Analysis
-
max time kernel
148s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 07:16
Static task
static1
Behavioral task
behavioral1
Sample
AFC Drawing for POMB Support Base.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
AFC Drawing for POMB Support Base.exe
Resource
win10v2004-20240419-en
General
-
Target
AFC Drawing for POMB Support Base.exe
-
Size
245KB
-
MD5
eaa4063b22edbfb291c5d66acac6dfe3
-
SHA1
416ed8f73fb134cac9fecb3cb5dea409317ebf21
-
SHA256
5bc488bb19629699f5ef130f3bc37a5edf155dedb22220bfbfa49bf8bee45901
-
SHA512
64bb802d17433e4c4bbcb1bf76a353326b141fd2cfb55440e64dff3576e61d6029ed95844ddeb2dbcd29852439486c5c05b107aada6b613948efe423e43bfe9e
-
SSDEEP
3072:np6d0SCBM+0sr5h5gVBqHWniEHcsQh6WdNUhjVI8l+X1845b46DsFG+if:0H8512UfnUI1jtf
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1263338506:AAEo1afaqZcanZqwKGJF2HA7xr6YOHyXHtU/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 36 IoCs
resource yara_rule behavioral2/memory/2480-3-0x0000000006F40000-0x000000000722A000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-6-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-11-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-25-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-29-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-27-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-23-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-21-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-19-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-17-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-15-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-13-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-9-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-7-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-53-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-59-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-69-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-67-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-65-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-63-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-61-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-57-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-55-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-51-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-49-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-47-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-45-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-43-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-41-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-37-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-35-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-33-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-39-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/2480-31-0x0000000006F40000-0x0000000007224000-memory.dmp family_zgrat_v1 behavioral2/memory/4900-7190-0x00000000056C0000-0x0000000005730000-memory.dmp family_zgrat_v1 behavioral2/memory/5744-7256-0x0000000006320000-0x0000000006550000-memory.dmp family_zgrat_v1 -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 5744 Fszqicjnwn.exe 5992 Fszqicjnwn.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 48 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook AFC Drawing for POMB Support Base.exe Key queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook AFC Drawing for POMB Support Base.exe Key queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key opened \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Fszqicjnwn.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook AFC Drawing for POMB Support Base.exe Key opened \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Fszqicjnwn.exe Key opened \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook AFC Drawing for POMB Support Base.exe Key opened \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook AFC Drawing for POMB Support Base.exe Key opened \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook AFC Drawing for POMB Support Base.exe Key opened \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook AFC Drawing for POMB Support Base.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key opened \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook AFC Drawing for POMB Support Base.exe Key queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook AFC Drawing for POMB Support Base.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook AFC Drawing for POMB Support Base.exe Key queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Fszqicjnwn.exe Key opened \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Fszqicjnwn.exe Key queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook AFC Drawing for POMB Support Base.exe Key queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook AFC Drawing for POMB Support Base.exe Key queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Fszqicjnwn.exe Key queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook AFC Drawing for POMB Support Base.exe Key opened \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key opened \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook AFC Drawing for POMB Support Base.exe Key queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe Key queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Fszqicjnwn.exe Key created \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AFC Drawing for POMB Support Base.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\notepad = "C:\\Users\\Admin\\AppData\\Roaming\\notepad.exe" AFC Drawing for POMB Support Base.exe Set value (str) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\notepad = "C:\\Users\\Admin\\AppData\\Roaming\\notepad.exe" Fszqicjnwn.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 59 api.ipify.org 60 api.ipify.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2480 set thread context of 4900 2480 AFC Drawing for POMB Support Base.exe 98 PID 5744 set thread context of 5992 5744 Fszqicjnwn.exe 101 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4900 AFC Drawing for POMB Support Base.exe 4900 AFC Drawing for POMB Support Base.exe 4900 AFC Drawing for POMB Support Base.exe 4900 AFC Drawing for POMB Support Base.exe 5992 Fszqicjnwn.exe 5992 Fszqicjnwn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2480 AFC Drawing for POMB Support Base.exe Token: SeDebugPrivilege 2480 AFC Drawing for POMB Support Base.exe Token: SeDebugPrivilege 4900 AFC Drawing for POMB Support Base.exe Token: SeDebugPrivilege 5744 Fszqicjnwn.exe Token: SeDebugPrivilege 5744 Fszqicjnwn.exe Token: SeDebugPrivilege 5992 Fszqicjnwn.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5992 Fszqicjnwn.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2480 wrote to memory of 4900 2480 AFC Drawing for POMB Support Base.exe 98 PID 2480 wrote to memory of 4900 2480 AFC Drawing for POMB Support Base.exe 98 PID 2480 wrote to memory of 4900 2480 AFC Drawing for POMB Support Base.exe 98 PID 2480 wrote to memory of 4900 2480 AFC Drawing for POMB Support Base.exe 98 PID 2480 wrote to memory of 4900 2480 AFC Drawing for POMB Support Base.exe 98 PID 2480 wrote to memory of 4900 2480 AFC Drawing for POMB Support Base.exe 98 PID 2480 wrote to memory of 4900 2480 AFC Drawing for POMB Support Base.exe 98 PID 2480 wrote to memory of 4900 2480 AFC Drawing for POMB Support Base.exe 98 PID 4900 wrote to memory of 5744 4900 AFC Drawing for POMB Support Base.exe 99 PID 4900 wrote to memory of 5744 4900 AFC Drawing for POMB Support Base.exe 99 PID 4900 wrote to memory of 5744 4900 AFC Drawing for POMB Support Base.exe 99 PID 5744 wrote to memory of 5992 5744 Fszqicjnwn.exe 101 PID 5744 wrote to memory of 5992 5744 Fszqicjnwn.exe 101 PID 5744 wrote to memory of 5992 5744 Fszqicjnwn.exe 101 PID 5744 wrote to memory of 5992 5744 Fszqicjnwn.exe 101 PID 5744 wrote to memory of 5992 5744 Fszqicjnwn.exe 101 PID 5744 wrote to memory of 5992 5744 Fszqicjnwn.exe 101 PID 5744 wrote to memory of 5992 5744 Fszqicjnwn.exe 101 PID 5744 wrote to memory of 5992 5744 Fszqicjnwn.exe 101 -
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Fszqicjnwn.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Fszqicjnwn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AFC Drawing for POMB Support Base.exe"C:\Users\Admin\AppData\Local\Temp\AFC Drawing for POMB Support Base.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\AFC Drawing for POMB Support Base.exe"C:\Users\Admin\AppData\Local\Temp\AFC Drawing for POMB Support Base.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\Fszqicjnwn.exe"C:\Users\Admin\AppData\Local\Temp\Fszqicjnwn.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5744 -
C:\Users\Admin\AppData\Local\Temp\Fszqicjnwn.exe"C:\Users\Admin\AppData\Local\Temp\Fszqicjnwn.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:5992
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AFC Drawing for POMB Support Base.exe.log
Filesize1KB
MD5f3eb81974dc5933681e933f07209ff5f
SHA17af8cae0f1d03e82daaf784df9886705685baac7
SHA256e82069884dd428bd6a1c67fe00c5fa56f9c4d62b538b694694a699588f1f4ab2
SHA512d9aa3871dffb76c8a73a7940fa03bbc9b65cf575cbd07f7c1fbf490cb0f3d670415eaef0bf79e34689f61ab3cdfbb104efdef004becc12e54b501f02f948aaff
-
Filesize
805B
MD558a9108e39c2ea50e65c23be3a9407cf
SHA1fb21f7b9330aa1a77080a3243b81b49035102d7b
SHA2566049be83020702896a539b5c8c13270add224d7b91b3ee0bebc328791b74a84b
SHA51293804ee8a4560503e47c07f5fa4a959e23355a01aba406c103d339debc9b2b1d20a345cdbb8d8069dac97b9151f228cf559ac3dde1500e3484fba1a4126842bf
-
Filesize
2.4MB
MD5013509ef3b108013bfc2d6c7b162e72d
SHA1212eea3ac01b8724a91eb8264e4415a37579a428
SHA25609e6b503aa842d1861a0a6fb468ecad81e9307fa9e628a46bc0d119832735340
SHA512003fd9ff90b49fdcc933a1f561c72d1854295071a74afb417d7108bb775a03c8611d4a8692a54921a65fd1397342fad2ba5a2b78a68a3e6599137be9c6e73fec
-
Filesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
245KB
MD5eaa4063b22edbfb291c5d66acac6dfe3
SHA1416ed8f73fb134cac9fecb3cb5dea409317ebf21
SHA2565bc488bb19629699f5ef130f3bc37a5edf155dedb22220bfbfa49bf8bee45901
SHA51264bb802d17433e4c4bbcb1bf76a353326b141fd2cfb55440e64dff3576e61d6029ed95844ddeb2dbcd29852439486c5c05b107aada6b613948efe423e43bfe9e