Malware Analysis Report

2024-11-13 16:31

Sample ID 240510-kq521ade3y
Target e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
SHA256 e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62
Tags
zgrat collection persistence rat spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62

Threat Level: Known bad

The file e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe was found to be: Known bad.

Malicious Activity Summary

zgrat collection persistence rat spyware stealer

ZGRat

Detect ZGRat V1

Reads WinSCP keys stored on the system

Reads user/profile data of web browsers

Accesses Microsoft Outlook profiles

Adds Run key to start application

Suspicious use of SetThreadContext

Unsigned PE

outlook_office_path

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

outlook_win_path

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-10 08:49

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-10 08:49

Reported

2024-05-10 08:51

Platform

win7-20240215-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 nhatminhthanh.com.vn udp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp

Files

memory/2320-0-0x000007FEF5DD3000-0x000007FEF5DD4000-memory.dmp

memory/2320-1-0x0000000000B20000-0x0000000000B5C000-memory.dmp

memory/2320-2-0x000007FEF5DD0000-0x000007FEF67BC000-memory.dmp

memory/2320-3-0x000007FEF5DD3000-0x000007FEF5DD4000-memory.dmp

memory/2320-4-0x000007FEF5DD0000-0x000007FEF67BC000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-10 08:49

Reported

2024-05-10 08:51

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

Signatures

Detect ZGRat V1

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

ZGRat

rat zgrat

Reads WinSCP keys stored on the system

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Accesses Microsoft Outlook profiles

collection
Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ciogju = "C:\\Users\\Admin\\AppData\\Roaming\\Ciogju.exe" C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe" C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1152 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1152 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1152 wrote to memory of 4816 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1152 wrote to memory of 4816 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1152 wrote to memory of 1580 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1152 wrote to memory of 1580 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1152 wrote to memory of 3308 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1152 wrote to memory of 3308 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1152 wrote to memory of 1948 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1152 wrote to memory of 1948 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1152 wrote to memory of 2380 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1152 wrote to memory of 2380 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1152 wrote to memory of 4660 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1152 wrote to memory of 4660 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1152 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1152 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1152 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1152 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1152 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1152 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 1152 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe
PID 2752 wrote to memory of 5560 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2752 wrote to memory of 5560 N/A C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

outlook_office_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A

outlook_win_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe

"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62' -Value '"C:\Users\Admin\AppData\Local\Temp\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe"' -PropertyType 'String'

Network

Country Destination Domain Proto
US 8.8.8.8:53 nhatminhthanh.com.vn udp
VN 45.119.81.131:443 nhatminhthanh.com.vn tcp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 23.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
NL 23.62.61.106:443 www.bing.com tcp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 131.81.119.45.in-addr.arpa udp
US 8.8.8.8:53 106.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
BG 91.92.120.13:62520 tcp
US 8.8.8.8:53 13.120.92.91.in-addr.arpa udp
BG 91.92.120.13:62520 tcp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 24.73.42.20.in-addr.arpa udp

Files

memory/1152-0-0x00007FFFEFE53000-0x00007FFFEFE55000-memory.dmp

memory/1152-1-0x00000169834D0000-0x000001698350C000-memory.dmp

memory/1152-2-0x00007FFFEFE50000-0x00007FFFF0911000-memory.dmp

memory/1152-3-0x000001699DC30000-0x000001699DF24000-memory.dmp

memory/1152-9-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-4-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-11-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-23-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-27-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-25-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-21-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-19-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-17-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-15-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-7-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-5-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-14-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-47-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-57-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-65-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-63-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-61-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-59-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-55-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-53-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-51-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-49-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-45-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-43-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-41-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-39-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-37-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-35-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-33-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-32-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-29-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-67-0x000001699DC30000-0x000001699DF1E000-memory.dmp

memory/1152-2680-0x00007FFFEFE53000-0x00007FFFEFE55000-memory.dmp

memory/1152-4885-0x00007FFFEFE50000-0x00007FFFF0911000-memory.dmp

memory/1152-4888-0x00007FFFEFE50000-0x00007FFFF0911000-memory.dmp

memory/1152-4887-0x000001699E050000-0x000001699E09C000-memory.dmp

memory/1152-4886-0x000001699DF20000-0x000001699E050000-memory.dmp

memory/1152-4889-0x000001699E0A0000-0x000001699E0F4000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\e0c0a69f8f756b3ab1bc1bf2f5537dbb36a4057f5b1672729cd320d7ac343d62.exe.log

MD5 159a40ccfd419bd60a20a1c278edaafd
SHA1 09bc35e46135b6b44c609fe6514ab7e2c8696a99
SHA256 24487f4b6318683dcd81970e9f57fb45167575f687f7831a563176e20da657b6
SHA512 b5c5b8c23479afff6b72c37c2cc1204c079ae003bae586d082d2b05acfdab8753fea78c5e53f692e4a45aba6746703d9ca99a2d0fa7bd88a7f35a910d1ad1ff3

memory/2752-4896-0x0000022D53660000-0x0000022D53776000-memory.dmp

memory/2752-4897-0x00007FFFEFE50000-0x00007FFFF0911000-memory.dmp

memory/2752-4899-0x00007FFFEFE50000-0x00007FFFF0911000-memory.dmp

memory/1152-4898-0x00007FFFEFE50000-0x00007FFFF0911000-memory.dmp

memory/2752-7200-0x0000022D39650000-0x0000022D39658000-memory.dmp

memory/2752-7201-0x0000022D53950000-0x0000022D539EE000-memory.dmp

memory/2752-7202-0x0000022D396B0000-0x0000022D396DC000-memory.dmp

memory/2752-7203-0x0000022D53B60000-0x0000022D53BDA000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Qwresfexrkr.tmpdb

MD5 73bd1e15afb04648c24593e8ba13e983
SHA1 4dd85ca46fcdf9d93f6b324f8bb0b5bb512a1b91
SHA256 aab0b201f392fef9fdff09e56a9d0ac33d0f68be95da270e6dab89bb1f971d8b
SHA512 6eb58fb41691894045569085bd64a83acd62277575ab002cf73d729bda4b6d43c36643a5fa336342e87a493326337ed43b8e5eaeae32f53210714699cb8dfac7

C:\Users\Admin\AppData\Local\Temp\Ldxkou.tmpdb

MD5 9618e15b04a4ddb39ed6c496575f6f95
SHA1 1c28f8750e5555776b3c80b187c5d15a443a7412
SHA256 a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512 f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

memory/5560-7263-0x0000010FC5320000-0x0000010FC5342000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wmkhurlt.zyt.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2752-7268-0x00007FFFEFE50000-0x00007FFFF0911000-memory.dmp