Malware Analysis Report

2024-11-15 08:44

Sample ID 240510-bpptysad31
Target 42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
SHA256 42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1
Tags
zgrat persistence rat collection spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1

Threat Level: Known bad

The file 42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe was found to be: Known bad.

Malicious Activity Summary

zgrat persistence rat collection spyware stealer

ZGRat

Detect ZGRat V1

Reads user/profile data of web browsers

Reads WinSCP keys stored on the system

Accesses Microsoft Outlook profiles

Adds Run key to start application

Suspicious use of SetThreadContext

Unsigned PE

Suspicious use of WriteProcessMemory

outlook_office_path

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

outlook_win_path

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-10 01:19

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-10 01:19

Reported

2024-05-10 01:21

Platform

win7-20240221-en

Max time kernel

121s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"

Signatures

Detect ZGRat V1

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

ZGRat

rat zgrat

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ciogju = "C:\\Users\\Admin\\AppData\\Roaming\\Ciogju.exe" C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2724 wrote to memory of 2416 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2416 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2416 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2668 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2432 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2432 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2432 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2672 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2672 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2672 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2524 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2524 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2524 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2452 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2452 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 2724 wrote to memory of 2452 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe

Processes

C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe

"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"

C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe

"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"

C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe

"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"

C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe

"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"

C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe

"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"

C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe

"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"

C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe

"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"

C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe

"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"

C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe

"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"

C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe

"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"

C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe

"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"

Network

N/A

Files

memory/2724-0-0x000007FEF58F3000-0x000007FEF58F4000-memory.dmp

memory/2724-1-0x00000000001A0000-0x00000000007BA000-memory.dmp

memory/2724-2-0x000000001BB40000-0x000000001BE36000-memory.dmp

memory/2724-3-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-4-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-22-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-6-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-8-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-12-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-16-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-24-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-28-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-32-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-34-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-36-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-30-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-20-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-18-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-14-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-10-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-26-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-38-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-40-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-42-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-66-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-64-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-62-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-60-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-58-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-56-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-54-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-52-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-50-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-48-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-46-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-44-0x000000001BB40000-0x000000001BE2F000-memory.dmp

memory/2724-4884-0x0000000000830000-0x000000000087C000-memory.dmp

memory/2724-4883-0x000000001B900000-0x000000001BA30000-memory.dmp

memory/2724-4885-0x000007FEF58F0000-0x000007FEF62DC000-memory.dmp

memory/2724-4886-0x000007FEF58F0000-0x000007FEF62DC000-memory.dmp

memory/2724-4887-0x000007FEF58F3000-0x000007FEF58F4000-memory.dmp

memory/2724-4888-0x000007FEF58F0000-0x000007FEF62DC000-memory.dmp

memory/2724-4889-0x0000000000980000-0x00000000009D4000-memory.dmp

memory/2724-4891-0x000007FEF58F0000-0x000007FEF62DC000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-10 01:19

Reported

2024-05-10 01:21

Platform

win10v2004-20240426-en

Max time kernel

129s

Max time network

131s

Command Line

"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"

Signatures

Detect ZGRat V1

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

ZGRat

rat zgrat

Reads WinSCP keys stored on the system

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Accesses Microsoft Outlook profiles

collection
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe" C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ciogju = "C:\\Users\\Admin\\AppData\\Roaming\\Ciogju.exe" C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3800 wrote to memory of 756 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 3800 wrote to memory of 756 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 3800 wrote to memory of 3484 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 3800 wrote to memory of 3484 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 3800 wrote to memory of 4964 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 3800 wrote to memory of 4964 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 3800 wrote to memory of 4284 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 3800 wrote to memory of 4284 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 3800 wrote to memory of 3120 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 3800 wrote to memory of 3120 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 3800 wrote to memory of 1652 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 3800 wrote to memory of 1652 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 3800 wrote to memory of 760 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 3800 wrote to memory of 760 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 3800 wrote to memory of 4588 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 3800 wrote to memory of 4588 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 3800 wrote to memory of 4588 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 3800 wrote to memory of 4588 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 3800 wrote to memory of 4588 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 3800 wrote to memory of 4588 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 3800 wrote to memory of 4588 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe
PID 4588 wrote to memory of 2360 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4588 wrote to memory of 2360 N/A C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

outlook_office_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A

outlook_win_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe

"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"

C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe

"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"

C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe

"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"

C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe

"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"

C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe

"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"

C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe

"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"

C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe

"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"

C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe

"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"

C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe

"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name '42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1' -Value '"C:\Users\Admin\AppData\Local\Temp\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe"' -PropertyType 'String'

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 140.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
BG 91.92.120.13:62520 tcp
US 8.8.8.8:53 13.120.92.91.in-addr.arpa udp
BG 91.92.120.13:62520 tcp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp

Files

memory/3800-0-0x00007FFD6E663000-0x00007FFD6E665000-memory.dmp

memory/3800-1-0x000002570A8E0000-0x000002570AEFA000-memory.dmp

memory/3800-2-0x00007FFD6E660000-0x00007FFD6F121000-memory.dmp

memory/3800-3-0x0000025725520000-0x0000025725816000-memory.dmp

memory/3800-5-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-4-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-11-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-9-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-25-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-23-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-33-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-31-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-27-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-21-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-29-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-19-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-17-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-7-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-15-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-13-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-43-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-55-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-53-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-52-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-45-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-41-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-39-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-37-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-49-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-35-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-47-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-63-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-67-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-65-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-61-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-59-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-57-0x0000025725520000-0x000002572580F000-memory.dmp

memory/3800-4884-0x00007FFD6E660000-0x00007FFD6F121000-memory.dmp

memory/3800-4886-0x000002570CCA0000-0x000002570CCEC000-memory.dmp

memory/3800-4885-0x0000025725810000-0x0000025725940000-memory.dmp

memory/3800-4887-0x00007FFD6E663000-0x00007FFD6E665000-memory.dmp

memory/3800-4888-0x00000257263C0000-0x0000025726414000-memory.dmp

memory/3800-4896-0x00007FFD6E660000-0x00007FFD6F121000-memory.dmp

memory/4588-4895-0x000002A8FD840000-0x000002A8FD956000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1.exe.log

MD5 6f408816817e33f5f4ebb1c1e003d092
SHA1 b0bf9711f489059b99f855074a15e8a959c8ad23
SHA256 8e1faf387747313f6ad561ef2620ea92d18192aa9c73259a0a3692d5aa42f074
SHA512 dd00e17c8fe2769143bde45b5bed2352f89f032c28f6a51cfc17eedaefd15a953778215488b8a9fb44269042166dd33b0dd190ffb03cf8790b88173d8d07dce2

memory/3800-4897-0x00007FFD6E660000-0x00007FFD6F121000-memory.dmp

memory/4588-4898-0x00007FFD6E660000-0x00007FFD6F121000-memory.dmp

memory/4588-5080-0x00007FFD6E660000-0x00007FFD6F121000-memory.dmp

memory/4588-7218-0x000002A8801B0000-0x000002A8801B8000-memory.dmp

memory/4588-7219-0x000002A8801C0000-0x000002A88025E000-memory.dmp

memory/4588-7220-0x000002A8803C0000-0x000002A8803EC000-memory.dmp

memory/4588-7221-0x000002A880550000-0x000002A8805CA000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Sceogtt.tmpdb

MD5 73bd1e15afb04648c24593e8ba13e983
SHA1 4dd85ca46fcdf9d93f6b324f8bb0b5bb512a1b91
SHA256 aab0b201f392fef9fdff09e56a9d0ac33d0f68be95da270e6dab89bb1f971d8b
SHA512 6eb58fb41691894045569085bd64a83acd62277575ab002cf73d729bda4b6d43c36643a5fa336342e87a493326337ed43b8e5eaeae32f53210714699cb8dfac7

C:\Users\Admin\AppData\Local\Temp\Cykzgstr.tmpdb

MD5 9618e15b04a4ddb39ed6c496575f6f95
SHA1 1c28f8750e5555776b3c80b187c5d15a443a7412
SHA256 a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512 f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

memory/2360-7285-0x000001FB45310000-0x000001FB45332000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3i1rxpzi.uh1.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4588-7286-0x00007FFD6E660000-0x00007FFD6F121000-memory.dmp