 fbb9ba6b2d8644acc81d1813df8394eb16935058
SHA256 4005814778c17ce5bb518ba97a0e3a7547e9fd54c736b45b145d51ae38e34f46
SHA512 30d7ef784b86b5184fd5d851bd3725325ffef723815107008b159b43b3e40fbbfc00f5ce071113aaa11334d5878e86da0bd4bef5d3d403622da4028311d1884f

memory/4036-138-0x0000000000000000-mapping.dmp

memory/4072-139-0x0000000007180000-0x00000000071D0000-memory.dmp

memory/4036-140-0x00000000029A0000-0x00000000029D6000-memory.dmp

memory/4072-142-0x00000000056E3000-0x00000000056E5000-memory.dmp

memory/4072-141-0x0000000007AF0000-0x0000000007B8C000-memory.dmp

memory/4036-143-0x00000000053C0000-0x00000000059E8000-memory.dmp

memory/4036-144-0x0000000005A30000-0x0000000005A52000-memory.dmp

memory/4036-145-0x0000000005AD0000-0x0000000005B36000-memory.dmp

memory/4036-146-0x0000000006350000-0x000000000636E000-memory.dmp

memory/4036-147-0x00000000029E5000-0x00000000029E7000-memory.dmp

memory/4036-148-0x0000000007550000-0x0000000007582000-memory.dmp

memory/4036-149-0x0000000070200000-0x000000007024C000-memory.dmp

memory/4036-150-0x00000000068F0000-0x000000000690E000-memory.dmp

memory/4036-151-0x0000000007CC0000-0x000000000833A000-memory.dmp

memory/4036-152-0x0000000007660000-0x000000000767A000-memory.dmp

memory/4036-153-0x00000000076D0000-0x00000000076DA000-memory.dmp

memory/4036-154-0x00000000078D0000-0x0000000007966000-memory.dmp

memory/4036-155-0x0000000007880000-0x000000000788E000-memory.dmp

memory/4036-156-0x0000000007990000-0x00000000079AA000-memory.dmp

memory/4036-157-0x0000000007970000-0x0000000007978000-memory.dmp