Analysis
-
max time kernel
106s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
15-04-2022 00:47
Static task
static1
Behavioral task
behavioral1
Sample
fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe
Resource
win10v2004-20220414-en
General
-
Target
fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe
-
Size
640KB
-
MD5
366e3c080ecfdf6882c6a40ed7ce2667
-
SHA1
54acfcce862f6a8313692623f3b6d4020b671edf
-
SHA256
fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4
-
SHA512
e4f0574b200facfe486484b1783096869ce52005659fcbd2557d9e830753597d320155baf4e5fa053a0da0f0aeba45220e6ff7e5d31c35ae9d5831cc5a0076b2
Malware Config
Extracted
Protocol: smtp- Host:
bh-58.webhostbox.net - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/940-134-0x0000000000510000-0x0000000000596000-memory.dmp family_masslogger -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exefc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
Processes:
fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exedescription pid process target process PID 1484 set thread context of 940 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2220 timeout.exe -
NTFS ADS 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe:Zone.Identifier cmd.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exepid process 940 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exefc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exepowershell.exepid process 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe 940 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe 940 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe 940 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe 940 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe 2060 powershell.exe 2060 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exefc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exepowershell.exedescription pid process Token: SeDebugPrivilege 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Token: SeDebugPrivilege 940 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe Token: SeDebugPrivilege 2060 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exepid process 940 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.execmd.execmd.exefc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exedescription pid process target process PID 1484 wrote to memory of 940 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe PID 1484 wrote to memory of 940 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe PID 1484 wrote to memory of 940 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe PID 1484 wrote to memory of 940 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe PID 1484 wrote to memory of 940 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe PID 1484 wrote to memory of 940 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe PID 1484 wrote to memory of 940 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe PID 1484 wrote to memory of 940 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe PID 1484 wrote to memory of 1636 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe cmd.exe PID 1484 wrote to memory of 1636 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe cmd.exe PID 1484 wrote to memory of 1636 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe cmd.exe PID 1484 wrote to memory of 2256 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe cmd.exe PID 1484 wrote to memory of 2256 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe cmd.exe PID 1484 wrote to memory of 2256 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe cmd.exe PID 2256 wrote to memory of 3304 2256 cmd.exe reg.exe PID 2256 wrote to memory of 3304 2256 cmd.exe reg.exe PID 2256 wrote to memory of 3304 2256 cmd.exe reg.exe PID 1484 wrote to memory of 3788 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe cmd.exe PID 1484 wrote to memory of 3788 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe cmd.exe PID 1484 wrote to memory of 3788 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe cmd.exe PID 1484 wrote to memory of 4992 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe cmd.exe PID 1484 wrote to memory of 4992 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe cmd.exe PID 1484 wrote to memory of 4992 1484 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe cmd.exe PID 4992 wrote to memory of 2220 4992 cmd.exe timeout.exe PID 4992 wrote to memory of 2220 4992 cmd.exe timeout.exe PID 4992 wrote to memory of 2220 4992 cmd.exe timeout.exe PID 940 wrote to memory of 2060 940 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe powershell.exe PID 940 wrote to memory of 2060 940 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe powershell.exe PID 940 wrote to memory of 2060 940 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe powershell.exe -
outlook_office_path 1 IoCs
Processes:
fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe -
outlook_win_path 1 IoCs
Processes:
fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe"C:\Users\Admin\AppData\Local\Temp\fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe"C:/Users/Admin/AppData/Local/Temp/fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:940 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4.exe" "%temp%\FolderN\name.exe" /Y2⤵PID:1636
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%temp%\FolderN\name.exe.lnk" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f3⤵PID:3304
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\FolderN\name.exe:Zone.Identifier2⤵
- NTFS ADS
PID:3788
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\timeout.exetimeout /t 3003⤵
- Delays execution with timeout.exe
PID:2220
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
640KB
MD5366e3c080ecfdf6882c6a40ed7ce2667
SHA154acfcce862f6a8313692623f3b6d4020b671edf
SHA256fc10ffaccc0a45c6c884dccd218af7afe3fefcccd8973f5aa50b23fba05d3ca4
SHA512e4f0574b200facfe486484b1783096869ce52005659fcbd2557d9e830753597d320155baf4e5fa053a0da0f0aeba45220e6ff7e5d31c35ae9d5831cc5a0076b2
-
Filesize
204B
MD5bfcbf382f036462e63f307ca4ae280c7
SHA1ffe98d15fa5ea205220d6bc105e317253a6ea003
SHA2562c3dd84c3ce3e529117e611d8caf4fc7f5a902840350f4ca524c251a2152c727
SHA5121b912652cc989541b396df5fd6bf207a4cf4ed891dc6e3223b8d0497c19a2589cb644c4c96ca01d882a7643f240c566966d84e46d77e9ad33e05214f8f553d16