Analysis
-
max time kernel
105s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 19:17
Static task
static1
Behavioral task
behavioral1
Sample
DHL SHIPPING INVOICE DOCUMENTS.xlsx
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
DHL SHIPPING INVOICE DOCUMENTS.xlsx
Resource
win10v2004-20220812-en
General
-
Target
DHL SHIPPING INVOICE DOCUMENTS.xlsx
-
Size
1.9MB
-
MD5
69b5e23e5c3f2f1127d914b78411ad78
-
SHA1
0b55196d6305ba77d4af93ee28c9a8aa82a80798
-
SHA256
995859ba8baecde236921c675cd9ee469acf1d6f8027b4a30babe67a2335c809
-
SHA512
6d1fd1461ee36cb6e1af9ffab5e0df3271a54b707b7fe1b44c7c7c48d98882ed52ebde322ef0e45d13f689f9cf8a3e581f5615f765298867fbf4c46f9afceb84
-
SSDEEP
49152:kjEXlD82bJ74Lq45V23Q9IB7ZX48JzoxmOKZi0x4PlXwCc:kWlD82b85V/01X48J4Fqi0uTc
Malware Config
Extracted
Protocol: smtp- Host:
mail.allerbestpf.com - Port:
587 - Username:
[email protected] - Password:
Pascal59#Miller
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 1672 EQNEDT32.EXE -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 452 word.exe 1432 ifvhe.exe 1620 ifvhe.exe -
Loads dropped DLL 9 IoCs
pid Process 1672 EQNEDT32.EXE 452 word.exe 452 word.exe 452 word.exe 452 word.exe 452 word.exe 1432 ifvhe.exe 1432 ifvhe.exe 1312 ifvhe.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ifvhe.exe Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ifvhe.exe Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ifvhe.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1432 set thread context of 1312 1432 ifvhe.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
pid Process 1672 EQNEDT32.EXE -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 848 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1312 ifvhe.exe 1312 ifvhe.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1312 ifvhe.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 848 EXCEL.EXE 848 EXCEL.EXE 848 EXCEL.EXE 848 EXCEL.EXE 848 EXCEL.EXE 1312 ifvhe.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1672 wrote to memory of 452 1672 EQNEDT32.EXE 30 PID 1672 wrote to memory of 452 1672 EQNEDT32.EXE 30 PID 1672 wrote to memory of 452 1672 EQNEDT32.EXE 30 PID 1672 wrote to memory of 452 1672 EQNEDT32.EXE 30 PID 452 wrote to memory of 1432 452 word.exe 31 PID 452 wrote to memory of 1432 452 word.exe 31 PID 452 wrote to memory of 1432 452 word.exe 31 PID 452 wrote to memory of 1432 452 word.exe 31 PID 1432 wrote to memory of 1620 1432 ifvhe.exe 32 PID 1432 wrote to memory of 1620 1432 ifvhe.exe 32 PID 1432 wrote to memory of 1620 1432 ifvhe.exe 32 PID 1432 wrote to memory of 1620 1432 ifvhe.exe 32 PID 1432 wrote to memory of 1312 1432 ifvhe.exe 33 PID 1432 wrote to memory of 1312 1432 ifvhe.exe 33 PID 1432 wrote to memory of 1312 1432 ifvhe.exe 33 PID 1432 wrote to memory of 1312 1432 ifvhe.exe 33 PID 1432 wrote to memory of 1312 1432 ifvhe.exe 33 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ifvhe.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ifvhe.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\DHL SHIPPING INVOICE DOCUMENTS.xlsx"1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:848
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Roaming\word.exeC:\Users\Admin\AppData\Roaming\word.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\ifvhe.exe"C:\Users\Admin\AppData\Local\Temp\ifvhe.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\ifvhe.exe"C:\Users\Admin\AppData\Local\Temp\ifvhe.exe"4⤵
- Executes dropped EXE
PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\ifvhe.exe"C:\Users\Admin\AppData\Local\Temp\ifvhe.exe"4⤵
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1312
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5023d6474d022a8538259096ee676b365
SHA14a93521e05877f142da3f1a743a7715b486edd77
SHA256856c4c4a932bc7f4b8ecb92bcfc96e7bb430db4dfeadd9ba92a5283f3aecef2e
SHA5120df18e62af3c1958ed96a1858c090da1d151e997d2e95940392ed154c217fb5f45847c620771fd1eaa6ce0b8ce2ae2d3bb6fc932ef51d263bfa47adceca95a02
-
Filesize
5KB
MD5023d6474d022a8538259096ee676b365
SHA14a93521e05877f142da3f1a743a7715b486edd77
SHA256856c4c4a932bc7f4b8ecb92bcfc96e7bb430db4dfeadd9ba92a5283f3aecef2e
SHA5120df18e62af3c1958ed96a1858c090da1d151e997d2e95940392ed154c217fb5f45847c620771fd1eaa6ce0b8ce2ae2d3bb6fc932ef51d263bfa47adceca95a02
-
Filesize
5KB
MD5023d6474d022a8538259096ee676b365
SHA14a93521e05877f142da3f1a743a7715b486edd77
SHA256856c4c4a932bc7f4b8ecb92bcfc96e7bb430db4dfeadd9ba92a5283f3aecef2e
SHA5120df18e62af3c1958ed96a1858c090da1d151e997d2e95940392ed154c217fb5f45847c620771fd1eaa6ce0b8ce2ae2d3bb6fc932ef51d263bfa47adceca95a02
-
Filesize
5KB
MD5023d6474d022a8538259096ee676b365
SHA14a93521e05877f142da3f1a743a7715b486edd77
SHA256856c4c4a932bc7f4b8ecb92bcfc96e7bb430db4dfeadd9ba92a5283f3aecef2e
SHA5120df18e62af3c1958ed96a1858c090da1d151e997d2e95940392ed154c217fb5f45847c620771fd1eaa6ce0b8ce2ae2d3bb6fc932ef51d263bfa47adceca95a02
-
Filesize
287KB
MD5665c1fe04f066e660fb00cbd7a957c32
SHA1028620af19d44e979830f756cffba6aed0aa244f
SHA256cb5fc9ae21af75a8475a9b3d456400bffd34f3a73059f5f5b58353dc37d34b31
SHA512c85cc3c9aa6eeeb1811284f76f71c9eef4a3e42607e6e8145b936ed5e11ac889d1c5b7b01b4c1d02def36b4faa289a19bfd1327c21424a34fb9ffcb903de55fa
-
Filesize
4KB
MD5695c250e0629ab61d8729ef8e8af5f75
SHA1371fec3ac5664fd292ba8a7bdd05383c85a956a8
SHA25609629e54fb0f2811254d37d4faed78e22cc933c4dfca0421e53e755733299513
SHA51271ef965c967eaf31cbbc6a26b17623ccebe9ea347c0b0f658d4aa0f244d0068bad2972f372ffaee69592c4d4e9c56be24543f32d26fe1092af29551bd4d9a640
-
Filesize
798KB
MD5760971f4f588d25fcb74938cc7b778d9
SHA1df46c6d1de7aec7a462faf0a7019b69acf195256
SHA2567813dfab45495b61483bf8b3ed97661dfadad39e080745a5c5fc841841a5602d
SHA51205fbffe110598679ca2ef1f3789b896685e5258cf54fcd2be148cdf8ad0778ff0494f7f06293c5cd109153c8a840a5e1ac984bbbabb1400245578a6f8bd54dab
-
Filesize
798KB
MD5760971f4f588d25fcb74938cc7b778d9
SHA1df46c6d1de7aec7a462faf0a7019b69acf195256
SHA2567813dfab45495b61483bf8b3ed97661dfadad39e080745a5c5fc841841a5602d
SHA51205fbffe110598679ca2ef1f3789b896685e5258cf54fcd2be148cdf8ad0778ff0494f7f06293c5cd109153c8a840a5e1ac984bbbabb1400245578a6f8bd54dab
-
Filesize
5KB
MD5023d6474d022a8538259096ee676b365
SHA14a93521e05877f142da3f1a743a7715b486edd77
SHA256856c4c4a932bc7f4b8ecb92bcfc96e7bb430db4dfeadd9ba92a5283f3aecef2e
SHA5120df18e62af3c1958ed96a1858c090da1d151e997d2e95940392ed154c217fb5f45847c620771fd1eaa6ce0b8ce2ae2d3bb6fc932ef51d263bfa47adceca95a02
-
Filesize
5KB
MD5023d6474d022a8538259096ee676b365
SHA14a93521e05877f142da3f1a743a7715b486edd77
SHA256856c4c4a932bc7f4b8ecb92bcfc96e7bb430db4dfeadd9ba92a5283f3aecef2e
SHA5120df18e62af3c1958ed96a1858c090da1d151e997d2e95940392ed154c217fb5f45847c620771fd1eaa6ce0b8ce2ae2d3bb6fc932ef51d263bfa47adceca95a02
-
Filesize
5KB
MD5023d6474d022a8538259096ee676b365
SHA14a93521e05877f142da3f1a743a7715b486edd77
SHA256856c4c4a932bc7f4b8ecb92bcfc96e7bb430db4dfeadd9ba92a5283f3aecef2e
SHA5120df18e62af3c1958ed96a1858c090da1d151e997d2e95940392ed154c217fb5f45847c620771fd1eaa6ce0b8ce2ae2d3bb6fc932ef51d263bfa47adceca95a02
-
Filesize
5KB
MD5023d6474d022a8538259096ee676b365
SHA14a93521e05877f142da3f1a743a7715b486edd77
SHA256856c4c4a932bc7f4b8ecb92bcfc96e7bb430db4dfeadd9ba92a5283f3aecef2e
SHA5120df18e62af3c1958ed96a1858c090da1d151e997d2e95940392ed154c217fb5f45847c620771fd1eaa6ce0b8ce2ae2d3bb6fc932ef51d263bfa47adceca95a02
-
Filesize
5KB
MD5023d6474d022a8538259096ee676b365
SHA14a93521e05877f142da3f1a743a7715b486edd77
SHA256856c4c4a932bc7f4b8ecb92bcfc96e7bb430db4dfeadd9ba92a5283f3aecef2e
SHA5120df18e62af3c1958ed96a1858c090da1d151e997d2e95940392ed154c217fb5f45847c620771fd1eaa6ce0b8ce2ae2d3bb6fc932ef51d263bfa47adceca95a02
-
Filesize
5KB
MD5023d6474d022a8538259096ee676b365
SHA14a93521e05877f142da3f1a743a7715b486edd77
SHA256856c4c4a932bc7f4b8ecb92bcfc96e7bb430db4dfeadd9ba92a5283f3aecef2e
SHA5120df18e62af3c1958ed96a1858c090da1d151e997d2e95940392ed154c217fb5f45847c620771fd1eaa6ce0b8ce2ae2d3bb6fc932ef51d263bfa47adceca95a02
-
Filesize
5KB
MD5023d6474d022a8538259096ee676b365
SHA14a93521e05877f142da3f1a743a7715b486edd77
SHA256856c4c4a932bc7f4b8ecb92bcfc96e7bb430db4dfeadd9ba92a5283f3aecef2e
SHA5120df18e62af3c1958ed96a1858c090da1d151e997d2e95940392ed154c217fb5f45847c620771fd1eaa6ce0b8ce2ae2d3bb6fc932ef51d263bfa47adceca95a02
-
Filesize
798KB
MD5760971f4f588d25fcb74938cc7b778d9
SHA1df46c6d1de7aec7a462faf0a7019b69acf195256
SHA2567813dfab45495b61483bf8b3ed97661dfadad39e080745a5c5fc841841a5602d
SHA51205fbffe110598679ca2ef1f3789b896685e5258cf54fcd2be148cdf8ad0778ff0494f7f06293c5cd109153c8a840a5e1ac984bbbabb1400245578a6f8bd54dab