Malware Analysis Report

2024-11-15 08:44

Sample ID 240510-cd7q3acc8v
Target e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
SHA256 e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62
Tags
zgrat collection persistence rat spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62

Threat Level: Known bad

The file e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe was found to be: Known bad.

Malicious Activity Summary

zgrat collection persistence rat spyware stealer

ZGRat

Detect ZGRat V1

Reads WinSCP keys stored on the system

Reads user/profile data of web browsers

Adds Run key to start application

Accesses Microsoft Outlook profiles

Suspicious use of SetThreadContext

Unsigned PE

Suspicious use of AdjustPrivilegeToken

outlook_win_path

outlook_office_path

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-10 01:58

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-10 01:58

Reported

2024-05-10 02:01

Platform

win7-20240220-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 nhatminhthanh.com.vn udp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp

Files

memory/2172-0-0x000007FEF5383000-0x000007FEF5384000-memory.dmp

memory/2172-1-0x0000000000040000-0x000000000007C000-memory.dmp

memory/2172-2-0x000007FEF5380000-0x000007FEF5D6C000-memory.dmp

memory/2172-3-0x000007FEF5383000-0x000007FEF5384000-memory.dmp

memory/2172-4-0x000007FEF5380000-0x000007FEF5D6C000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-10 01:58

Reported

2024-05-10 02:01

Platform

win10v2004-20240508-en

Max time kernel

148s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

Signatures

Detect ZGRat V1

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

ZGRat

rat zgrat

Reads WinSCP keys stored on the system

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Accesses Microsoft Outlook profiles

collection
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ciogju = "C:\\Users\\Admin\\AppData\\Roaming\\Ciogju.exe" C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe" C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1652 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1652 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1652 wrote to memory of 3212 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1652 wrote to memory of 3212 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1652 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1652 wrote to memory of 2768 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1652 wrote to memory of 4296 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1652 wrote to memory of 4296 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1652 wrote to memory of 4324 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1652 wrote to memory of 4324 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1652 wrote to memory of 2956 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1652 wrote to memory of 2956 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1652 wrote to memory of 5116 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1652 wrote to memory of 5116 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1652 wrote to memory of 4316 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1652 wrote to memory of 4316 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1652 wrote to memory of 4316 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1652 wrote to memory of 4316 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1652 wrote to memory of 4316 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1652 wrote to memory of 4316 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1652 wrote to memory of 4316 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 4316 wrote to memory of 2764 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4316 wrote to memory of 2764 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

outlook_office_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A

outlook_win_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62' -Value '"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"' -PropertyType 'String'

Network

Country Destination Domain Proto
US 8.8.8.8:53 nhatminhthanh.com.vn udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 131.81.119.45.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
BG 91.92.120.13:62520 tcp
US 8.8.8.8:53 13.120.92.91.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
BG 91.92.120.13:62520 tcp
US 8.8.8.8:53 201.201.50.20.in-addr.arpa udp

Files

memory/1652-0-0x000001DE5E980000-0x000001DE5E9BC000-memory.dmp

memory/1652-1-0x00007FFD08D83000-0x00007FFD08D85000-memory.dmp

memory/1652-2-0x00007FFD08D80000-0x00007FFD09841000-memory.dmp

memory/1652-3-0x00007FFD08D83000-0x00007FFD08D85000-memory.dmp

memory/1652-4-0x00007FFD08D80000-0x00007FFD09841000-memory.dmp

memory/1652-5-0x000001DE79080000-0x000001DE79374000-memory.dmp

memory/1652-6-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-17-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-31-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-39-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-65-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-69-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-67-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-63-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-61-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-59-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-57-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-55-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-53-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-51-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-49-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-47-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-45-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-43-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-42-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-37-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-35-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-33-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-27-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-25-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-21-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-19-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-15-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-13-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-11-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-9-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-7-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-29-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-23-0x000001DE79080000-0x000001DE7936E000-memory.dmp

memory/1652-4886-0x00007FFD08D80000-0x00007FFD09841000-memory.dmp

memory/1652-4887-0x000001DE793E0000-0x000001DE79510000-memory.dmp

memory/1652-4888-0x000001DE78F20000-0x000001DE78F6C000-memory.dmp

memory/1652-4889-0x000001DE79510000-0x000001DE79564000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe.log

MD5 159a40ccfd419bd60a20a1c278edaafd
SHA1 09bc35e46135b6b44c609fe6514ab7e2c8696a99
SHA256 24487f4b6318683dcd81970e9f57fb45167575f687f7831a563176e20da657b6
SHA512 b5c5b8c23479afff6b72c37c2cc1204c079ae003bae586d082d2b05acfdab8753fea78c5e53f692e4a45aba6746703d9ca99a2d0fa7bd88a7f35a910d1ad1ff3

memory/4316-4896-0x000002EAEBFD0000-0x000002EAEC0E6000-memory.dmp

memory/1652-4897-0x00007FFD08D80000-0x00007FFD09841000-memory.dmp

memory/4316-4898-0x00007FFD08D80000-0x00007FFD09841000-memory.dmp

memory/4316-4909-0x00007FFD08D80000-0x00007FFD09841000-memory.dmp

memory/4316-7200-0x000002EAD3700000-0x000002EAD3708000-memory.dmp

memory/4316-7201-0x000002EAEC280000-0x000002EAEC31E000-memory.dmp

memory/4316-7202-0x000002EAEC0E0000-0x000002EAEC10C000-memory.dmp

memory/4316-7203-0x000002EAEC420000-0x000002EAEC49A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Niqacyhhek.tmpdb

MD5 73bd1e15afb04648c24593e8ba13e983
SHA1 4dd85ca46fcdf9d93f6b324f8bb0b5bb512a1b91
SHA256 aab0b201f392fef9fdff09e56a9d0ac33d0f68be95da270e6dab89bb1f971d8b
SHA512 6eb58fb41691894045569085bd64a83acd62277575ab002cf73d729bda4b6d43c36643a5fa336342e87a493326337ed43b8e5eaeae32f53210714699cb8dfac7

C:\Users\Admin\AppData\Local\Temp\Tqapw.tmpdb

MD5 9618e15b04a4ddb39ed6c496575f6f95
SHA1 1c28f8750e5555776b3c80b187c5d15a443a7412
SHA256 a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512 f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

memory/2764-7258-0x0000016D51FC0000-0x0000016D51FE2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ykepfroy.wz4.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4316-7268-0x00007FFD08D80000-0x00007FFD09841000-memory.dmp