Malware Analysis Report

2024-10-23 21:33

Sample ID 220521-cbfvkagfbm
Target ef3a705d92f5919949be18024d4ff6f88a4717b707bdf598fb0cac25dc7ab49c
SHA256 ef3a705d92f5919949be18024d4ff6f88a4717b707bdf598fb0cac25dc7ab49c
Tags
masslogger collection ransomware spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

ef3a705d92f5919949be18024d4ff6f88a4717b707bdf598fb0cac25dc7ab49c

Threat Level: Known bad

The file ef3a705d92f5919949be18024d4ff6f88a4717b707bdf598fb0cac25dc7ab49c was found to be: Known bad.

Malicious Activity Summary

masslogger collection ransomware spyware stealer

MassLogger Main Payload

MassLogger

MassLogger log file

Checks computer location settings

Reads user/profile data of web browsers

Accesses Microsoft Outlook profiles

Looks up external IP address via web service

Suspicious use of SetThreadContext

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

outlook_office_path

Creates scheduled task(s)

outlook_win_path

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-05-21 01:53

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-05-21 01:53

Reported

2022-05-21 02:52

Platform

win7-20220414-en

Max time kernel

119s

Max time network

197s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe"

Signatures

MassLogger

stealer spyware masslogger

MassLogger Main Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

MassLogger log file

Description Indicator Process Target
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A

Reads user/profile data of web browsers

spyware stealer

Accesses Microsoft Outlook profiles

collection
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.ipify.org N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 624 set thread context of 1496 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 624 wrote to memory of 1776 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Windows\SysWOW64\schtasks.exe
PID 624 wrote to memory of 1776 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Windows\SysWOW64\schtasks.exe
PID 624 wrote to memory of 1776 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Windows\SysWOW64\schtasks.exe
PID 624 wrote to memory of 1776 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Windows\SysWOW64\schtasks.exe
PID 624 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe
PID 624 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe
PID 624 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe
PID 624 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe
PID 624 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe
PID 624 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe
PID 624 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe
PID 624 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe
PID 624 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe

outlook_office_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A

outlook_win_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe

"C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IRPLvFRsiE" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB6C2.tmp"

C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe

"{path}"

Network

Country Destination Domain Proto
US 8.8.8.8:53 api.ipify.org udp
US 52.20.78.240:80 api.ipify.org tcp

Files

memory/624-54-0x0000000001310000-0x0000000001410000-memory.dmp

memory/624-55-0x0000000000420000-0x0000000000430000-memory.dmp

memory/624-56-0x0000000005300000-0x00000000053AC000-memory.dmp

memory/624-57-0x00000000054B0000-0x0000000005568000-memory.dmp

memory/1776-58-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\tmpB6C2.tmp

MD5 21b5a1799b1ed3844210b47f426ee2f2
SHA1 e9fe1059be5dab98b3b94603aa31c309169215f1
SHA256 ff1d057a164ee530f5401a9706df3030ae660244a90868bf222c6b233004bf89
SHA512 e347eb3400eff137a7c5fd7161c1300387c605242e804ee09031cbfece35f916698ad0318f6bccda34d97039051942f1d89c616f586b68d55be042885a93abe6

memory/1496-60-0x0000000000400000-0x00000000004B8000-memory.dmp

memory/1496-61-0x0000000000400000-0x00000000004B8000-memory.dmp

memory/1496-63-0x0000000000400000-0x00000000004B8000-memory.dmp

memory/1496-65-0x0000000000400000-0x00000000004B8000-memory.dmp

memory/1496-64-0x0000000000400000-0x00000000004B8000-memory.dmp

memory/1496-66-0x00000000004B2EDE-mapping.dmp

memory/1496-68-0x0000000000400000-0x00000000004B8000-memory.dmp

memory/1496-70-0x0000000000400000-0x00000000004B8000-memory.dmp

memory/1496-71-0x0000000000DE0000-0x0000000000E58000-memory.dmp

memory/1496-72-0x0000000075801000-0x0000000075803000-memory.dmp

memory/1496-73-0x0000000000AE5000-0x0000000000AF6000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-05-21 01:53

Reported

2022-05-21 02:51

Platform

win10v2004-20220414-en

Max time kernel

102s

Max time network

182s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe"

Signatures

MassLogger

stealer spyware masslogger

MassLogger Main Payload

Description Indicator Process Target
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2396 set thread context of 3588 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2396 wrote to memory of 4452 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Windows\SysWOW64\schtasks.exe
PID 2396 wrote to memory of 4452 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Windows\SysWOW64\schtasks.exe
PID 2396 wrote to memory of 4452 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Windows\SysWOW64\schtasks.exe
PID 2396 wrote to memory of 3588 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe
PID 2396 wrote to memory of 3588 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe
PID 2396 wrote to memory of 3588 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe
PID 2396 wrote to memory of 3588 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe
PID 2396 wrote to memory of 3588 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe
PID 2396 wrote to memory of 3588 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe
PID 2396 wrote to memory of 3588 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe
PID 2396 wrote to memory of 3588 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe
PID 3588 wrote to memory of 408 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Windows\SysWOW64\cmd.exe
PID 3588 wrote to memory of 408 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Windows\SysWOW64\cmd.exe
PID 3588 wrote to memory of 408 N/A C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe C:\Windows\SysWOW64\cmd.exe
PID 408 wrote to memory of 212 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 408 wrote to memory of 212 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 408 wrote to memory of 212 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

Processes

C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe

"C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IRPLvFRsiE" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC331.tmp"

C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe

"{path}"

C:\Windows\SysWOW64\cmd.exe

"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe' & exit

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\ZZW00008112020ZD1_DPILpdf.exe'

Network

Country Destination Domain Proto
US 20.189.173.6:443 tcp
US 52.152.108.96:443 tcp
CH 173.222.108.226:80 tcp
US 204.79.197.203:80 tcp
US 8.8.8.8:53 97.97.242.52.in-addr.arpa udp
NL 104.97.14.80:80 tcp
US 8.8.8.8:53 9.9.0.0.0.0.0.0.0.0.0.0.0.0.0.0.3.0.0.0.3.0.4.0.0.3.0.1.3.0.6.2.ip6.arpa udp

Files

memory/2396-130-0x0000000000F30000-0x0000000001030000-memory.dmp

memory/2396-131-0x0000000005A80000-0x0000000005B12000-memory.dmp

memory/2396-132-0x000000000C2A0000-0x000000000C33C000-memory.dmp

memory/4452-133-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\tmpC331.tmp

MD5 e296019d415125fed261d887f3e94173
SHA1 fc2e3246eb08fb9bfb70eb0fc122863d9100baa7
SHA256 643c642ece4482b136fc6c9e9b3218dbba700f2006f545e40e4f40e99a71a52b
SHA512 bb127fcb7e43366ed99912444414aa4ba9dc6761c95daae298150d79ef8bc56e7559c58ea110a5b7c29d38d9c260a36ed6026eabbe0d63b5e0e4faff8c700f8a

memory/3588-135-0x0000000000000000-mapping.dmp

memory/3588-136-0x0000000000400000-0x00000000004B8000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ZZW00008112020ZD1_DPILpdf.exe.log

MD5 be13ac3b65841ec3eedbd017b51c53b0
SHA1 c07874d283990055034a448f0dffc005586b791e
SHA256 e82d6ad0571bd9377d067f29c5c088cd8b5de2770dc240d69178a149488a6426
SHA512 8a0bcd002790d0ab8a458c37499552825cdc5f7c5ae3b18f8dc0f0b1fc076a3cf768cffd10116df37181d6d690a15c031f40ae15f668883b3ac26072151bac47

memory/3588-138-0x0000000005A30000-0x0000000005FD4000-memory.dmp

memory/3588-139-0x00000000056B0000-0x0000000005716000-memory.dmp

memory/408-140-0x0000000000000000-mapping.dmp

memory/212-141-0x0000000000000000-mapping.dmp

memory/212-142-0x0000000002670000-0x00000000026A6000-memory.dmp

memory/212-143-0x00000000052F0000-0x0000000005918000-memory.dmp

memory/212-144-0x00000000051D0000-0x00000000051F2000-memory.dmp

memory/212-145-0x0000000005270000-0x00000000052D6000-memory.dmp

memory/212-146-0x0000000005FA0000-0x0000000005FBE000-memory.dmp

memory/212-147-0x0000000007610000-0x0000000007C8A000-memory.dmp

memory/212-148-0x00000000064A0000-0x00000000064BA000-memory.dmp

memory/212-149-0x0000000007230000-0x00000000072C6000-memory.dmp

memory/212-150-0x0000000006570000-0x0000000006592000-memory.dmp