Malware Analysis Report

2024-11-30 20:11

Sample ID 240509-g5g2yaha93
Target Dhl-02.exe
SHA256 42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1
Tags
zgrat persistence rat collection spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1

Threat Level: Known bad

The file Dhl-02.exe was found to be: Known bad.

Malicious Activity Summary

zgrat persistence rat collection spyware stealer

ZGRat

Detect ZGRat V1

Reads user/profile data of web browsers

Reads WinSCP keys stored on the system

Adds Run key to start application

Accesses Microsoft Outlook profiles

Suspicious use of SetThreadContext

Unsigned PE

outlook_office_path

Suspicious behavior: EnumeratesProcesses

outlook_win_path

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-09 06:23

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-09 06:23

Reported

2024-05-09 06:25

Platform

win7-20240508-en

Max time kernel

117s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"

Signatures

Detect ZGRat V1

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

ZGRat

rat zgrat

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ciogju = "C:\\Users\\Admin\\AppData\\Roaming\\Ciogju.exe" C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1716 wrote to memory of 3220 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3220 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3220 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3228 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3228 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3228 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3236 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3236 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3236 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3244 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3244 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3244 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3252 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3252 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3252 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3260 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3260 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3260 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3268 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3268 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3268 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3276 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3276 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3276 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3284 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3284 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3284 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3292 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3292 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 1716 wrote to memory of 3292 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe

Processes

C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe

"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"

C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe

"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"

C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe

"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"

C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe

"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"

C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe

"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"

C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe

"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"

C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe

"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"

C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe

"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"

C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe

"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"

C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe

"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"

C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe

"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"

Network

N/A

Files

memory/1716-0-0x000007FEF5833000-0x000007FEF5834000-memory.dmp

memory/1716-1-0x0000000000E60000-0x000000000147A000-memory.dmp

memory/1716-2-0x000000001B950000-0x000000001BC46000-memory.dmp

memory/1716-3-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-6-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-10-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-8-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-4-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-20-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-28-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-36-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-42-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-40-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-38-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-34-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-32-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-30-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-26-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-24-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-22-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-18-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-16-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-14-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-12-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-58-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-64-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-66-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-62-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-60-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-56-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-54-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-52-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-50-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-48-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-46-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-44-0x000000001B950000-0x000000001BC3F000-memory.dmp

memory/1716-4885-0x0000000000480000-0x00000000004CC000-memory.dmp

memory/1716-4884-0x000000001B520000-0x000000001B650000-memory.dmp

memory/1716-4883-0x000007FEF5830000-0x000007FEF621C000-memory.dmp

memory/1716-4886-0x000007FEF5830000-0x000007FEF621C000-memory.dmp

memory/1716-4887-0x000007FEF5833000-0x000007FEF5834000-memory.dmp

memory/1716-4888-0x000007FEF5830000-0x000007FEF621C000-memory.dmp

memory/1716-4889-0x0000000000A00000-0x0000000000A54000-memory.dmp

memory/1716-4891-0x000007FEF5830000-0x000007FEF621C000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-09 06:23

Reported

2024-05-09 06:25

Platform

win10v2004-20240426-en

Max time kernel

131s

Max time network

136s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"

Signatures

Detect ZGRat V1

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

ZGRat

rat zgrat

Reads WinSCP keys stored on the system

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Accesses Microsoft Outlook profiles

collection
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ciogju = "C:\\Users\\Admin\\AppData\\Roaming\\Ciogju.exe" C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Dhl-02 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Dhl-02.exe" C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 980 set thread context of 5092 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 980 wrote to memory of 3776 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 980 wrote to memory of 3776 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 980 wrote to memory of 1684 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 980 wrote to memory of 1684 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 980 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 980 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 980 wrote to memory of 4504 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 980 wrote to memory of 4504 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 980 wrote to memory of 904 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 980 wrote to memory of 904 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 980 wrote to memory of 3916 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 980 wrote to memory of 3916 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 980 wrote to memory of 4908 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 980 wrote to memory of 4908 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 980 wrote to memory of 5092 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 980 wrote to memory of 5092 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 980 wrote to memory of 5092 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 980 wrote to memory of 5092 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 980 wrote to memory of 5092 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 980 wrote to memory of 5092 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 980 wrote to memory of 5092 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe
PID 5092 wrote to memory of 848 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5092 wrote to memory of 848 N/A C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

outlook_office_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A

outlook_win_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe

"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"

C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe

"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"

C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe

"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"

C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe

"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"

C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe

"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"

C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe

"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"

C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe

"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"

C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe

"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"

C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe

"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Dhl-02';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Dhl-02' -Value '"C:\Users\Admin\AppData\Local\Temp\Dhl-02.exe"' -PropertyType 'String'

Network

Country Destination Domain Proto
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
BE 2.17.107.120:443 www.bing.com tcp
US 8.8.8.8:53 120.107.17.2.in-addr.arpa udp
BE 88.221.83.200:443 www.bing.com tcp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 200.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 25.14.97.104.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
BG 91.92.120.13:62520 tcp
US 8.8.8.8:53 13.120.92.91.in-addr.arpa udp
BG 91.92.120.13:62520 tcp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp

Files

memory/980-0-0x00007FFF52843000-0x00007FFF52845000-memory.dmp

memory/980-1-0x000002AA25900000-0x000002AA25F1A000-memory.dmp

memory/980-2-0x00007FFF52840000-0x00007FFF53301000-memory.dmp

memory/980-3-0x000002AA403B0000-0x000002AA406A6000-memory.dmp

memory/980-9-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-7-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-13-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-17-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-46-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-29-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-27-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-25-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-23-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-21-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-19-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-15-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-11-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-5-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-4-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-67-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-63-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-55-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-53-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-51-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-65-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-61-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-59-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-57-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-49-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-47-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-43-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-41-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-39-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-37-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-35-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-33-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-31-0x000002AA403B0000-0x000002AA4069F000-memory.dmp

memory/980-4884-0x00007FFF52840000-0x00007FFF53301000-memory.dmp

memory/980-4886-0x000002AA408D0000-0x000002AA4091C000-memory.dmp

memory/980-4885-0x000002AA407A0000-0x000002AA408D0000-memory.dmp

memory/980-4887-0x00007FFF52843000-0x00007FFF52845000-memory.dmp

memory/980-4888-0x000002AA413A0000-0x000002AA413F4000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Dhl-02.exe.log

MD5 6f408816817e33f5f4ebb1c1e003d092
SHA1 b0bf9711f489059b99f855074a15e8a959c8ad23
SHA256 8e1faf387747313f6ad561ef2620ea92d18192aa9c73259a0a3692d5aa42f074
SHA512 dd00e17c8fe2769143bde45b5bed2352f89f032c28f6a51cfc17eedaefd15a953778215488b8a9fb44269042166dd33b0dd190ffb03cf8790b88173d8d07dce2

memory/5092-4895-0x000001F31C650000-0x000001F31C766000-memory.dmp

memory/980-4896-0x00007FFF52840000-0x00007FFF53301000-memory.dmp

memory/5092-4903-0x00007FFF52840000-0x00007FFF53301000-memory.dmp

memory/980-4897-0x00007FFF52840000-0x00007FFF53301000-memory.dmp

memory/5092-5023-0x00007FFF52840000-0x00007FFF53301000-memory.dmp

memory/5092-7218-0x000001F3024B0000-0x000001F3024B8000-memory.dmp

memory/5092-7219-0x000001F303CB0000-0x000001F303D4E000-memory.dmp

memory/5092-7220-0x000001F31C7B0000-0x000001F31C7DC000-memory.dmp

memory/5092-7221-0x000001F31CA60000-0x000001F31CADA000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Vxcekdcr.tmpdb

MD5 73bd1e15afb04648c24593e8ba13e983
SHA1 4dd85ca46fcdf9d93f6b324f8bb0b5bb512a1b91
SHA256 aab0b201f392fef9fdff09e56a9d0ac33d0f68be95da270e6dab89bb1f971d8b
SHA512 6eb58fb41691894045569085bd64a83acd62277575ab002cf73d729bda4b6d43c36643a5fa336342e87a493326337ed43b8e5eaeae32f53210714699cb8dfac7

C:\Users\Admin\AppData\Local\Temp\Eecpolzti.tmpdb

MD5 9618e15b04a4ddb39ed6c496575f6f95
SHA1 1c28f8750e5555776b3c80b187c5d15a443a7412
SHA256 a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512 f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tc2ffw1f.za1.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/848-7281-0x0000013FE8210000-0x0000013FE8232000-memory.dmp

memory/5092-7286-0x00007FFF52840000-0x00007FFF53301000-memory.dmp