Malware Analysis Report

2025-04-03 09:47

Sample ID 240402-l23lpadg6y
Target 61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.zip
SHA256 86994d3f5bfd356c14040ffc3226e7d01dbf5fb77f7e982126d67263e76b566e
Tags
lokibot collection spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

86994d3f5bfd356c14040ffc3226e7d01dbf5fb77f7e982126d67263e76b566e

Threat Level: Known bad

The file 61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.zip was found to be: Known bad.

Malicious Activity Summary

lokibot collection spyware stealer trojan

Lokibot

Checks computer location settings

Reads user/profile data of web browsers

Accesses Microsoft Outlook profiles

Suspicious use of SetThreadContext

Enumerates physical storage devices

Unsigned PE

Suspicious use of AdjustPrivilegeToken

outlook_win_path

outlook_office_path

Suspicious use of WriteProcessMemory

Suspicious behavior: RenamesItself

Creates scheduled task(s)

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-02 10:02

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-02 10:02

Reported

2024-04-02 10:05

Platform

win7-20240221-en

Max time kernel

135s

Max time network

136s

Command Line

"C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe"

Signatures

Lokibot

trojan spyware stealer lokibot

Reads user/profile data of web browsers

spyware stealer

Accesses Microsoft Outlook profiles

collection
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: RenamesItself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2740 wrote to memory of 2272 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2740 wrote to memory of 2272 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2740 wrote to memory of 2272 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2740 wrote to memory of 2272 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2740 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2740 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2740 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2740 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2740 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Windows\SysWOW64\schtasks.exe
PID 2740 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Windows\SysWOW64\schtasks.exe
PID 2740 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Windows\SysWOW64\schtasks.exe
PID 2740 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Windows\SysWOW64\schtasks.exe
PID 2740 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
PID 2740 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
PID 2740 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
PID 2740 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
PID 2740 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
PID 2740 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
PID 2740 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
PID 2740 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
PID 2740 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
PID 2740 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
PID 2740 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
PID 2740 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
PID 2740 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
PID 2740 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe

outlook_office_path

Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe N/A

outlook_win_path

Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe

"C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ciGjbEVbQeulG.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ciGjbEVbQeulG" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3F22.tmp"

C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe

"C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe"

C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe

"C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 sempersim.su udp
US 104.237.252.28:80 sempersim.su tcp
US 104.237.252.28:80 sempersim.su tcp
US 104.237.252.28:80 sempersim.su tcp
US 8.8.8.8:53 good.w0ln44.dnslog.cn udp
US 8.8.8.8:53 good.w0ln44.dnslog.cn udp
US 104.237.252.28:80 sempersim.su tcp
N/A 127.0.0.1:443 tcp
US 104.237.252.28:80 sempersim.su tcp

Files

memory/2740-0-0x0000000000CB0000-0x0000000000D30000-memory.dmp

memory/2740-1-0x0000000074B00000-0x00000000751EE000-memory.dmp

memory/2740-2-0x0000000004280000-0x00000000042C0000-memory.dmp

memory/2740-3-0x00000000005B0000-0x00000000005C4000-memory.dmp

memory/2740-5-0x00000000005F0000-0x00000000005FE000-memory.dmp

memory/2740-4-0x00000000005E0000-0x00000000005EA000-memory.dmp

memory/2740-6-0x0000000000C50000-0x0000000000CB2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp3F22.tmp

MD5 a974d21a411997b59bcaaef0a096352f
SHA1 0fc8aaf4d057c37ed278679d44de056ee661fb61
SHA256 4e9992eb44f001c2c10ca5abd20ce6cc94b51dcb8be6bf567a9a387015a9c638
SHA512 fd7c1c4309606a86347a627cbece0969a7e9c863f5531dacc393b377e7e1585028530407354f2bc299bc7422111bb37ee6c43719596b70e79ab0167a9f1f95fe

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

MD5 07ce002e871f8ea878cb36f13fe3a272
SHA1 f34255f6c9d911cca202b5c234ddfcdbe2d4676d
SHA256 82c99612720f6b5db2782055ac48a14a5399562f817fa0aa5d7b76455800fcd3
SHA512 eb019c4bf24c0de5642dba59a32bdbf721dbeeccb037bab7da09f85c1ae10bac21f165b7a0e9540ef764def020821d406004fbb36e220b2fb9ce6d833e3d0016

memory/2604-21-0x0000000000400000-0x00000000004A2000-memory.dmp

memory/2604-33-0x0000000000400000-0x00000000004A2000-memory.dmp

memory/2740-34-0x0000000074B00000-0x00000000751EE000-memory.dmp

memory/2604-31-0x0000000000400000-0x00000000004A2000-memory.dmp

memory/2604-29-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2272-36-0x000000006F360000-0x000000006F90B000-memory.dmp

memory/2632-35-0x000000006F360000-0x000000006F90B000-memory.dmp

memory/2632-38-0x0000000002B70000-0x0000000002BB0000-memory.dmp

memory/2272-39-0x000000006F360000-0x000000006F90B000-memory.dmp

memory/2272-37-0x0000000002640000-0x0000000002680000-memory.dmp

memory/2604-27-0x0000000000400000-0x00000000004A2000-memory.dmp

memory/2632-40-0x000000006F360000-0x000000006F90B000-memory.dmp

memory/2632-44-0x0000000002B70000-0x0000000002BB0000-memory.dmp

memory/2604-43-0x0000000000400000-0x00000000004A2000-memory.dmp

memory/2632-42-0x0000000002B70000-0x0000000002BB0000-memory.dmp

memory/2272-41-0x0000000002640000-0x0000000002680000-memory.dmp

memory/2604-25-0x0000000000400000-0x00000000004A2000-memory.dmp

memory/2604-23-0x0000000000400000-0x00000000004A2000-memory.dmp

memory/2604-19-0x0000000000400000-0x00000000004A2000-memory.dmp

memory/2632-45-0x000000006F360000-0x000000006F90B000-memory.dmp

memory/2272-46-0x000000006F360000-0x000000006F90B000-memory.dmp

memory/2604-50-0x0000000000400000-0x00000000004A2000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3452737119-3959686427-228443150-1000\0f5007522459c86e95ffcc62f32308f1_ad04ce47-83ca-4cca-a79e-77cdc80ce41e

MD5 c07225d4e7d01d31042965f048728a0a
SHA1 69d70b340fd9f44c89adb9a2278df84faa9906b7
SHA256 8c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a
SHA512 23d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b

C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3452737119-3959686427-228443150-1000\0f5007522459c86e95ffcc62f32308f1_ad04ce47-83ca-4cca-a79e-77cdc80ce41e

MD5 d898504a722bff1524134c6ab6a5eaa5
SHA1 e0fdc90c2ca2a0219c99d2758e68c18875a3e11e
SHA256 878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9
SHA512 26a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61

memory/2604-66-0x0000000000400000-0x00000000004A2000-memory.dmp

memory/2604-67-0x0000000000400000-0x00000000004A2000-memory.dmp

memory/2604-75-0x0000000000400000-0x00000000004A2000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-02 10:02

Reported

2024-04-02 10:05

Platform

win10v2004-20240226-en

Max time kernel

149s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe"

Signatures

Lokibot

trojan spyware stealer lokibot

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe N/A

Reads user/profile data of web browsers

spyware stealer

Accesses Microsoft Outlook profiles

collection
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: RenamesItself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4332 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4332 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4332 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4332 wrote to memory of 3152 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4332 wrote to memory of 3152 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4332 wrote to memory of 3152 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4332 wrote to memory of 4056 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Windows\SysWOW64\schtasks.exe
PID 4332 wrote to memory of 4056 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Windows\SysWOW64\schtasks.exe
PID 4332 wrote to memory of 4056 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Windows\SysWOW64\schtasks.exe
PID 4332 wrote to memory of 4328 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
PID 4332 wrote to memory of 4328 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
PID 4332 wrote to memory of 4328 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
PID 4332 wrote to memory of 4328 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
PID 4332 wrote to memory of 4328 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
PID 4332 wrote to memory of 4328 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
PID 4332 wrote to memory of 4328 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
PID 4332 wrote to memory of 4328 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe
PID 4332 wrote to memory of 4328 N/A C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe

outlook_office_path

Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe N/A

outlook_win_path

Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe

"C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ciGjbEVbQeulG.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ciGjbEVbQeulG" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6BBA.tmp"

C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe

"C:\Users\Admin\AppData\Local\Temp\61d2d93c84dfd913dbb976c21fdd3d87dd3100e9035e4dd04b3c5f4c3c705085.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 249.110.86.104.in-addr.arpa udp
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 sempersim.su udp
US 104.237.252.28:80 sempersim.su tcp
US 8.8.8.8:53 28.252.237.104.in-addr.arpa udp
US 104.237.252.28:80 sempersim.su tcp
US 104.237.252.28:80 sempersim.su tcp
US 8.8.8.8:53 good.w0ln44.dnslog.cn udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
NL 52.142.223.178:80 tcp
US 8.8.8.8:53 218.110.86.104.in-addr.arpa udp
US 104.237.252.28:80 sempersim.su tcp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
N/A 127.0.0.1:80 tcp
N/A 127.0.0.1:443 tcp
US 104.237.252.28:80 sempersim.su tcp
US 8.8.8.8:53 17.173.189.20.in-addr.arpa udp

Files

memory/4332-1-0x00000000751C0000-0x0000000075970000-memory.dmp

memory/4332-0-0x00000000000C0000-0x0000000000140000-memory.dmp

memory/4332-2-0x0000000004FB0000-0x0000000005554000-memory.dmp

memory/4332-3-0x0000000004B00000-0x0000000004B92000-memory.dmp

memory/4332-4-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

memory/4332-5-0x0000000004BC0000-0x0000000004BCA000-memory.dmp

memory/4332-6-0x0000000004E10000-0x0000000004E24000-memory.dmp

memory/4332-8-0x0000000004F70000-0x0000000004F7E000-memory.dmp

memory/4332-7-0x0000000004F60000-0x0000000004F6A000-memory.dmp

memory/4332-9-0x0000000005D60000-0x0000000005DC2000-memory.dmp

memory/4332-10-0x0000000008520000-0x00000000085BC000-memory.dmp

memory/2492-15-0x00000000029B0000-0x00000000029E6000-memory.dmp

memory/2492-16-0x00000000751C0000-0x0000000075970000-memory.dmp

memory/2492-17-0x00000000050F0000-0x0000000005100000-memory.dmp

memory/2492-19-0x00000000050F0000-0x0000000005100000-memory.dmp

memory/2492-18-0x0000000005730000-0x0000000005D58000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp6BBA.tmp

MD5 8014c0f9927456a386b0446b4ce693ce
SHA1 c6187f05d4ef1ddf0b36cbfbef27fe7bee3aaaf3
SHA256 b5c7c81fd32cde7c1b3999bee24ebfccb86de819c6b25ee9ac3383acecb580ab
SHA512 bec8ede466ae1e342402e16bcb860d272850478d8e9f20a80b94fe9ea68a79fd4d5f3535f13ba781d8c8d36efe69dcb5cb90150a95b26ffdfe2385a25c5e09a6

memory/3152-21-0x00000000751C0000-0x0000000075970000-memory.dmp

memory/3152-22-0x00000000025E0000-0x00000000025F0000-memory.dmp

memory/4328-23-0x0000000000400000-0x00000000004A2000-memory.dmp

memory/3152-26-0x0000000005740000-0x0000000005762000-memory.dmp

memory/4328-27-0x0000000000400000-0x00000000004A2000-memory.dmp

memory/4328-35-0x0000000000400000-0x00000000004A2000-memory.dmp

memory/2492-34-0x00000000055D0000-0x0000000005636000-memory.dmp

memory/3152-49-0x00000000059C0000-0x0000000005A26000-memory.dmp

memory/2492-50-0x0000000005E60000-0x00000000061B4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ayubqc20.bct.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4332-28-0x00000000751C0000-0x0000000075970000-memory.dmp

memory/3152-51-0x0000000005E90000-0x0000000005EAE000-memory.dmp

memory/3152-52-0x0000000005EE0000-0x0000000005F2C000-memory.dmp

memory/3152-53-0x000000007F330000-0x000000007F340000-memory.dmp

memory/2492-56-0x00000000715C0000-0x000000007160C000-memory.dmp

memory/3152-79-0x00000000070A0000-0x0000000007143000-memory.dmp

memory/3152-78-0x00000000025E0000-0x00000000025F0000-memory.dmp

memory/2492-68-0x00000000050F0000-0x0000000005100000-memory.dmp

memory/3152-83-0x00000000071E0000-0x00000000071FA000-memory.dmp

memory/3152-85-0x0000000007250000-0x000000000725A000-memory.dmp

memory/2492-82-0x0000000007C50000-0x00000000082CA000-memory.dmp

memory/2492-67-0x0000000006890000-0x00000000068AE000-memory.dmp

memory/3152-57-0x00000000715C0000-0x000000007160C000-memory.dmp

memory/3152-86-0x0000000007460000-0x00000000074F6000-memory.dmp

memory/2492-55-0x000000007F190000-0x000000007F1A0000-memory.dmp

memory/2492-87-0x0000000007810000-0x0000000007821000-memory.dmp

memory/3152-54-0x0000000006450000-0x0000000006482000-memory.dmp

memory/3152-88-0x0000000007410000-0x000000000741E000-memory.dmp

memory/2492-92-0x0000000007950000-0x000000000796A000-memory.dmp

memory/3152-94-0x0000000007500000-0x0000000007508000-memory.dmp

memory/3152-89-0x0000000007420000-0x0000000007434000-memory.dmp

memory/2492-104-0x00000000751C0000-0x0000000075970000-memory.dmp

memory/3152-103-0x00000000751C0000-0x0000000075970000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3270530367-132075249-2153716227-1000\0f5007522459c86e95ffcc62f32308f1_1821d3b4-fc3c-403b-ac71-765075a19c10

MD5 d898504a722bff1524134c6ab6a5eaa5
SHA1 e0fdc90c2ca2a0219c99d2758e68c18875a3e11e
SHA256 878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9
SHA512 26a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61

memory/4328-111-0x0000000000400000-0x00000000004A2000-memory.dmp

memory/4328-112-0x0000000000400000-0x00000000004A2000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3270530367-132075249-2153716227-1000\0f5007522459c86e95ffcc62f32308f1_1821d3b4-fc3c-403b-ac71-765075a19c10

MD5 c07225d4e7d01d31042965f048728a0a
SHA1 69d70b340fd9f44c89adb9a2278df84faa9906b7
SHA256 8c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a
SHA512 23d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b

memory/4328-119-0x0000000000400000-0x00000000004A2000-memory.dmp