Malware Analysis Report

2025-01-18 04:56

Sample ID 220414-qwjnvaahcr
Target 36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5
SHA256 36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5
Tags
persistence masslogger collection ransomware spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5

Threat Level: Known bad

The file 36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5 was found to be: Known bad.

Malicious Activity Summary

persistence masslogger collection ransomware spyware stealer

MassLogger log file

MassLogger Main Payload

MassLogger

Reads user/profile data of web browsers

Checks computer location settings

Adds Run key to start application

Looks up external IP address via web service

Accesses Microsoft Outlook profiles

Suspicious use of SetThreadContext

Suspicious use of SetWindowsHookEx

outlook_win_path

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: AddClipboardFormatListener

Suspicious use of AdjustPrivilegeToken

outlook_office_path

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-04-14 13:36

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-04-14 13:36

Reported

2022-04-14 14:58

Platform

win7-20220414-en

Max time kernel

82s

Max time network

43s

Command Line

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

Signatures

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\vlc = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\VideoLAN\\vlc.exe\"" C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1684 wrote to memory of 1680 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1680 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1680 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1680 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1220 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1220 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1220 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1220 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1276 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1276 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1276 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1276 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1652 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1652 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1652 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1652 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1704 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1704 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1704 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1704 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 2036 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 2036 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 2036 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 2036 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 2040 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 2040 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 2040 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 2040 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1156 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1156 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1156 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1156 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 828 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 828 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 828 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 828 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1760 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1760 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1760 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1760 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 2044 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 2044 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 2044 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 2044 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1012 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1012 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1012 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1012 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1772 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1772 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1772 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1772 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1840 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1840 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1840 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 1684 wrote to memory of 1840 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

Processes

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

Network

N/A

Files

memory/1684-54-0x00000000003C0000-0x00000000004D0000-memory.dmp

memory/1684-55-0x0000000004800000-0x0000000004888000-memory.dmp

memory/1684-56-0x00000000002D0000-0x00000000002EC000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-04-14 13:36

Reported

2022-04-14 14:56

Platform

win10v2004-20220310-en

Max time kernel

136s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

Signatures

MassLogger

stealer spyware masslogger

MassLogger Main Payload

Description Indicator Process Target
N/A N/A N/A N/A

MassLogger log file

Description Indicator Process Target
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A

Reads user/profile data of web browsers

spyware stealer

Accesses Microsoft Outlook profiles

collection
Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vlc = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\VideoLAN\\vlc.exe\"" C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.ipify.org N/A N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2152 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 2152 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 2152 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 2152 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 2152 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 2152 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 2152 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe
PID 2152 wrote to memory of 2160 N/A C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

outlook_office_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A

outlook_win_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe

"C:\Users\Admin\AppData\Local\Temp\36a36bbebd01219c26e104c52828a55b4f5cbde60e837f6cba6cabfbd737d6a5.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 api.ipify.org udp
US 54.91.59.199:80 api.ipify.org tcp
US 93.184.220.29:80 tcp

Files

memory/2152-134-0x0000000000360000-0x0000000000470000-memory.dmp

memory/2152-135-0x00000000054A0000-0x0000000005A44000-memory.dmp

memory/2152-136-0x0000000004DF0000-0x0000000004E66000-memory.dmp

memory/2152-137-0x0000000005180000-0x000000000519E000-memory.dmp

memory/2160-138-0x0000000000000000-mapping.dmp

memory/2160-139-0x0000000000400000-0x000000000049A000-memory.dmp

memory/2160-140-0x00000000051A0000-0x000000000523C000-memory.dmp

memory/2160-141-0x0000000005300000-0x0000000005366000-memory.dmp

memory/2160-142-0x0000000005DB0000-0x0000000005E42000-memory.dmp

memory/2160-143-0x0000000005243000-0x0000000005245000-memory.dmp

memory/2160-144-0x0000000007010000-0x000000000701A000-memory.dmp

memory/2160-145-0x0000000007810000-0x0000000007860000-memory.dmp