Resubmissions
11/10/2022, 17:08
221011-vnmsrafbdn 610/10/2022, 15:31
221010-syaj3acdb3 1009/10/2022, 15:59
221009-tfb6lshbg4 1009/10/2022, 15:28
221009-swtvxshceq 1009/10/2022, 13:04
221009-qa2brshab7 1009/10/2022, 13:03
221009-qaj3gshab6 109/10/2022, 12:59
221009-p8jnyahaa6 1009/10/2022, 12:54
221009-p5m7yshbdm 1008/10/2022, 21:32
221008-1dxg4afgb8 1008/10/2022, 13:52
221008-q6p9daegh5 1Analysis
-
max time kernel
55s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
09/10/2022, 15:59
Static task
static1
Behavioral task
behavioral1
Sample
fucker script.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fucker script.exe
Resource
win10-20220812-en
Behavioral task
behavioral3
Sample
fucker script.exe
Resource
win10v2004-20220812-en
General
-
Target
fucker script.exe
-
Size
104KB
-
MD5
db0655efbe0dbdef1df06207f5cb5b5b
-
SHA1
a8d48d5c0042ce359178d018c0873e8a7c2f27e8
-
SHA256
52972a23ab12b95cd51d71741db2cf276749e56030c092e2e4f0907dcb1fbd56
-
SHA512
5adc8463c3e148a66f8afdeefc31f2b3ffeb12b7641584d1d24306b0898da60a8b9b948bb4f9b7d693185f2daa9bd9437b3b84cebc0eabfa84dfcef6938e1704
-
SSDEEP
1536:m5iT3FccnYWkyjWpOku3yUyJCbyVAvy7+fRo:3LOcxkyjW3wvHq
Malware Config
Signatures
-
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook OUTLOOK.EXE Key queried \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 OUTLOOK.EXE Key queried \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 OUTLOOK.EXE -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\PerfStringBackup.INI OUTLOOK.EXE File created C:\Windows\system32\perfc007.dat OUTLOOK.EXE File created C:\Windows\system32\perfh007.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfc011.dat OUTLOOK.EXE File created C:\Windows\system32\perfc009.dat OUTLOOK.EXE File created C:\Windows\system32\perfh010.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfc010.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\PerfStringBackup.TMP OUTLOOK.EXE File created C:\Windows\system32\perfh009.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfh011.dat OUTLOOK.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File opened for modification C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File created C:\Windows\inf\Outlook\0009\outlperf.ini OUTLOOK.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a0000000002000000000010660000000100002000000026e265335b00402195dd46af48172382569ccb017189e77e552a613130a44dbb000000000e80000000020000200000009bf0361d07f2775e8b74414ac55ef0e23e97c5065f0ec173ff168ca3dc21c020200000005424eee1f0c8b5e2ca8b91eb116b65e617c7d6eab306c18b29708cf11e68bbd740000000ace9fa85106de9f28cda633160abf37f5ddbf62a19b15adacce8666b2a57c014f43e3d354269541937da9ed5b69ba50a894fda2526534be726ef0d9cb7949576 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote OUTLOOK.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "yes" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LinksExplorer\Width = "290" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LinksExplorer\Width = "269" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff19000000190000009f0400007e020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LinksExplorer\Docked = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff6400000019000000ea0400007e020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" OUTLOOK.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f0ab73f8dbd801 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LinksExplorer\Docked = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\AutoHide = "yes" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt OUTLOOK.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff6f00000019000000f50400007e020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff00000000000000008604000065020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{95E67AF1-47EB-11ED-BAA3-DE6E3020A1A7} = "0" iexplore.exe -
Suspicious behavior: AddClipboardFormatListener 22 IoCs
pid Process 1908 OUTLOOK.EXE 2260 vlc.exe 2292 vlc.exe 2460 vlc.exe 2564 vlc.exe 2224 vlc.exe 284 vlc.exe 3084 vlc.exe 3532 vlc.exe 3600 vlc.exe 4040 vlc.exe 4156 vlc.exe 4428 vlc.exe 4636 vlc.exe 4816 vlc.exe 4924 vlc.exe 5032 vlc.exe 3788 vlc.exe 4724 vlc.exe 4620 vlc.exe 5360 vlc.exe 5820 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 652 chrome.exe 652 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 22 IoCs
pid Process 2292 vlc.exe 2564 vlc.exe 2260 vlc.exe 2460 vlc.exe 2224 vlc.exe 284 vlc.exe 3084 vlc.exe 3532 vlc.exe 3600 vlc.exe 4040 vlc.exe 4156 vlc.exe 4428 vlc.exe 4636 vlc.exe 4816 vlc.exe 4924 vlc.exe 5032 vlc.exe 3788 vlc.exe 4724 vlc.exe 1360 iexplore.exe 4620 vlc.exe 5360 vlc.exe 5820 vlc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 2292 vlc.exe 2564 vlc.exe 2260 vlc.exe 2460 vlc.exe 2292 vlc.exe 2564 vlc.exe 1360 iexplore.exe 2260 vlc.exe 2460 vlc.exe 904 iexplore.exe 2460 vlc.exe 2292 vlc.exe 2260 vlc.exe 2564 vlc.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 2224 vlc.exe 2224 vlc.exe 2224 vlc.exe 284 vlc.exe 284 vlc.exe 3084 vlc.exe 3084 vlc.exe 284 vlc.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 2292 vlc.exe 2564 vlc.exe 2260 vlc.exe 2460 vlc.exe 2292 vlc.exe 2564 vlc.exe 2260 vlc.exe 2460 vlc.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 652 chrome.exe 2224 vlc.exe 2224 vlc.exe 284 vlc.exe 284 vlc.exe 3084 vlc.exe 3084 vlc.exe 3532 vlc.exe 3532 vlc.exe 2292 vlc.exe 3600 vlc.exe 3600 vlc.exe 4040 vlc.exe 4040 vlc.exe 4156 vlc.exe 4156 vlc.exe 4428 vlc.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 904 iexplore.exe 904 iexplore.exe 1360 iexplore.exe 1360 iexplore.exe 1908 OUTLOOK.EXE 2292 vlc.exe 2260 vlc.exe 2460 vlc.exe 2564 vlc.exe 1908 OUTLOOK.EXE 1908 OUTLOOK.EXE 1908 OUTLOOK.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1500 IEXPLORE.EXE 1500 IEXPLORE.EXE 2224 vlc.exe 284 vlc.exe 3084 vlc.exe 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 3532 vlc.exe 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1360 iexplore.exe 1360 iexplore.exe 1360 iexplore.exe 1360 iexplore.exe 1360 iexplore.exe 1360 iexplore.exe 3716 IEXPLORE.EXE 3716 IEXPLORE.EXE 3716 IEXPLORE.EXE 3716 IEXPLORE.EXE 3924 IEXPLORE.EXE 3924 IEXPLORE.EXE 1360 iexplore.exe 1360 iexplore.exe 4076 IEXPLORE.EXE 4076 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 3924 IEXPLORE.EXE 3924 IEXPLORE.EXE 3600 vlc.exe 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1360 iexplore.exe 1360 iexplore.exe 4040 vlc.exe 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1360 iexplore.exe 1360 iexplore.exe 1360 iexplore.exe 1360 iexplore.exe 3924 IEXPLORE.EXE 3924 IEXPLORE.EXE 4156 vlc.exe 3696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 652 wrote to memory of 1584 652 chrome.exe 32 PID 652 wrote to memory of 1584 652 chrome.exe 32 PID 652 wrote to memory of 1584 652 chrome.exe 32 PID 904 wrote to memory of 1500 904 iexplore.exe 33 PID 904 wrote to memory of 1500 904 iexplore.exe 33 PID 904 wrote to memory of 1500 904 iexplore.exe 33 PID 904 wrote to memory of 1500 904 iexplore.exe 33 PID 1360 wrote to memory of 1984 1360 iexplore.exe 34 PID 1360 wrote to memory of 1984 1360 iexplore.exe 34 PID 1360 wrote to memory of 1984 1360 iexplore.exe 34 PID 1360 wrote to memory of 1984 1360 iexplore.exe 34 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 2000 652 chrome.exe 36 PID 652 wrote to memory of 848 652 chrome.exe 37 PID 652 wrote to memory of 848 652 chrome.exe 37 PID 652 wrote to memory of 848 652 chrome.exe 37 PID 652 wrote to memory of 868 652 chrome.exe 38 PID 652 wrote to memory of 868 652 chrome.exe 38 PID 652 wrote to memory of 868 652 chrome.exe 38 PID 652 wrote to memory of 868 652 chrome.exe 38 PID 652 wrote to memory of 868 652 chrome.exe 38 PID 652 wrote to memory of 868 652 chrome.exe 38 PID 652 wrote to memory of 868 652 chrome.exe 38 PID 652 wrote to memory of 868 652 chrome.exe 38 PID 652 wrote to memory of 868 652 chrome.exe 38 -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook OUTLOOK.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\fucker script.exe"C:\Users\Admin\AppData\Local\Temp\fucker script.exe"1⤵PID:1168
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:904 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1500
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1360 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1984
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1360 CREDAT:734227 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:3716
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1360 CREDAT:3224583 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3924
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1360 CREDAT:3814408 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
PID:4076
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1360 CREDAT:3486733 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3696
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1360 CREDAT:1717263 /prefetch:22⤵
- Modifies Internet Explorer settings
PID:4584
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1360 CREDAT:2765854 /prefetch:22⤵PID:4140
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1360 CREDAT:2044969 /prefetch:22⤵
- Modifies Internet Explorer settings
PID:1244
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1360 CREDAT:2503720 /prefetch:22⤵
- Modifies Internet Explorer settings
PID:5284
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1360 CREDAT:3683370 /prefetch:22⤵
- Modifies Internet Explorer settings
PID:5672
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1360 CREDAT:1586213 /prefetch:22⤵
- Modifies Internet Explorer settings
PID:3680
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1216
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6804f50,0x7fef6804f60,0x7fef6804f702⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1140,13058175494209856849,375557897793639605,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1148 /prefetch:22⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1140,13058175494209856849,375557897793639605,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1444 /prefetch:82⤵PID:848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1140,13058175494209856849,375557897793639605,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1700 /prefetch:82⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1140,13058175494209856849,375557897793639605,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2056 /prefetch:12⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1140,13058175494209856849,375557897793639605,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2068 /prefetch:12⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1140,13058175494209856849,375557897793639605,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1076 /prefetch:22⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1140,13058175494209856849,375557897793639605,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1040 /prefetch:82⤵PID:3380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1140,13058175494209856849,375557897793639605,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:3416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1140,13058175494209856849,375557897793639605,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3456 /prefetch:82⤵PID:3588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1140,13058175494209856849,375557897793639605,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3092 /prefetch:82⤵PID:3596
-
-
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"1⤵
- Accesses Microsoft Outlook profiles
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- outlook_win_path
PID:1908
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2248
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2260
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2292
-
C:\Windows\system32\calc.exe"C:\Windows\system32\calc.exe"1⤵PID:2336
-
C:\Windows\system32\calc.exe"C:\Windows\system32\calc.exe"1⤵PID:2412
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2460
-
C:\Windows\system32\calc.exe"C:\Windows\system32\calc.exe"1⤵PID:2452
-
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"1⤵PID:2532
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2564
-
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"1⤵PID:2524
-
C:\Windows\system32\calc.exe"C:\Windows\system32\calc.exe"1⤵PID:2620
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding1⤵PID:2660
-
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding2⤵PID:2688
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2160
-
C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"1⤵PID:2496
-
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"1⤵PID:2652
-
C:\Windows\system32\calc.exe"C:\Windows\system32\calc.exe"1⤵PID:2592
-
C:\Windows\system32\calc.exe"C:\Windows\system32\calc.exe"1⤵PID:2808
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2224
-
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"1⤵PID:2724
-
C:\Windows\system32\calc.exe"C:\Windows\system32\calc.exe"1⤵PID:2256
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:284
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3084
-
C:\Windows\system32\calc.exe"C:\Windows\system32\calc.exe"1⤵PID:3144
-
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"1⤵PID:3488
-
C:\Windows\system32\calc.exe"C:\Windows\system32\calc.exe"1⤵PID:3496
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3532
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵PID:3692
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:3772
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵PID:3844
-
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"1⤵PID:3904
-
C:\Windows\system32\calc.exe"C:\Windows\system32\calc.exe"1⤵PID:3968
-
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"1⤵PID:4016
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵PID:4032
-
C:\Windows\system32\calc.exe"C:\Windows\system32\calc.exe"1⤵PID:2032
-
C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"1⤵PID:3380
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:3836
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:11⤵PID:3964
-
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:12⤵PID:4028
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1592
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3600
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵PID:3796
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4040
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵PID:3800
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵PID:3652
-
C:\Windows\system32\calc.exe"C:\Windows\system32\calc.exe"1⤵PID:4132
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4156
-
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"1⤵PID:4260
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
PID:4428
-
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"1⤵PID:4460
-
C:\Windows\system32\calc.exe"C:\Windows\system32\calc.exe"1⤵PID:4496
-
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"1⤵PID:4528
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵PID:4564
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵PID:4628
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
PID:4636
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:4716
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
PID:4816
-
C:\Windows\system32\calc.exe"C:\Windows\system32\calc.exe"1⤵PID:4884
-
C:\Windows\system32\calc.exe"C:\Windows\system32\calc.exe"1⤵PID:4896
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
PID:4924
-
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"1⤵PID:4980
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
PID:5032
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵PID:5104
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵PID:4280
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
PID:3788
-
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"1⤵PID:4104
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵PID:2016
-
C:\Windows\system32\calc.exe"C:\Windows\system32\calc.exe"1⤵PID:4548
-
C:\Windows\system32\calc.exe"C:\Windows\system32\calc.exe"1⤵PID:4576
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
PID:4724
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵PID:3680
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
PID:4620
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵PID:5156
-
C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"1⤵PID:5184
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:11⤵PID:5268
-
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:12⤵PID:5300
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
PID:5360
-
C:\Windows\system32\calc.exe"C:\Windows\system32\calc.exe"1⤵PID:5428
-
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"1⤵PID:5464
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
PID:5820
-
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"1⤵PID:6072
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:11⤵PID:6088
-
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:12⤵PID:6104
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
60KB
MD5d15aaa7c9be910a9898260767e2490e1
SHA12090c53f8d9fc3fbdbafd3a1e4dc25520eb74388
SHA256f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e
SHA5127e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD51e9420dbda6b3dbdcb06c88ac5ed34bb
SHA12915227823ff25793b9413186acbbbc334716576
SHA25697004c574cf80a8c437856aea24f827ad369993e70540c29c167b01741d041b4
SHA512df8c278e0584cbafd82cc177c7326d0d263e853c3a711b682878434cc28d04a3ecc901e25dd8131f6757c738d2541239c883563eea66d4d888b835bed5c95e32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5839cd9864d6e6eafa1b6ec5f773238b5
SHA158825b72f02e095927b535f8e378ef73a6ca153d
SHA2560294d79b77ebb73365a297479f45e57f0697a7fb58edcda1ece32011e883f6e0
SHA512e09e9ce5399c129ec0a81519f7ccb2f35ebf0162c61a2ddae4e791bbf42db3539918d19c3c25489fba53bbae932abad18d27357a2b3ce90b96931287d0eff094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f41dddbf03d3202a03923fad7d335e5
SHA1513cb85b39c7f598ca1ee118c39402e1ece58d5f
SHA256900834ee9d9c29b637a5c32c95f9235e1b1e9316837cc183eca8b07ecb223277
SHA512c994eaa72b9d45087696c5f5150a26eb50411ef16fbe2ceb96341f60823e511209929cb0e9d7515f6f34df0c5fbfc3a94eff047b1075aa1d7eda49de5fafac3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592546949236750d2834f166e61aa7694
SHA1edadf313037ff393e808ca09e0eb1bb21d3c4420
SHA256fae4f0c40388479987343d53e6239baf4c17f7ff6b8da4f914f29fca188feee1
SHA5123196566949980c50bd49c820991c823be17c99407cc1c265bb6566510e0e3a98ad7a7ee75f6c2e171e1e5d17c2bcb4a76a8aaa4c86a8ee2f0a3a3f735e30251e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592546949236750d2834f166e61aa7694
SHA1edadf313037ff393e808ca09e0eb1bb21d3c4420
SHA256fae4f0c40388479987343d53e6239baf4c17f7ff6b8da4f914f29fca188feee1
SHA5123196566949980c50bd49c820991c823be17c99407cc1c265bb6566510e0e3a98ad7a7ee75f6c2e171e1e5d17c2bcb4a76a8aaa4c86a8ee2f0a3a3f735e30251e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef69af005ffe9ff8e03feeaf0f5ac8fe
SHA1f1d5ca1f75c4a1ae483836c1bc9925bdb1784e45
SHA25649774c342a2a09ce089e5361579ef543e83b3a0a978df608401e0a29c94eedc8
SHA5122d3f8c9381d76fe044c74510e120203a7f2b4f1fff25f38a2d8846d4306dd40664d729627caa8b84e9e4a12aa128810e85a4c89732133325d9d0689921d6d7c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578988f3cf2940b855f2698c1b8d6435e
SHA1ae803c0feff7fbbe32f375104985fe877e03713c
SHA256460babd6a0fb576b1635b62f68938e577c2a54cff86b2a2ba7d8034096b86d78
SHA5123c19a726ef1e8d74f74ea67ca24c70cbb0c8a81f18907594267922a13410c0adaef604cc77bf1016af4b977a6411f59bfc98d1caa18d002d5bff285d740132c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d494aa6d52a54ecd705fd34ed0e8f099
SHA1e3f08b98215f41e5715b50841914ef986dacce85
SHA256cbe3fcd6ff3da9c9e2e052a1cf4a79f9323fda119154f659d81d16a27be62e65
SHA51253a2004536bfdf4aca9581641c6729b51aa84b2c9d70aa2e4a78eb6de5b8d942dc1b63ce6234fdb78e6aef17294421a9a3b1d9c8d3bea0ca889b918aea8a2381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ee16b63cdd72870abf173f62e86a972
SHA1c98efa2046e6131ec4ddcdf2e5219d4493799fc1
SHA2569e1795fddfb3dc0a1aa5d4e58c024f2fb018628124ef8bf728d1f082b3ad9ee7
SHA512c1dbd67e67799098b3dc6e292ea785e86d893fd8c59d04530292dbc59380eeeb1ea8b3c32ee14619897cc18533124c4a9455f11f82542231fa015a4181e9300e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dd3396495a280aa7e9bc5039a3cfd70
SHA1b4f569a101704575179594f57f6dca82f0e2a572
SHA2562755220a305c8d7787a3be19500de2d96ed576edf24eaf0aa6afc4041df93e40
SHA512be555edc047eebf2c03b851fad89dcb5cf8919c804cc9e3db461a6fc0eeed8b9f37f3a9e37810df25720351eeb861b2b8b6a202aa10cdac4928431dcdc18503e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5522fd36805b09eb0d3ce98abff3e18b2
SHA1bb7d3872017c83ee0c68c7eaaf8960e8b0f0bda1
SHA2563a22f7f4b633764f475556b62ff8d24176eab118584bec27ce13c5039c334151
SHA512482fbe40b05a81afb8ceffff8b3a6fe3d2d8bfbb27acc19bbe387a3dd0f7d3aac6413e47124dd3da29a21c666124fe66ee8d5b4b2ccc3c6a74bc60495a10a258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d80b5b35d41f185e28f0c4444d8e19e
SHA1c66f529e924b213ca8856509f5036c25d436d563
SHA25695fd99b559f6086872323db6c1468ad5e55e7b4b0c88b568564f0c52cee09ed0
SHA512f55a2f25c1f0a29f913a210e14359e3aae35b630583bfa46b37aa384900def10eb1cdaeb2c15f39f13ea5fd31877ccb4b347c7117d66405d9a6b8e94319e9121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6dedba93f5d66d3f719a9cee6b63f80
SHA16ba4ef9a47504ac5e2566c955435f750d3ff69e2
SHA256d5b8040e1d5cb6c0f22e264b9411a44b999c04ac930a53c077b5b3bf6288933d
SHA512b0fff9d85b9f02360c00c399acc440e99bd7671627858652358f077b677e4c71e61bf5204d44c4f0f0827a3c867d9167a780f4bdae51bddd40013d0958d07bbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553dbefad8c5b4bfb2d3a75344e8f7770
SHA11fdc80efe2ce7f7389e6b2497cbac7aa9d0fcfd6
SHA25686f957618f98a8c9a1677203b6733cd9fe98c15103d0568521d879eefc4e8395
SHA512e1da8aa4df70ee59700fc7155262f98769c2baaea1182cfc469e4ac27c438cf3c31169fc147bec26dd0e30cf8c94d877e9d4c559da76d802ee51d9ee40a1026f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5474d4fda5e228ae919aef483a020b83d
SHA1030664be681c4c61cc912f8c1a08c6e8d7de0e54
SHA2565f04ae50d4f1b2cdb582f89d3deb0cfd3b338d9c81c13b12ef2d47debc7f0f74
SHA512540b9545d471bf7eaa89e59172c3015df3a5f7cd0a54321b10f2f82b6a86c76ab54ebe90b9809ecac2525f427b9b6e723311f12e1f5cd4df91b740e33cd399ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5982b4a3a5a806aebba649679dc8d6626
SHA12812fbdae7cd4d72dfb66794f2bfe29530ab2480
SHA2564adaabfd645c6a12427215d05c77df274ad85a151135a0b43e390feba4df078d
SHA512dc12449ac6411102bc9136a55f31353a629341a163b02242726bea992336cf7b09f3eb95ae12fe8aae88e9e30d20676c7b698861d80bd4ad98ef24de452065d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589732bd3843259d177510b4c9b2fcae9
SHA1b3cfde673906385fb7489b198d30c35376c2ee3b
SHA256503253c173dd173bc2e8a399d312d02a40bd7d3b0696b8b9cf0f1af8643ffe87
SHA512e73e77ff49602058f4898f99eeee0d1dd4e755d8f9d566decd79a32839b94f6437acfc4cae1d69d3f200e6cf1b3804b000633025bb9db0492bd9be6d61ed7d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d72347fb51de32fbbb5b9ba50b3e6a1
SHA1e296d6092e65a3643e2b0eb599b7158f44d008de
SHA256ade2bc2b6c9bf1560a2e5f3d4d7bb52967de3fa759d5d99f5cb16da5f76e255c
SHA512cf375aa6d3cc743425fc5096fc811e7750176e48a91213fcce302f6ec925fa3b902ae3aefa16d92fa5333a435440b045599721d0a590ea066b321e267aee586c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561c8fb4cf08f651d67c9ae924f72fc9b
SHA10f65568e9dfc845ac40d1d4717f707daf4b57ebc
SHA256a338ba61003cf1e9deadba69c68dc7c09cdc158a71a0b1e6f899dd121ea11dac
SHA512dfe02ddba9824359313773e7e9e16d866b5d96d4dabb94208d54c011ae73de16fd2a585d69fd5874748190d1ce593d891afa48551894c3879bbd5cace1d8b2be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585b8425741b2b49f2714c43819c8807b
SHA1688e245e02599619fc6ecff172bc7f0a7eb4db01
SHA256f65330262dd8416877b0418f2856186c655712393d44bc4c9021bfeff4c26f6e
SHA5123d2a74afee76a59ac0176dfe9487cbc836f5d74fb5975754c5e3ac44074987ec82c166b76bba7c2676d7e0ec9d777dcbad88b1f57355ffdd064e8e7dcd5f16c6
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{95DD0511-47EB-11ED-BAA3-DE6E3020A1A7}.dat
Filesize3KB
MD59635fa800349dc6820ba14a039d6d384
SHA15a789d67a915ef821e361146c86f28277d2eace4
SHA256f9a234589e53a5055e4392fef4b6dcb203f825adf65476b10e29055084a189e2
SHA512f5c00060046d3503c2a06b7f28efc27597df80b247f9a6ad442e8d9ecf69ae0d0c0046d7f1f92276516d750ed6ab21100c1396042f6464b0e4616047067d433d
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{95E67AF1-47EB-11ED-BAA3-DE6E3020A1A7}.dat
Filesize5KB
MD5ce8e42d2fb67b08c6894b61a7c58e513
SHA19f106786fde89a83cefddafce1e252aec19479e2
SHA256e8ecdfb49dfb3949976c5dc49b820d2c7a336ce94b4412a7c7f40139d9283d41
SHA512e758223a84d80da6dd5b35d5d85c46e6b9ad6110ca9a6cfabf3f75ed0925928a90d873997930768063567cfeb827010c483a7810a9219560aee47dcbc1e4cb66