Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 17:43
Static task
static1
Behavioral task
behavioral1
Sample
c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe
Resource
win10v2004-20240426-en
General
-
Target
c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe
-
Size
128KB
-
MD5
ff1345a5d3793e5e16f0151559173127
-
SHA1
2df0cad48f2864ab08fbb154e3f668483af8d259
-
SHA256
c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b
-
SHA512
2da1cfbb5572bba3144868420cb48dd0d40d0c1b9aaaaa52672e2dfea4b8bf0b0922260659eda7487828c03fae9d87b615208482dd66ab548006ffea9741ded3
-
SSDEEP
1536:AeyWofcZ1MTiR/dj6rdQUCQybhtBTYDct+9DdbqQOPJbJ7v0VijU0tE9u:/6TiGrghrYDcMrObB0VijVE9u
Malware Config
Signatures
-
Detect ZGRat V1 37 IoCs
resource yara_rule behavioral2/memory/2388-3-0x0000000006A60000-0x0000000006D10000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-7-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-6-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-13-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-29-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-37-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-61-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-69-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-67-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-65-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-63-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-59-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-57-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-55-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-53-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-51-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-47-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-45-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-43-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-41-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-35-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-49-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-31-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-39-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-33-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-27-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-23-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-21-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-19-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-17-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-15-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-11-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-9-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2388-25-0x0000000006A60000-0x0000000006D09000-memory.dmp family_zgrat_v1 behavioral2/memory/2744-4895-0x00000000019F0000-0x0000000001AD8000-memory.dmp family_zgrat_v1 behavioral2/memory/5408-14228-0x0000000005910000-0x0000000005BFC000-memory.dmp family_zgrat_v1 behavioral2/memory/5048-21415-0x0000000005AB0000-0x0000000005B20000-memory.dmp family_zgrat_v1 -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 5408 yownexbjd.exe 5048 yownexbjd.exe 5348 Smpnwdf.exe 2784 Smpnwdf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook yownexbjd.exe Key queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook yownexbjd.exe Key opened \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook yownexbjd.exe Key opened \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook yownexbjd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook yownexbjd.exe Key queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook yownexbjd.exe Key queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key opened \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook yownexbjd.exe Key queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook yownexbjd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook yownexbjd.exe Key opened \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook yownexbjd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key opened \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook yownexbjd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key opened \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook yownexbjd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook yownexbjd.exe Key queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe Key queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook yownexbjd.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yyuenpkjc = "C:\\Users\\Admin\\AppData\\Roaming\\Yyuenpkjc.exe" c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bufco = "C:\\Users\\Admin\\AppData\\Roaming\\Bufco.exe" yownexbjd.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2388 set thread context of 2744 2388 c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe 91 PID 2744 set thread context of 4328 2744 c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe 98 PID 4328 set thread context of 5308 4328 MSBuild.exe 101 PID 5408 set thread context of 5048 5408 yownexbjd.exe 103 PID 5348 set thread context of 2784 5348 Smpnwdf.exe 107 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5048 yownexbjd.exe 5048 yownexbjd.exe 5048 yownexbjd.exe 5048 yownexbjd.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2388 c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe Token: SeDebugPrivilege 2388 c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe Token: SeDebugPrivilege 2744 c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe Token: SeDebugPrivilege 4328 MSBuild.exe Token: SeDebugPrivilege 4328 MSBuild.exe Token: SeDebugPrivilege 5308 MSBuild.exe Token: SeDebugPrivilege 5408 yownexbjd.exe Token: SeDebugPrivilege 5408 yownexbjd.exe Token: SeDebugPrivilege 5048 yownexbjd.exe Token: SeDebugPrivilege 5348 Smpnwdf.exe Token: SeDebugPrivilege 5348 Smpnwdf.exe Token: SeDebugPrivilege 2784 Smpnwdf.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2744 2388 c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe 91 PID 2388 wrote to memory of 2744 2388 c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe 91 PID 2388 wrote to memory of 2744 2388 c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe 91 PID 2388 wrote to memory of 2744 2388 c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe 91 PID 2388 wrote to memory of 2744 2388 c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe 91 PID 2388 wrote to memory of 2744 2388 c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe 91 PID 2388 wrote to memory of 2744 2388 c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe 91 PID 2388 wrote to memory of 2744 2388 c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe 91 PID 2744 wrote to memory of 4328 2744 c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe 98 PID 2744 wrote to memory of 4328 2744 c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe 98 PID 2744 wrote to memory of 4328 2744 c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe 98 PID 2744 wrote to memory of 4328 2744 c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe 98 PID 2744 wrote to memory of 4328 2744 c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe 98 PID 2744 wrote to memory of 4328 2744 c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe 98 PID 2744 wrote to memory of 4328 2744 c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe 98 PID 2744 wrote to memory of 4328 2744 c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe 98 PID 4328 wrote to memory of 5308 4328 MSBuild.exe 101 PID 4328 wrote to memory of 5308 4328 MSBuild.exe 101 PID 4328 wrote to memory of 5308 4328 MSBuild.exe 101 PID 4328 wrote to memory of 5308 4328 MSBuild.exe 101 PID 4328 wrote to memory of 5308 4328 MSBuild.exe 101 PID 4328 wrote to memory of 5308 4328 MSBuild.exe 101 PID 4328 wrote to memory of 5308 4328 MSBuild.exe 101 PID 4328 wrote to memory of 5308 4328 MSBuild.exe 101 PID 5408 wrote to memory of 5048 5408 yownexbjd.exe 103 PID 5408 wrote to memory of 5048 5408 yownexbjd.exe 103 PID 5408 wrote to memory of 5048 5408 yownexbjd.exe 103 PID 5408 wrote to memory of 5048 5408 yownexbjd.exe 103 PID 5408 wrote to memory of 5048 5408 yownexbjd.exe 103 PID 5408 wrote to memory of 5048 5408 yownexbjd.exe 103 PID 5408 wrote to memory of 5048 5408 yownexbjd.exe 103 PID 5408 wrote to memory of 5048 5408 yownexbjd.exe 103 PID 5048 wrote to memory of 5348 5048 yownexbjd.exe 105 PID 5048 wrote to memory of 5348 5048 yownexbjd.exe 105 PID 5048 wrote to memory of 5348 5048 yownexbjd.exe 105 PID 5348 wrote to memory of 2784 5348 Smpnwdf.exe 107 PID 5348 wrote to memory of 2784 5348 Smpnwdf.exe 107 PID 5348 wrote to memory of 2784 5348 Smpnwdf.exe 107 PID 5348 wrote to memory of 2784 5348 Smpnwdf.exe 107 PID 5348 wrote to memory of 2784 5348 Smpnwdf.exe 107 PID 5348 wrote to memory of 2784 5348 Smpnwdf.exe 107 PID 5348 wrote to memory of 2784 5348 Smpnwdf.exe 107 PID 5348 wrote to memory of 2784 5348 Smpnwdf.exe 107 -
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yownexbjd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe"C:\Users\Admin\AppData\Local\Temp\c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe"C:\Users\Admin\AppData\Local\Temp\c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5308
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\yownexbjd.exeC:\Users\Admin\AppData\Local\Temp\yownexbjd.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5408 -
C:\Users\Admin\AppData\Local\Temp\yownexbjd.exe"C:\Users\Admin\AppData\Local\Temp\yownexbjd.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\Smpnwdf.exe"C:\Users\Admin\AppData\Local\Temp\Smpnwdf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5348 -
C:\Users\Admin\AppData\Local\Temp\Smpnwdf.exe"C:\Users\Admin\AppData\Local\Temp\Smpnwdf.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe.log
Filesize1KB
MD5f3eb81974dc5933681e933f07209ff5f
SHA17af8cae0f1d03e82daaf784df9886705685baac7
SHA256e82069884dd428bd6a1c67fe00c5fa56f9c4d62b538b694694a699588f1f4ab2
SHA512d9aa3871dffb76c8a73a7940fa03bbc9b65cf575cbd07f7c1fbf490cb0f3d670415eaef0bf79e34689f61ab3cdfbb104efdef004becc12e54b501f02f948aaff
-
Filesize
805B
MD558a9108e39c2ea50e65c23be3a9407cf
SHA1fb21f7b9330aa1a77080a3243b81b49035102d7b
SHA2566049be83020702896a539b5c8c13270add224d7b91b3ee0bebc328791b74a84b
SHA51293804ee8a4560503e47c07f5fa4a959e23355a01aba406c103d339debc9b2b1d20a345cdbb8d8069dac97b9151f228cf559ac3dde1500e3484fba1a4126842bf
-
Filesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26
-
Filesize
152KB
MD573bd1e15afb04648c24593e8ba13e983
SHA14dd85ca46fcdf9d93f6b324f8bb0b5bb512a1b91
SHA256aab0b201f392fef9fdff09e56a9d0ac33d0f68be95da270e6dab89bb1f971d8b
SHA5126eb58fb41691894045569085bd64a83acd62277575ab002cf73d729bda4b6d43c36643a5fa336342e87a493326337ed43b8e5eaeae32f53210714699cb8dfac7
-
Filesize
3.0MB
MD5e5b17f857d175e73ec7e01b3798681bc
SHA1209dcbe754ea979cc64c42c6c259673e4cd5bc57
SHA25635915ae50a51401e9d9fbbbdccba0e83d6f48f18caaec3fe9d80a6747d7d88de
SHA5122b43a6a015fc925be8c971a75b7f19b1a1aa99066ab33439aac5baf2ee68583ed0abd9292572c4ddb7ef51df49bd878da359369633343551776232028d940ba8
-
Filesize
128KB
MD5ff1345a5d3793e5e16f0151559173127
SHA12df0cad48f2864ab08fbb154e3f668483af8d259
SHA256c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b
SHA5122da1cfbb5572bba3144868420cb48dd0d40d0c1b9aaaaa52672e2dfea4b8bf0b0922260659eda7487828c03fae9d87b615208482dd66ab548006ffea9741ded3