Malware Analysis Report

2024-10-19 08:46

Sample ID 220521-d4w8paggh5
Target 04da986140a9a006f9d616b2a796d30b0a04048e78e1c8a66b57be87d99bf984
SHA256 04da986140a9a006f9d616b2a796d30b0a04048e78e1c8a66b57be87d99bf984
Tags
masslogger collection spyware stealer coreentity rezer0
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

04da986140a9a006f9d616b2a796d30b0a04048e78e1c8a66b57be87d99bf984

Threat Level: Known bad

The file 04da986140a9a006f9d616b2a796d30b0a04048e78e1c8a66b57be87d99bf984 was found to be: Known bad.

Malicious Activity Summary

masslogger collection spyware stealer coreentity rezer0

MassLogger log file

MassLogger Main Payload

CoreEntity .NET Packer

MassLogger

ReZer0 packer

Checks computer location settings

Reads user/profile data of web browsers

Accesses Microsoft Outlook profiles

Looks up external IP address via web service

Suspicious use of SetThreadContext

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Creates scheduled task(s)

Suspicious use of WriteProcessMemory

outlook_win_path

outlook_office_path

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: AddClipboardFormatListener

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-05-21 03:34

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2022-05-21 03:34

Reported

2022-05-21 05:20

Platform

win10v2004-20220414-en

Max time kernel

101s

Max time network

163s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe"

Signatures

MassLogger

stealer spyware masslogger

MassLogger Main Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

MassLogger log file

Description Indicator Process Target
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A

Reads user/profile data of web browsers

spyware stealer

Accesses Microsoft Outlook profiles

collection
Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.ipify.org N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 5092 set thread context of 4456 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 5092 wrote to memory of 656 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Windows\SysWOW64\schtasks.exe
PID 5092 wrote to memory of 656 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Windows\SysWOW64\schtasks.exe
PID 5092 wrote to memory of 656 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Windows\SysWOW64\schtasks.exe
PID 5092 wrote to memory of 4456 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe
PID 5092 wrote to memory of 4456 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe
PID 5092 wrote to memory of 4456 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe
PID 5092 wrote to memory of 4456 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe
PID 5092 wrote to memory of 4456 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe
PID 5092 wrote to memory of 4456 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe
PID 5092 wrote to memory of 4456 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe
PID 5092 wrote to memory of 4456 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe

outlook_office_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A

outlook_win_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe

"C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DNdDTmnIdpat" /XML "C:\Users\Admin\AppData\Local\Temp\tmp29A0.tmp"

C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe

"{path}"

Network

Country Destination Domain Proto
US 209.197.3.8:80 tcp
US 209.197.3.8:80 tcp
US 209.197.3.8:80 tcp
NL 104.110.191.133:80 tcp
NL 104.110.191.133:80 tcp
US 209.197.3.8:80 tcp
US 52.168.112.66:443 tcp
US 209.197.3.8:80 tcp
US 209.197.3.8:80 tcp
US 93.184.220.29:80 tcp
US 8.8.8.8:53 api.ipify.org udp
US 52.20.78.240:80 api.ipify.org tcp
US 8.8.8.8:53 smtp.privateemail.com udp
US 66.29.159.53:587 smtp.privateemail.com tcp
NL 2.17.222.14:80 tcp

Files

memory/5092-130-0x0000000000640000-0x000000000072A000-memory.dmp

memory/5092-131-0x0000000005680000-0x0000000005C24000-memory.dmp

memory/5092-132-0x00000000050D0000-0x0000000005162000-memory.dmp

memory/5092-133-0x0000000005270000-0x000000000527A000-memory.dmp

memory/5092-134-0x0000000008D20000-0x0000000008DBC000-memory.dmp

memory/656-135-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\tmp29A0.tmp

MD5 ceed504e0fa3c7fc348801e33fc415de
SHA1 dd2920629b99e3e64d3c7b045e6754f69aecee4e
SHA256 6208d3c6cc0963a07acfe3d9d36e5380cb14dd2fdc681eff0d9589163a253ba0
SHA512 1eb98439ebd226b568133367986036dfeeb2af9e45624c744b78ac071593e548cd902d7c55d934ad78f35a9402d9475929d39ef8a3cd50e5acb9f0eed0b676da

memory/4456-137-0x0000000000000000-mapping.dmp

memory/4456-138-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-140-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-142-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-144-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-146-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-148-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-150-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-152-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-154-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-156-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-158-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-160-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-162-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-164-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-166-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-168-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-170-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-172-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-174-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-176-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-178-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-180-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-182-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-184-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-186-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-188-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-190-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-192-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-194-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-196-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-198-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-200-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/4456-637-0x0000000006710000-0x0000000006776000-memory.dmp

memory/4456-638-0x0000000007C00000-0x0000000007C50000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Alfa Bank 052020.exe.log

MD5 8ec831f3e3a3f77e4a7b9cd32b48384c
SHA1 d83f09fd87c5bd86e045873c231c14836e76a05c
SHA256 7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA512 26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

Analysis: behavioral1

Detonation Overview

Submitted

2022-05-21 03:34

Reported

2022-05-21 05:19

Platform

win7-20220414-en

Max time kernel

143s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe"

Signatures

CoreEntity .NET Packer

coreentity
Description Indicator Process Target
N/A N/A N/A N/A

MassLogger

stealer spyware masslogger

MassLogger Main Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

MassLogger log file

Description Indicator Process Target
N/A N/A N/A N/A

ReZer0 packer

rezer0
Description Indicator Process Target
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A

Reads user/profile data of web browsers

spyware stealer

Accesses Microsoft Outlook profiles

collection
Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.ipify.org N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1260 set thread context of 1996 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1260 wrote to memory of 2016 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Windows\SysWOW64\schtasks.exe
PID 1260 wrote to memory of 2016 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Windows\SysWOW64\schtasks.exe
PID 1260 wrote to memory of 2016 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Windows\SysWOW64\schtasks.exe
PID 1260 wrote to memory of 2016 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Windows\SysWOW64\schtasks.exe
PID 1260 wrote to memory of 1996 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe
PID 1260 wrote to memory of 1996 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe
PID 1260 wrote to memory of 1996 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe
PID 1260 wrote to memory of 1996 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe
PID 1260 wrote to memory of 1996 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe
PID 1260 wrote to memory of 1996 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe
PID 1260 wrote to memory of 1996 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe
PID 1260 wrote to memory of 1996 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe
PID 1260 wrote to memory of 1996 N/A C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe

outlook_office_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A

outlook_win_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe

"C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DNdDTmnIdpat" /XML "C:\Users\Admin\AppData\Local\Temp\tmp63E2.tmp"

C:\Users\Admin\AppData\Local\Temp\Alfa Bank 052020.exe

"{path}"

Network

Country Destination Domain Proto
US 8.8.8.8:53 api.ipify.org udp
US 3.220.57.224:80 api.ipify.org tcp
US 8.8.8.8:53 smtp.privateemail.com udp
US 66.29.159.53:587 smtp.privateemail.com tcp

Files

memory/1260-54-0x0000000000930000-0x0000000000A1A000-memory.dmp

memory/1260-55-0x0000000075CE1000-0x0000000075CE3000-memory.dmp

memory/1260-56-0x0000000000480000-0x0000000000488000-memory.dmp

memory/1260-57-0x0000000005BD0000-0x0000000005C7E000-memory.dmp

memory/2016-58-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\tmp63E2.tmp

MD5 656c5b02c7adbf30cf65f53958ef2b5a
SHA1 509c0c09e8ece33066b793ae986d88d7a2d78dd3
SHA256 c0cb82a47f7ab6404ef8e774332683057b7b97946417f60fd8363f8a12f796b5
SHA512 bc07bf52df3c5dfc8a2d3dc862998c28442cac609cfa74f16ba96d953395e5c4acef22a12e9e92471a6026ed002fdd4393ec652f135cb1cd4fbe5ce3ec8063a8

memory/1996-60-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-61-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-63-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-64-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-65-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-66-0x00000000004A1A8E-mapping.dmp

memory/1996-68-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-70-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-72-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-74-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-76-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-78-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-80-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-82-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-84-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-86-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-88-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-90-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-92-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-94-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-96-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-98-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-100-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-102-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-104-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-106-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-108-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-110-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-112-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-114-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-116-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-118-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-120-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-122-0x0000000000400000-0x00000000004A6000-memory.dmp

memory/1996-570-0x0000000002000000-0x0000000002044000-memory.dmp