Analysis
-
max time kernel
148s -
max time network
90s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 04:46
Behavioral task
behavioral1
Sample
b0c67c7c52969c70998d3f0aba6eb2a53460614a6d32106b17edc9769a8cafb6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b0c67c7c52969c70998d3f0aba6eb2a53460614a6d32106b17edc9769a8cafb6.exe
Resource
win10v2004-20221111-en
General
-
Target
b0c67c7c52969c70998d3f0aba6eb2a53460614a6d32106b17edc9769a8cafb6.exe
-
Size
325KB
-
MD5
2b39c25ce509adf5fc5571d76782a8e5
-
SHA1
abbf729b3a45a4ce0abe9e00b9de76c958a3d8d5
-
SHA256
b0c67c7c52969c70998d3f0aba6eb2a53460614a6d32106b17edc9769a8cafb6
-
SHA512
eb95526e51c4cfac2037f72c972d2ca10169e169c6c144624b80edbf9d8cd5e05adbeaf52d919029e50643a0c4aaa70e3b933ace1f8645e755ee6ff131c1d775
-
SSDEEP
6144:nsaY8p9zmw51GCvUzbCq5qoTAiVLomC9W9rV2cwQROOvWxfP3mh71RlMHjGMFXh:nsaY8rmw5H8r5qoxJomC9w4cwYjWNehk
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
KillMonitor²¡¶¾×¨É±¹¤¾ß.exeKillMonitor.exepid process 1168 KillMonitor²¡¶¾×¨É±¹¤¾ß.exe 1520 KillMonitor.exe -
Processes:
resource yara_rule behavioral1/memory/1508-55-0x0000000000400000-0x000000000041C000-memory.dmp upx \Users\Admin\AppData\Local\Temp\Temp\KillMonitor.exe upx \Users\Admin\AppData\Local\Temp\Temp\KillMonitor.exe upx C:\Users\Admin\AppData\Local\Temp\Temp\KillMonitor.exe upx behavioral1/memory/1508-65-0x0000000000400000-0x000000000041C000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\Temp\KillMonitor.exe upx behavioral1/memory/1520-70-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Loads dropped DLL 4 IoCs
Processes:
b0c67c7c52969c70998d3f0aba6eb2a53460614a6d32106b17edc9769a8cafb6.exepid process 1508 b0c67c7c52969c70998d3f0aba6eb2a53460614a6d32106b17edc9769a8cafb6.exe 1508 b0c67c7c52969c70998d3f0aba6eb2a53460614a6d32106b17edc9769a8cafb6.exe 1508 b0c67c7c52969c70998d3f0aba6eb2a53460614a6d32106b17edc9769a8cafb6.exe 1508 b0c67c7c52969c70998d3f0aba6eb2a53460614a6d32106b17edc9769a8cafb6.exe -
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
Processes:
OUTLOOK.EXEdescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook OUTLOOK.EXE Key queried \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 OUTLOOK.EXE Key queried \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 OUTLOOK.EXE -
Drops autorun.inf file 1 TTPs 5 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
KillMonitor.exedescription ioc process File opened for modification \??\F:\AutoRun.inf KillMonitor.exe File opened for modification \??\G:\AutoRun.inf KillMonitor.exe File opened for modification C:\AutoRun.inf KillMonitor.exe File opened for modification D:\AutoRun.inf KillMonitor.exe File opened for modification \??\E:\AutoRun.inf KillMonitor.exe -
Drops file in System32 directory 14 IoCs
Processes:
OUTLOOK.EXEdescription ioc process File created C:\Windows\system32\perfc007.dat OUTLOOK.EXE File created C:\Windows\system32\perfc009.dat OUTLOOK.EXE File created C:\Windows\system32\perfh009.dat OUTLOOK.EXE File created C:\Windows\system32\perfh011.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00A.dat OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\PerfStringBackup.INI OUTLOOK.EXE File created C:\Windows\system32\perfc00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfc010.dat OUTLOOK.EXE File created C:\Windows\system32\perfc011.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\PerfStringBackup.TMP OUTLOOK.EXE File created C:\Windows\system32\perfh007.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfh010.dat OUTLOOK.EXE -
Drops file in Windows directory 5 IoCs
Processes:
OUTLOOK.EXEKillMonitor.exedescription ioc process File opened for modification C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File created C:\Windows\inf\Outlook\0009\outlperf.ini OUTLOOK.EXE File created C:\Windows\System\Monitor.exe KillMonitor.exe File opened for modification C:\Windows\System\Monitor.exe KillMonitor.exe File created C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
OUTLOOK.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" OUTLOOK.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel OUTLOOK.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" OUTLOOK.EXE -
Modifies registry class 64 IoCs
Processes:
OUTLOOK.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F9-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063045-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F0-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063099-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672ED-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00067352-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DF-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E2-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063101-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063048-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063009-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D4-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D3-0000-0000-C000-000000000046}\ = "_Row" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063089-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063047-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063074-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063020-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063096-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630C9-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006307F-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006300D-0000-0000-C000-000000000046}\ = "ResultsEvents" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006309B-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063094-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F5-0000-0000-C000-000000000046}\ = "OlkCategoryEvents" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063007-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063094-0000-0000-C000-000000000046}\ = "_AutoFormatRules" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630EB-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063096-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063036-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DF-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063002-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630DB-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00067368-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063044-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006305A-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063099-0000-0000-C000-000000000046}\ = "_CalendarView" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006303C-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F9-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630FF-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063095-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630C4-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006300A-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063044-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006300E-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630EC-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672DE-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F9-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006304F-0000-0000-C000-000000000046}\TypeLib\ = "{00062FFF-0000-0000-C000-000000000046}" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006307B-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006305B-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006309D-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630F2-0000-0000-C000-000000000046}\ = "_NavigationFolder" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063081-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F7-0000-0000-C000-000000000046} OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630B2-0000-0000-C000-000000000046} OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006309B-0000-0000-C000-000000000046}\ = "_OrderField" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063036-0000-0000-C000-000000000046}\ = "_TaskRequestItem" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0006F025-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000672F5-0000-0000-C000-000000000046}\TypeLib OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E7-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630D6-0000-0000-C000-000000000046}\ProxyStubClsid32 OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063049-0000-0000-C000-000000000046}\TypeLib\Version = "9.4" OUTLOOK.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{000630E5-0000-0000-C000-000000000046}\ = "_Column" OUTLOOK.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00063101-0000-0000-C000-000000000046} OUTLOOK.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
OUTLOOK.EXEpid process 1364 OUTLOOK.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
OUTLOOK.EXEpid process 1364 OUTLOOK.EXE 1364 OUTLOOK.EXE 1364 OUTLOOK.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
OUTLOOK.EXEpid process 1364 OUTLOOK.EXE 1364 OUTLOOK.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
KillMonitor²¡¶¾×¨É±¹¤¾ß.exeKillMonitor.exeOUTLOOK.EXEpid process 1168 KillMonitor²¡¶¾×¨É±¹¤¾ß.exe 1168 KillMonitor²¡¶¾×¨É±¹¤¾ß.exe 1520 KillMonitor.exe 1364 OUTLOOK.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
b0c67c7c52969c70998d3f0aba6eb2a53460614a6d32106b17edc9769a8cafb6.exedescription pid process target process PID 1508 wrote to memory of 1168 1508 b0c67c7c52969c70998d3f0aba6eb2a53460614a6d32106b17edc9769a8cafb6.exe KillMonitor²¡¶¾×¨É±¹¤¾ß.exe PID 1508 wrote to memory of 1168 1508 b0c67c7c52969c70998d3f0aba6eb2a53460614a6d32106b17edc9769a8cafb6.exe KillMonitor²¡¶¾×¨É±¹¤¾ß.exe PID 1508 wrote to memory of 1168 1508 b0c67c7c52969c70998d3f0aba6eb2a53460614a6d32106b17edc9769a8cafb6.exe KillMonitor²¡¶¾×¨É±¹¤¾ß.exe PID 1508 wrote to memory of 1168 1508 b0c67c7c52969c70998d3f0aba6eb2a53460614a6d32106b17edc9769a8cafb6.exe KillMonitor²¡¶¾×¨É±¹¤¾ß.exe PID 1508 wrote to memory of 1520 1508 b0c67c7c52969c70998d3f0aba6eb2a53460614a6d32106b17edc9769a8cafb6.exe KillMonitor.exe PID 1508 wrote to memory of 1520 1508 b0c67c7c52969c70998d3f0aba6eb2a53460614a6d32106b17edc9769a8cafb6.exe KillMonitor.exe PID 1508 wrote to memory of 1520 1508 b0c67c7c52969c70998d3f0aba6eb2a53460614a6d32106b17edc9769a8cafb6.exe KillMonitor.exe PID 1508 wrote to memory of 1520 1508 b0c67c7c52969c70998d3f0aba6eb2a53460614a6d32106b17edc9769a8cafb6.exe KillMonitor.exe -
outlook_win_path 1 IoCs
Processes:
OUTLOOK.EXEdescription ioc process Key queried \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook OUTLOOK.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0c67c7c52969c70998d3f0aba6eb2a53460614a6d32106b17edc9769a8cafb6.exe"C:\Users\Admin\AppData\Local\Temp\b0c67c7c52969c70998d3f0aba6eb2a53460614a6d32106b17edc9769a8cafb6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Temp\KillMonitor²¡¶¾×¨É±¹¤¾ß.exe"C:\Users\Admin\AppData\Local\Temp\Temp\KillMonitor²¡¶¾×¨É±¹¤¾ß.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\Temp\KillMonitor.exe"C:\Users\Admin\AppData\Local\Temp\Temp\KillMonitor.exe"2⤵
- Executes dropped EXE
- Drops autorun.inf file
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE"C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding1⤵
- Accesses Microsoft Outlook profiles
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- outlook_win_path
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Temp\KillMonitor.exeFilesize
12KB
MD571e9f84f024c2b67b375588503b3d505
SHA1a435f5dd01adf88137bad43b18d0f3486411c683
SHA2563ec8a192a8e52b80ecff57b022330a0d5b11e727c0dccb1aa96649205e1893fa
SHA512a9378f7791558132ba8eec2ec929b387ff2cd748117ee2f030948c418602c743bea017348a366e663240281050b226d6807c65f3ca5cb5a740e4dfa7fa6f1189
-
C:\Users\Admin\AppData\Local\Temp\Temp\KillMonitor.exeFilesize
12KB
MD571e9f84f024c2b67b375588503b3d505
SHA1a435f5dd01adf88137bad43b18d0f3486411c683
SHA2563ec8a192a8e52b80ecff57b022330a0d5b11e727c0dccb1aa96649205e1893fa
SHA512a9378f7791558132ba8eec2ec929b387ff2cd748117ee2f030948c418602c743bea017348a366e663240281050b226d6807c65f3ca5cb5a740e4dfa7fa6f1189
-
C:\Users\Admin\AppData\Local\Temp\Temp\KillMonitor²¡¶¾×¨É±¹¤¾ß.exeFilesize
560KB
MD5a0538dbc96654e74fa65f3fa084b8d40
SHA106b7a162ba68898e8c1c32530fa4d91395a3abed
SHA2562cef7f6e2faca50583f6cd7b5a236078ca5fdcf52e230f89d3272b4de8420ac1
SHA512e297cad9d17b4735bc76a39977460b33a7a41eeee6b1224a0face41e1476c96d0bbdb5537b3cdd982c4c1341df8082ca2742eeeb7df10ce84a4802e6a21046e0
-
\Users\Admin\AppData\Local\Temp\Temp\KillMonitor.exeFilesize
12KB
MD571e9f84f024c2b67b375588503b3d505
SHA1a435f5dd01adf88137bad43b18d0f3486411c683
SHA2563ec8a192a8e52b80ecff57b022330a0d5b11e727c0dccb1aa96649205e1893fa
SHA512a9378f7791558132ba8eec2ec929b387ff2cd748117ee2f030948c418602c743bea017348a366e663240281050b226d6807c65f3ca5cb5a740e4dfa7fa6f1189
-
\Users\Admin\AppData\Local\Temp\Temp\KillMonitor.exeFilesize
12KB
MD571e9f84f024c2b67b375588503b3d505
SHA1a435f5dd01adf88137bad43b18d0f3486411c683
SHA2563ec8a192a8e52b80ecff57b022330a0d5b11e727c0dccb1aa96649205e1893fa
SHA512a9378f7791558132ba8eec2ec929b387ff2cd748117ee2f030948c418602c743bea017348a366e663240281050b226d6807c65f3ca5cb5a740e4dfa7fa6f1189
-
\Users\Admin\AppData\Local\Temp\Temp\KillMonitor²¡¶¾×¨É±¹¤¾ß.exeFilesize
560KB
MD5a0538dbc96654e74fa65f3fa084b8d40
SHA106b7a162ba68898e8c1c32530fa4d91395a3abed
SHA2562cef7f6e2faca50583f6cd7b5a236078ca5fdcf52e230f89d3272b4de8420ac1
SHA512e297cad9d17b4735bc76a39977460b33a7a41eeee6b1224a0face41e1476c96d0bbdb5537b3cdd982c4c1341df8082ca2742eeeb7df10ce84a4802e6a21046e0
-
\Users\Admin\AppData\Local\Temp\Temp\KillMonitor²¡¶¾×¨É±¹¤¾ß.exeFilesize
560KB
MD5a0538dbc96654e74fa65f3fa084b8d40
SHA106b7a162ba68898e8c1c32530fa4d91395a3abed
SHA2562cef7f6e2faca50583f6cd7b5a236078ca5fdcf52e230f89d3272b4de8420ac1
SHA512e297cad9d17b4735bc76a39977460b33a7a41eeee6b1224a0face41e1476c96d0bbdb5537b3cdd982c4c1341df8082ca2742eeeb7df10ce84a4802e6a21046e0
-
memory/1168-58-0x0000000000000000-mapping.dmp
-
memory/1364-77-0x000000007332D000-0x0000000073338000-memory.dmpFilesize
44KB
-
memory/1364-76-0x000000006C7A1000-0x000000006C7A3000-memory.dmpFilesize
8KB
-
memory/1364-71-0x0000000072341000-0x0000000072343000-memory.dmpFilesize
8KB
-
memory/1364-72-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1364-73-0x000000007332D000-0x0000000073338000-memory.dmpFilesize
44KB
-
memory/1364-75-0x000000006CB51000-0x000000006CB53000-memory.dmpFilesize
8KB
-
memory/1508-54-0x0000000075C81000-0x0000000075C83000-memory.dmpFilesize
8KB
-
memory/1508-65-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/1508-55-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/1520-63-0x0000000000000000-mapping.dmp
-
memory/1520-70-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB