Malware Analysis Report

2025-01-19 04:50

Sample ID 240617-x37gta1cpb
Target e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe
SHA256 e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca
Tags
spyware stealer collection execution
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca

Threat Level: Likely malicious

The file e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe was found to be: Likely malicious.

Malicious Activity Summary

spyware stealer collection execution

Downloads MZ/PE file

Executes dropped EXE

Loads dropped DLL

Reads user/profile data of web browsers

Reads WinSCP keys stored on the system

Drops startup file

Accesses Microsoft Outlook profiles

Suspicious use of SetThreadContext

Command and Scripting Interpreter: PowerShell

Unsigned PE

outlook_win_path

outlook_office_path

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-17 19:23

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-17 19:23

Reported

2024-06-17 19:26

Platform

win10v2004-20240508-en

Max time kernel

125s

Max time network

127s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe"

Signatures

Reads user/profile data of web browsers

spyware stealer

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe

"C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4196,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=3804 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 101.58.20.217.in-addr.arpa udp
US 8.8.8.8:53 fallback-01-static.com udp
MY 111.90.145.132:7722 fallback-01-static.com tcp
US 8.8.8.8:53 132.145.90.111.in-addr.arpa udp
US 8.8.8.8:53 23.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 21.121.18.2.in-addr.arpa udp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 98.58.20.217.in-addr.arpa udp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 10.173.189.20.in-addr.arpa udp

Files

memory/3056-0-0x0000000000F50000-0x0000000001028000-memory.dmp

memory/3056-1-0x00007FFFE6243000-0x00007FFFE6245000-memory.dmp

memory/3056-2-0x000000001BBA0000-0x000000001BCB6000-memory.dmp

memory/3056-31-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-33-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-63-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-67-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-65-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-61-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-59-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-57-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-55-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-53-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-51-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-47-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-45-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-43-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-49-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-41-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-35-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-27-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-25-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-23-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-21-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-17-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-15-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-13-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-12-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-9-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-7-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-39-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-37-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-29-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-5-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-4-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-19-0x000000001BBA0000-0x000000001BCB0000-memory.dmp

memory/3056-3-0x00007FFFE6240000-0x00007FFFE6D01000-memory.dmp

memory/3056-2305-0x00000000017D0000-0x000000000181C000-memory.dmp

memory/3056-2304-0x000000001BCB0000-0x000000001BD4E000-memory.dmp

memory/3056-2306-0x000000001C380000-0x000000001C3AC000-memory.dmp

memory/3056-2307-0x000000001C6F0000-0x000000001C76A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Dxsnm.tmpdb

MD5 73bd1e15afb04648c24593e8ba13e983
SHA1 4dd85ca46fcdf9d93f6b324f8bb0b5bb512a1b91
SHA256 aab0b201f392fef9fdff09e56a9d0ac33d0f68be95da270e6dab89bb1f971d8b
SHA512 6eb58fb41691894045569085bd64a83acd62277575ab002cf73d729bda4b6d43c36643a5fa336342e87a493326337ed43b8e5eaeae32f53210714699cb8dfac7

memory/3056-2337-0x00007FFFE6243000-0x00007FFFE6245000-memory.dmp

memory/3056-2338-0x00007FFFE6240000-0x00007FFFE6D01000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-17 19:23

Reported

2024-06-17 19:26

Platform

win7-20240221-en

Max time kernel

121s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe"

Signatures

Downloads MZ/PE file

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Gpzkvaf.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Gpzkvaf.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A

Reads WinSCP keys stored on the system

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Accesses Microsoft Outlook profiles

collection
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Key queried \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 4804 set thread context of 5064 N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2164 wrote to memory of 4804 N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe
PID 2164 wrote to memory of 4804 N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe
PID 2164 wrote to memory of 4804 N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe
PID 2164 wrote to memory of 4804 N/A C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe
PID 4804 wrote to memory of 4960 N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
PID 4804 wrote to memory of 4960 N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
PID 4804 wrote to memory of 4960 N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
PID 4804 wrote to memory of 4960 N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
PID 4804 wrote to memory of 5064 N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe
PID 4804 wrote to memory of 5064 N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe
PID 4804 wrote to memory of 5064 N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe
PID 4804 wrote to memory of 5064 N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe
PID 4804 wrote to memory of 5064 N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe
PID 4804 wrote to memory of 5064 N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe
PID 4804 wrote to memory of 5064 N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe
PID 4804 wrote to memory of 5064 N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe
PID 4804 wrote to memory of 5064 N/A C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe

outlook_office_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A

outlook_win_path

Description Indicator Process Target
Key queried \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe

"C:\Users\Admin\AppData\Local\Temp\e96b455245e3e29c30bcbaf2836654435beca58d7e0e740fef3d5449caa6cfca.exe"

C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe

"C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe

"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Gpzkvaf.exe' -Force

C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe

"C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 fallback-01-static.com udp
MY 111.90.145.132:7722 fallback-01-static.com tcp
MY 111.90.145.132:7722 fallback-01-static.com tcp
US 8.8.8.8:53 voucher-01-static.com udp
NL 91.92.243.32:80 voucher-01-static.com tcp
NL 91.92.243.32:80 voucher-01-static.com tcp
US 8.8.8.8:53 strang-01-static.com udp
MY 111.90.145.141:58001 strang-01-static.com tcp

Files

memory/2164-0-0x000007FEF57A3000-0x000007FEF57A4000-memory.dmp

memory/2164-1-0x0000000000E50000-0x0000000000F28000-memory.dmp

memory/2164-2-0x000000001AE10000-0x000000001AF26000-memory.dmp

memory/2164-3-0x000007FEF57A0000-0x000007FEF618C000-memory.dmp

memory/2164-5-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-7-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-11-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-15-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-23-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-21-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-19-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-17-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-13-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-9-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-4-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-25-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-27-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-31-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-41-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-55-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-63-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-29-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-67-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-65-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-61-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-59-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-57-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-53-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-51-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-50-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-47-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-45-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-43-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-39-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-37-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-35-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-33-0x000000001AE10000-0x000000001AF20000-memory.dmp

memory/2164-2304-0x0000000000450000-0x00000000004EE000-memory.dmp

memory/2164-2305-0x0000000000690000-0x00000000006DC000-memory.dmp

memory/2164-2306-0x0000000000B20000-0x0000000000B4C000-memory.dmp

memory/2164-2307-0x000000001A8E0000-0x000000001A95A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Xocfsygisb.tmpdb

MD5 90a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1 aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA256 7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512 ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

memory/2164-2339-0x000007FEF57A3000-0x000007FEF57A4000-memory.dmp

memory/2164-2340-0x000007FEF57A0000-0x000007FEF618C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Gpzkvaf.exe

MD5 4104370a4f4d897292560d55666cdb10
SHA1 55a3a0e1d5e84549c284b357cdf26c348b12ae60
SHA256 92931a8f91d661cce0204783604ef536a4134376a9ed2e461720c7b93a129746
SHA512 688f0d602e9ad7eda500e52d16340e9bba3416896f929d655eb1079ff012f33708fb8ac9c6daa70334ac96fdfa09e37fa8d175a51d986dbafc636499f9881ea5

memory/4804-2346-0x000000007447E000-0x000000007447F000-memory.dmp

memory/4804-2347-0x00000000009A0000-0x00000000009BE000-memory.dmp

memory/4804-2348-0x0000000074470000-0x0000000074B5E000-memory.dmp

memory/4804-2349-0x0000000005A00000-0x0000000005ABA000-memory.dmp

memory/5064-2367-0x0000000000400000-0x000000000049C000-memory.dmp

memory/5064-2368-0x0000000004820000-0x0000000004908000-memory.dmp

memory/4804-2369-0x0000000074470000-0x0000000074B5E000-memory.dmp

memory/5064-4602-0x00000000008D0000-0x0000000000926000-memory.dmp