Analysis Overview
SHA256
42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1
Threat Level: Known bad
The file Dhl-02.exe was found to be: Known bad.
Malicious Activity Summary
ZGRat
Detect ZGRat V1
Reads user/profile data of web browsers
Reads WinSCP keys stored on the system
Adds Run key to start application
Accesses Microsoft Outlook profiles
Suspicious use of SetThreadContext
Unsigned PE
outlook_office_path
Suspicious behavior: EnumeratesProcesses
outlook_win_path
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-05-09 06:23
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-09 06:23
Reported
2024-05-09 06:25
Platform
win7-20240508-en
Max time kernel
117s
Max time network
120s
Command Line
Signatures
Detect ZGRat V1
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
ZGRat
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ciogju = "C:\\Users\\Admin\\AppData\\Roaming\\Ciogju.exe" | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"
C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"
C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"
C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"
C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"
C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"
C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"
C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"
C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"
C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"
C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"
Network
Files
memory/1716-0-0x000007FEF5833000-0x000007FEF5834000-memory.dmp
memory/1716-1-0x0000000000E60000-0x000000000147A000-memory.dmp
memory/1716-2-0x000000001B950000-0x000000001BC46000-memory.dmp
memory/1716-3-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-6-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-10-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-8-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-4-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-20-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-28-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-36-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-42-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-40-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-38-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-34-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-32-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-30-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-26-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-24-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-22-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-18-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-16-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-14-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-12-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-58-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-64-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-66-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-62-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-60-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-56-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-54-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-52-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-50-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-48-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-46-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-44-0x000000001B950000-0x000000001BC3F000-memory.dmp
memory/1716-4885-0x0000000000480000-0x00000000004CC000-memory.dmp
memory/1716-4884-0x000000001B520000-0x000000001B650000-memory.dmp
memory/1716-4883-0x000007FEF5830000-0x000007FEF621C000-memory.dmp
memory/1716-4886-0x000007FEF5830000-0x000007FEF621C000-memory.dmp
memory/1716-4887-0x000007FEF5833000-0x000007FEF5834000-memory.dmp
memory/1716-4888-0x000007FEF5830000-0x000007FEF621C000-memory.dmp
memory/1716-4889-0x0000000000A00000-0x0000000000A54000-memory.dmp
memory/1716-4891-0x000007FEF5830000-0x000007FEF621C000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-09 06:23
Reported
2024-05-09 06:25
Platform
win10v2004-20240426-en
Max time kernel
131s
Max time network
136s
Command Line
Signatures
Detect ZGRat V1
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
ZGRat
Reads WinSCP keys stored on the system
Reads user/profile data of web browsers
Accesses Microsoft Outlook profiles
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key queried | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key queried | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key queried | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key queried | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key queried | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key queried | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key queried | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key queried | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key queried | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key queried | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key queried | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key queried | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key queried | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key queried | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ciogju = "C:\\Users\\Admin\\AppData\\Roaming\\Ciogju.exe" | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Dhl-02 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Dhl-02.exe" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 980 set thread context of 5092 | N/A | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of WriteProcessMemory
outlook_office_path
| Description | Indicator | Process | Target |
| Key queried | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
outlook_win_path
| Description | Indicator | Process | Target |
| Key queried | \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 | C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"
C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"
C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"
C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"
C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"
C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"
C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"
C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"
C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Dhl-02';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Dhl-02' -Value '"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"' -PropertyType 'String'
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.159.190.20.in-addr.arpa | udp |
| BE | 2.17.107.120:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 120.107.17.2.in-addr.arpa | udp |
| BE | 88.221.83.200:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 88.156.103.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.83.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 25.14.97.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| BG | 91.92.120.13:62520 | tcp | |
| US | 8.8.8.8:53 | 13.120.92.91.in-addr.arpa | udp |
| BG | 91.92.120.13:62520 | tcp | |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
Files
memory/980-0-0x00007FFF52843000-0x00007FFF52845000-memory.dmp
memory/980-1-0x000002AA25900000-0x000002AA25F1A000-memory.dmp
memory/980-2-0x00007FFF52840000-0x00007FFF53301000-memory.dmp
memory/980-3-0x000002AA403B0000-0x000002AA406A6000-memory.dmp
memory/980-9-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-7-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-13-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-17-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-46-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-29-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-27-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-25-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-23-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-21-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-19-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-15-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-11-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-5-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-4-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-67-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-63-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-55-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-53-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-51-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-65-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-61-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-59-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-57-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-49-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-47-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-43-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-41-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-39-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-37-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-35-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-33-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-31-0x000002AA403B0000-0x000002AA4069F000-memory.dmp
memory/980-4884-0x00007FFF52840000-0x00007FFF53301000-memory.dmp
memory/980-4886-0x000002AA408D0000-0x000002AA4091C000-memory.dmp
memory/980-4885-0x000002AA407A0000-0x000002AA408D0000-memory.dmp
memory/980-4887-0x00007FFF52843000-0x00007FFF52845000-memory.dmp
memory/980-4888-0x000002AA413A0000-0x000002AA413F4000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Dhl-02.exe.log
| MD5 | 6f408816817e33f5f4ebb1c1e003d092 |
| SHA1 | b0bf9711f489059b99f855074a15e8a959c8ad23 |
| SHA256 | 8e1faf387747313f6ad561ef2620ea92d18192aa9c73259a0a3692d5aa42f074 |
| SHA512 | dd00e17c8fe2769143bde45b5bed2352f89f032c28f6a51cfc17eedaefd15a953778215488b8a9fb44269042166dd33b0dd190ffb03cf8790b88173d8d07dce2 |
memory/5092-4895-0x000001F31C650000-0x000001F31C766000-memory.dmp
memory/980-4896-0x00007FFF52840000-0x00007FFF53301000-memory.dmp
memory/5092-4903-0x00007FFF52840000-0x00007FFF53301000-memory.dmp
memory/980-4897-0x00007FFF52840000-0x00007FFF53301000-memory.dmp
memory/5092-5023-0x00007FFF52840000-0x00007FFF53301000-memory.dmp
memory/5092-7218-0x000001F3024B0000-0x000001F3024B8000-memory.dmp
memory/5092-7219-0x000001F303CB0000-0x000001F303D4E000-memory.dmp
memory/5092-7220-0x000001F31C7B0000-0x000001F31C7DC000-memory.dmp
memory/5092-7221-0x000001F31CA60000-0x000001F31CADA000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Vxcekdcr.tmpdb
| MD5 | 73bd1e15afb04648c24593e8ba13e983 |
| SHA1 | 4dd85ca46fcdf9d93f6b324f8bb0b5bb512a1b91 |
| SHA256 | aab0b201f392fef9fdff09e56a9d0ac33d0f68be95da270e6dab89bb1f971d8b |
| SHA512 | 6eb58fb41691894045569085bd64a83acd62277575ab002cf73d729bda4b6d43c36643a5fa336342e87a493326337ed43b8e5eaeae32f53210714699cb8dfac7 |
C:\Users\Admin\AppData\Local\Temp\Eecpolzti.tmpdb
| MD5 | 9618e15b04a4ddb39ed6c496575f6f95 |
| SHA1 | 1c28f8750e5555776b3c80b187c5d15a443a7412 |
| SHA256 | a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab |
| SHA512 | f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26 |
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tc2ffw1f.za1.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/848-7281-0x0000013FE8210000-0x0000013FE8232000-memory.dmp
memory/5092-7286-0x00007FFF52840000-0x00007FFF53301000-memory.dmp