Analysis
-
max time kernel
186s -
max time network
83s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 09:09
Static task
static1
Behavioral task
behavioral1
Sample
4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe
Resource
win10v2004-20220901-en
General
-
Target
4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe
-
Size
536KB
-
MD5
943b7d1f31a9c27e6373e882540d5679
-
SHA1
253b16ffeac084841944403e9ca3e6d9ab59dce3
-
SHA256
4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c
-
SHA512
9dba418e98e5931913c4609a3b28a1e96f1c0fe5ffd298ae5a73646eb08bdf5088f289bec9037a927207d429800b05e65f2c9142fcc22990bb31ece5590cfcbf
-
SSDEEP
12288:Orr2iNZJymklR+um4cXwxHr7ypW4eSs1k2s5YqK7:W1dERbdcXg7aeSsQY9
Malware Config
Extracted
pony
http://shuaacapitalae.com/js/gate.php
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
defragsvc.exeAppReadiness.exeAppReadiness.exepid process 1392 defragsvc.exe 916 AppReadiness.exe 960 AppReadiness.exe -
Loads dropped DLL 2 IoCs
Processes:
4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exedefragsvc.exepid process 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 1392 defragsvc.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 2 IoCs
Processes:
4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exeAppReadiness.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts AppReadiness.exe -
Accesses Microsoft Outlook profiles 1 TTPs 2 IoCs
Processes:
4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exeAppReadiness.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook AppReadiness.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
defragsvc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Application Readiness = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\defragsvc.exe" defragsvc.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exeAppReadiness.exedescription pid process target process PID 604 set thread context of 2024 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe PID 916 set thread context of 960 916 AppReadiness.exe AppReadiness.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exedefragsvc.exepid process 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 1392 defragsvc.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 1392 defragsvc.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 1392 defragsvc.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 1392 defragsvc.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 1392 defragsvc.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 1392 defragsvc.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 1392 defragsvc.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 1392 defragsvc.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 1392 defragsvc.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 1392 defragsvc.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 1392 defragsvc.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 1392 defragsvc.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exedefragsvc.exeAppReadiness.exeAppReadiness.exedescription pid process Token: SeDebugPrivilege 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeImpersonatePrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeTcbPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeChangeNotifyPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeCreateTokenPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeBackupPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeRestorePrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeIncreaseQuotaPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeAssignPrimaryTokenPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeDebugPrivilege 1392 defragsvc.exe Token: SeImpersonatePrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeTcbPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeChangeNotifyPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeCreateTokenPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeBackupPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeRestorePrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeIncreaseQuotaPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeAssignPrimaryTokenPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeImpersonatePrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeTcbPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeChangeNotifyPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeCreateTokenPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeBackupPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeRestorePrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeIncreaseQuotaPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeAssignPrimaryTokenPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeImpersonatePrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeTcbPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeChangeNotifyPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeCreateTokenPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeBackupPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeRestorePrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeIncreaseQuotaPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeAssignPrimaryTokenPrivilege 2024 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe Token: SeDebugPrivilege 916 AppReadiness.exe Token: SeImpersonatePrivilege 960 AppReadiness.exe Token: SeTcbPrivilege 960 AppReadiness.exe Token: SeChangeNotifyPrivilege 960 AppReadiness.exe Token: SeCreateTokenPrivilege 960 AppReadiness.exe Token: SeBackupPrivilege 960 AppReadiness.exe Token: SeRestorePrivilege 960 AppReadiness.exe Token: SeIncreaseQuotaPrivilege 960 AppReadiness.exe Token: SeAssignPrimaryTokenPrivilege 960 AppReadiness.exe Token: SeImpersonatePrivilege 960 AppReadiness.exe Token: SeTcbPrivilege 960 AppReadiness.exe Token: SeChangeNotifyPrivilege 960 AppReadiness.exe Token: SeCreateTokenPrivilege 960 AppReadiness.exe Token: SeBackupPrivilege 960 AppReadiness.exe Token: SeRestorePrivilege 960 AppReadiness.exe Token: SeIncreaseQuotaPrivilege 960 AppReadiness.exe Token: SeAssignPrimaryTokenPrivilege 960 AppReadiness.exe Token: SeImpersonatePrivilege 960 AppReadiness.exe Token: SeTcbPrivilege 960 AppReadiness.exe Token: SeChangeNotifyPrivilege 960 AppReadiness.exe Token: SeCreateTokenPrivilege 960 AppReadiness.exe Token: SeBackupPrivilege 960 AppReadiness.exe Token: SeRestorePrivilege 960 AppReadiness.exe Token: SeIncreaseQuotaPrivilege 960 AppReadiness.exe Token: SeAssignPrimaryTokenPrivilege 960 AppReadiness.exe Token: SeImpersonatePrivilege 960 AppReadiness.exe Token: SeTcbPrivilege 960 AppReadiness.exe Token: SeChangeNotifyPrivilege 960 AppReadiness.exe Token: SeCreateTokenPrivilege 960 AppReadiness.exe Token: SeBackupPrivilege 960 AppReadiness.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exedefragsvc.exeAppReadiness.exedescription pid process target process PID 604 wrote to memory of 2024 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe PID 604 wrote to memory of 2024 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe PID 604 wrote to memory of 2024 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe PID 604 wrote to memory of 2024 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe PID 604 wrote to memory of 2024 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe PID 604 wrote to memory of 2024 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe PID 604 wrote to memory of 2024 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe PID 604 wrote to memory of 2024 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe PID 604 wrote to memory of 2024 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe PID 604 wrote to memory of 2024 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe PID 604 wrote to memory of 1392 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe defragsvc.exe PID 604 wrote to memory of 1392 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe defragsvc.exe PID 604 wrote to memory of 1392 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe defragsvc.exe PID 604 wrote to memory of 1392 604 4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe defragsvc.exe PID 1392 wrote to memory of 916 1392 defragsvc.exe AppReadiness.exe PID 1392 wrote to memory of 916 1392 defragsvc.exe AppReadiness.exe PID 1392 wrote to memory of 916 1392 defragsvc.exe AppReadiness.exe PID 1392 wrote to memory of 916 1392 defragsvc.exe AppReadiness.exe PID 916 wrote to memory of 960 916 AppReadiness.exe AppReadiness.exe PID 916 wrote to memory of 960 916 AppReadiness.exe AppReadiness.exe PID 916 wrote to memory of 960 916 AppReadiness.exe AppReadiness.exe PID 916 wrote to memory of 960 916 AppReadiness.exe AppReadiness.exe PID 916 wrote to memory of 960 916 AppReadiness.exe AppReadiness.exe PID 916 wrote to memory of 960 916 AppReadiness.exe AppReadiness.exe PID 916 wrote to memory of 960 916 AppReadiness.exe AppReadiness.exe PID 916 wrote to memory of 960 916 AppReadiness.exe AppReadiness.exe PID 916 wrote to memory of 960 916 AppReadiness.exe AppReadiness.exe PID 916 wrote to memory of 960 916 AppReadiness.exe AppReadiness.exe -
outlook_win_path 1 IoCs
Processes:
AppReadiness.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook AppReadiness.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe"C:\Users\Admin\AppData\Local\Temp\4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Users\Admin\AppData\Local\Temp\4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe"C:\Users\Admin\AppData\Local\Temp\4aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c.exe"2⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\defragsvc.exe"C:\Users\Admin\AppData\Roaming\Microsoft\defragsvc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Roaming\Microsoft\AppReadiness.exeC:\Users\Admin\AppData\Roaming\Microsoft\AppReadiness.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Roaming\Microsoft\AppReadiness.exe"C:\Users\Admin\AppData\Roaming\Microsoft\AppReadiness.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_win_path
PID:960
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5943b7d1f31a9c27e6373e882540d5679
SHA1253b16ffeac084841944403e9ca3e6d9ab59dce3
SHA2564aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c
SHA5129dba418e98e5931913c4609a3b28a1e96f1c0fe5ffd298ae5a73646eb08bdf5088f289bec9037a927207d429800b05e65f2c9142fcc22990bb31ece5590cfcbf
-
Filesize
536KB
MD5943b7d1f31a9c27e6373e882540d5679
SHA1253b16ffeac084841944403e9ca3e6d9ab59dce3
SHA2564aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c
SHA5129dba418e98e5931913c4609a3b28a1e96f1c0fe5ffd298ae5a73646eb08bdf5088f289bec9037a927207d429800b05e65f2c9142fcc22990bb31ece5590cfcbf
-
Filesize
536KB
MD5943b7d1f31a9c27e6373e882540d5679
SHA1253b16ffeac084841944403e9ca3e6d9ab59dce3
SHA2564aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c
SHA5129dba418e98e5931913c4609a3b28a1e96f1c0fe5ffd298ae5a73646eb08bdf5088f289bec9037a927207d429800b05e65f2c9142fcc22990bb31ece5590cfcbf
-
Filesize
10KB
MD56a410982bb4017e1b38ff36752c6088a
SHA1820786792bbdee074b624fa98871fac166811069
SHA2567dec55e974bba8af142bfc25168f6bb077f9be3012149b6f4360ea2b97af584f
SHA5124eab59cb10413b2772e187643855f03e366777c9b1dc9d12f984f50b1dd873a91ba0a1a2db872cc18920c23dceaaa635e08dc75b3ca48e49efb547dc9487159d
-
Filesize
10KB
MD56a410982bb4017e1b38ff36752c6088a
SHA1820786792bbdee074b624fa98871fac166811069
SHA2567dec55e974bba8af142bfc25168f6bb077f9be3012149b6f4360ea2b97af584f
SHA5124eab59cb10413b2772e187643855f03e366777c9b1dc9d12f984f50b1dd873a91ba0a1a2db872cc18920c23dceaaa635e08dc75b3ca48e49efb547dc9487159d
-
Filesize
536KB
MD5943b7d1f31a9c27e6373e882540d5679
SHA1253b16ffeac084841944403e9ca3e6d9ab59dce3
SHA2564aceb5a4dc7a4826f6167ba548de47a2bf1c2869edde551f53ceef13649ea02c
SHA5129dba418e98e5931913c4609a3b28a1e96f1c0fe5ffd298ae5a73646eb08bdf5088f289bec9037a927207d429800b05e65f2c9142fcc22990bb31ece5590cfcbf
-
Filesize
10KB
MD56a410982bb4017e1b38ff36752c6088a
SHA1820786792bbdee074b624fa98871fac166811069
SHA2567dec55e974bba8af142bfc25168f6bb077f9be3012149b6f4360ea2b97af584f
SHA5124eab59cb10413b2772e187643855f03e366777c9b1dc9d12f984f50b1dd873a91ba0a1a2db872cc18920c23dceaaa635e08dc75b3ca48e49efb547dc9487159d