Malware Analysis Report

2025-01-19 04:42

Sample ID 240807-pa7ccaydlp
Target bd48c60bf2ec6a946dd58ae84d8da870N.exe
SHA256 52b405e2357f411adde06fe757dea84a3557ed267a35b4e2804a9200d2b51c08
Tags
upx discovery persistence microsoft phishing product:outlook
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

52b405e2357f411adde06fe757dea84a3557ed267a35b4e2804a9200d2b51c08

Threat Level: Known bad

The file bd48c60bf2ec6a946dd58ae84d8da870N.exe was found to be: Known bad.

Malicious Activity Summary

upx discovery persistence microsoft phishing product:outlook

Detected microsoft outlook phishing page

UPX packed file

Executes dropped EXE

Adds Run key to start application

Drops file in Windows directory

System Location Discovery: System Language Discovery

Unsigned PE

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-07 12:08

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-07 12:08

Reported

2024-08-07 12:10

Platform

win7-20240704-en

Max time kernel

120s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\bd48c60bf2ec6a946dd58ae84d8da870N.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\services.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" C:\Users\Admin\AppData\Local\Temp\bd48c60bf2ec6a946dd58ae84d8da870N.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" C:\Windows\services.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\services.exe C:\Users\Admin\AppData\Local\Temp\bd48c60bf2ec6a946dd58ae84d8da870N.exe N/A
File opened for modification C:\Windows\java.exe C:\Users\Admin\AppData\Local\Temp\bd48c60bf2ec6a946dd58ae84d8da870N.exe N/A
File created C:\Windows\java.exe C:\Users\Admin\AppData\Local\Temp\bd48c60bf2ec6a946dd58ae84d8da870N.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\bd48c60bf2ec6a946dd58ae84d8da870N.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\services.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\bd48c60bf2ec6a946dd58ae84d8da870N.exe

"C:\Users\Admin\AppData\Local\Temp\bd48c60bf2ec6a946dd58ae84d8da870N.exe"

C:\Windows\services.exe

"C:\Windows\services.exe"

Network

Country Destination Domain Proto
N/A 192.168.2.155:1034 tcp
N/A 10.0.77.20:1034 tcp
N/A 10.218.249.159:1034 tcp
N/A 192.168.2.109:1034 tcp
US 8.8.8.8:53 alumni.caltech.edu udp
US 8.8.8.8:53 alumni-caltech-edu.mail.protection.outlook.com udp
US 8.8.8.8:53 gzip.org udp
US 52.101.40.4:25 alumni-caltech-edu.mail.protection.outlook.com tcp
US 8.8.8.8:53 gzip.org udp
US 85.187.148.2:25 gzip.org tcp
N/A 10.222.21.129:1034 tcp
US 85.187.148.2:25 gzip.org tcp
US 8.8.8.8:53 alumni.caltech.edu udp
US 50.112.124.79:25 alumni.caltech.edu tcp
N/A 10.0.77.20:1034 tcp
US 8.8.8.8:53 mx.gzip.org udp
US 8.8.8.8:53 mx.alumni.caltech.edu udp
US 8.8.8.8:53 mail.alumni.caltech.edu udp
US 8.8.8.8:53 smtp.alumni.caltech.edu udp
US 8.8.8.8:53 mail.gzip.org udp
US 85.187.148.2:25 mail.gzip.org tcp

Files

memory/2220-0-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2220-8-0x00000000001B0000-0x00000000001B8000-memory.dmp

C:\Windows\services.exe

MD5 b0fe74719b1b647e2056641931907f4a
SHA1 e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256 bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA512 9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

memory/2220-9-0x00000000001B0000-0x00000000001B8000-memory.dmp

memory/2968-11-0x0000000000400000-0x0000000000408000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\zincite.log

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/2220-17-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2968-18-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2968-23-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2220-24-0x00000000001B0000-0x00000000001B8000-memory.dmp

memory/2220-25-0x00000000001B0000-0x00000000001B8000-memory.dmp

memory/2968-30-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2968-32-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2220-36-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2968-37-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2968-42-0x0000000000400000-0x0000000000408000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\zincite.log

MD5 ba4d93528511c089313e9d82043d33c7
SHA1 ad1e8a9684e7864a0f2ef6cb8738a77730a5c51e
SHA256 94c55030a81daf0d770c7a814406a7c9819c3a5700316b1016d9f2f1c42571ad
SHA512 c2b872691ac1f652d6164352d394d1fe3d2f10b12651bfc2a17d86523fecdae7329021b2432ea436684c683ed077594f5eb405a6582cc374b7eca238f499b24e

C:\Users\Admin\AppData\Local\Temp\tmp2D0C.tmp

MD5 52085619d57579f61f5eb9e21d9c3444
SHA1 8c023d9aa7968dc448f8254d0a9e1052ec9be8e7
SHA256 7b302a9e9a08fc1b19b1052391e8abce975eabb61fb9aa6467613e2d476a96c6
SHA512 2f108e1a639102ce74cdb99c7e7eb8a7237870db9ef22db5533356e1f7ab463c5d32d36efecd74542fb6fa18e33a71d58b46716b9fc9faa39a1584d5a6e4f8f5

memory/2220-66-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2968-67-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2220-70-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2968-71-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2220-75-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2968-76-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2968-78-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2220-82-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2968-83-0x0000000000400000-0x0000000000408000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-07 12:08

Reported

2024-08-07 12:10

Platform

win10v2004-20240802-en

Max time kernel

120s

Max time network

119s

Command Line

"C:\Users\Admin\AppData\Local\Temp\bd48c60bf2ec6a946dd58ae84d8da870N.exe"

Signatures

Detected microsoft outlook phishing page

phishing microsoft product:outlook

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\services.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" C:\Windows\services.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" C:\Users\Admin\AppData\Local\Temp\bd48c60bf2ec6a946dd58ae84d8da870N.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\services.exe C:\Users\Admin\AppData\Local\Temp\bd48c60bf2ec6a946dd58ae84d8da870N.exe N/A
File opened for modification C:\Windows\java.exe C:\Users\Admin\AppData\Local\Temp\bd48c60bf2ec6a946dd58ae84d8da870N.exe N/A
File created C:\Windows\java.exe C:\Users\Admin\AppData\Local\Temp\bd48c60bf2ec6a946dd58ae84d8da870N.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\services.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\bd48c60bf2ec6a946dd58ae84d8da870N.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\bd48c60bf2ec6a946dd58ae84d8da870N.exe

"C:\Users\Admin\AppData\Local\Temp\bd48c60bf2ec6a946dd58ae84d8da870N.exe"

C:\Windows\services.exe

"C:\Windows\services.exe"

Network

Country Destination Domain Proto
N/A 192.168.2.155:1034 tcp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
N/A 10.0.77.20:1034 tcp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 73.190.18.2.in-addr.arpa udp
N/A 10.218.249.159:1034 tcp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
N/A 192.168.2.109:1034 tcp
US 8.8.8.8:53 m-ou.se udp
US 8.8.8.8:53 aspmx2.googlemail.com udp
DE 142.251.9.26:25 aspmx2.googlemail.com tcp
US 8.8.8.8:53 acm.org udp
US 8.8.8.8:53 mail.mailroute.net udp
US 199.89.1.120:25 mail.mailroute.net tcp
US 8.8.8.8:53 cs.stanford.edu udp
US 8.8.8.8:53 smtp1.cs.stanford.edu udp
US 171.64.64.25:25 smtp1.cs.stanford.edu tcp
US 8.8.8.8:53 burtleburtle.net udp
US 8.8.8.8:53 mx.burtleburtle.net udp
US 171.64.64.25:25 smtp1.cs.stanford.edu tcp
US 65.254.254.51:25 mx.burtleburtle.net tcp
US 8.8.8.8:53 alumni.caltech.edu udp
US 8.8.8.8:53 alumni-caltech-edu.mail.protection.outlook.com udp
US 52.101.9.2:25 alumni-caltech-edu.mail.protection.outlook.com tcp
US 8.8.8.8:53 gzip.org udp
US 8.8.8.8:53 gzip.org udp
US 85.187.148.2:25 gzip.org tcp
US 8.8.8.8:53 search.lycos.com udp
US 209.202.254.10:80 search.lycos.com tcp
US 8.8.8.8:53 www.google.com udp
NL 142.250.179.196:80 www.google.com tcp
NL 142.250.179.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 8.8.8.8:53 10.254.202.209.in-addr.arpa udp
US 8.8.8.8:53 196.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 r11.o.lencr.org udp
GB 2.18.190.73:80 r11.o.lencr.org tcp
US 8.8.8.8:53 www.altavista.com udp
NL 142.250.179.196:80 www.google.com tcp
IE 212.82.100.137:80 www.altavista.com tcp
US 209.202.254.10:80 search.lycos.com tcp
NL 142.250.179.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
NL 142.250.179.196:80 www.google.com tcp
US 8.8.8.8:53 search.yahoo.com udp
NL 142.250.179.196:80 www.google.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
US 8.8.8.8:53 27.81.57.23.in-addr.arpa udp
US 8.8.8.8:53 137.100.82.212.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
IE 212.82.100.137:443 search.yahoo.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
NL 142.250.179.196:80 www.google.com tcp
NL 142.250.179.196:80 www.google.com tcp
NL 142.250.179.196:80 www.google.com tcp
NL 142.250.179.196:80 www.google.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
US 209.202.254.10:80 search.lycos.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
NL 142.250.179.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
NL 142.250.179.196:80 www.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
NL 142.250.179.196:80 www.google.com tcp
NL 142.250.179.196:80 www.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
NL 142.250.179.196:80 www.google.com tcp
NL 142.250.179.196:80 www.google.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
NL 142.250.179.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:80 search.lycos.com tcp
NL 142.250.179.196:80 www.google.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
NL 142.250.179.196:80 www.google.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
NL 142.250.179.196:80 www.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
NL 142.250.179.196:80 www.google.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
NL 142.250.179.196:80 www.google.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
US 209.202.254.10:80 search.lycos.com tcp
NL 142.250.179.196:80 www.google.com tcp
NL 142.250.179.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
US 209.202.254.10:443 search.lycos.com tcp
NL 142.250.179.196:80 www.google.com tcp
NL 142.250.179.196:80 www.google.com tcp
NL 142.250.179.196:80 www.google.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
NL 142.250.179.196:80 www.google.com tcp
NL 142.250.179.196:80 www.google.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
NL 142.250.179.196:80 www.google.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
NL 142.250.179.196:80 www.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
NL 142.250.179.196:80 www.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
NL 142.250.179.196:80 www.google.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
NL 142.250.179.196:80 www.google.com tcp
NL 142.250.179.196:80 www.google.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
US 8.8.8.8:53 snai1mai1.com udp
IE 212.82.100.137:443 search.yahoo.com tcp
US 8.8.8.8:53 snai1mai1.com udp
US 209.202.254.10:443 search.lycos.com tcp
NL 142.250.179.196:80 www.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
NL 142.250.179.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
US 171.64.64.25:25 smtp1.cs.stanford.edu tcp
NL 142.250.179.196:80 www.google.com tcp
N/A 10.222.21.129:1034 tcp
US 8.8.8.8:53 alt2.aspmx.l.google.com udp
FI 142.250.150.27:25 alt2.aspmx.l.google.com tcp
US 8.8.8.8:53 acm.org udp
US 104.17.79.30:25 acm.org tcp
US 8.8.8.8:53 smtp2.cs.stanford.edu udp
US 171.64.64.26:25 smtp2.cs.stanford.edu tcp
US 171.64.64.26:25 smtp2.cs.stanford.edu tcp
US 8.8.8.8:53 burtleburtle.net udp
US 65.254.227.224:25 burtleburtle.net tcp
US 8.8.8.8:53 alumni.caltech.edu udp
US 50.112.124.79:25 alumni.caltech.edu tcp
US 85.187.148.2:25 gzip.org tcp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
US 171.64.64.26:25 smtp2.cs.stanford.edu tcp
N/A 10.0.77.20:1034 tcp
US 8.8.8.8:53 aspmx3.googlemail.com udp
FI 142.250.150.27:25 aspmx3.googlemail.com tcp
US 8.8.8.8:53 mx.acm.org udp
US 8.8.8.8:53 mail.acm.org udp
US 8.8.8.8:53 smtp.acm.org udp
US 8.8.8.8:53 cs.stanford.edu udp
US 171.64.64.64:25 cs.stanford.edu tcp
US 8.8.8.8:53 outlook.com udp
US 8.8.8.8:53 outlook-com.olc.protection.outlook.com udp
SG 52.101.137.3:25 outlook-com.olc.protection.outlook.com tcp
US 171.64.64.64:25 cs.stanford.edu tcp
NL 142.250.179.196:80 www.google.com tcp
US 65.254.254.51:25 mx.burtleburtle.net tcp
US 8.8.8.8:53 mx.alumni.caltech.edu udp
US 8.8.8.8:53 mx.gzip.org udp
US 209.202.254.10:80 search.lycos.com tcp
US 8.8.8.8:53 mail.gzip.org udp
US 8.8.8.8:53 mail.alumni.caltech.edu udp
US 85.187.148.2:25 mail.gzip.org tcp
US 8.8.8.8:53 smtp.alumni.caltech.edu udp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
NL 142.250.179.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
NL 142.250.179.196:80 www.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
NL 142.250.179.196:80 www.google.com tcp
NL 142.250.179.196:80 www.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 8.8.8.8:53 hachyderm.io udp
US 209.202.254.10:443 search.lycos.com tcp
NL 142.250.179.196:80 www.google.com tcp
US 8.8.8.8:53 alt3.aspmx.l.google.com udp
SG 74.125.200.26:25 alt3.aspmx.l.google.com tcp
NL 142.250.179.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
NL 142.250.179.196:80 www.google.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
NL 142.250.179.196:80 www.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
NL 142.250.179.196:80 www.google.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
NL 142.250.179.196:80 www.google.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
NL 142.250.179.196:80 www.google.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
NL 142.250.179.196:80 www.google.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
US 209.202.254.10:443 search.lycos.com tcp
NL 142.250.179.196:80 www.google.com tcp
NL 142.250.179.196:80 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
NL 142.250.179.196:80 www.google.com tcp
NL 142.250.179.196:80 www.google.com tcp
NL 142.250.179.196:80 www.google.com tcp
NL 142.250.179.196:80 www.google.com tcp
NL 142.250.179.196:80 www.google.com tcp
US 171.64.64.64:25 cs.stanford.edu tcp

Files

memory/4772-0-0x0000000000500000-0x0000000000510200-memory.dmp

C:\Windows\services.exe

MD5 b0fe74719b1b647e2056641931907f4a
SHA1 e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256 bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA512 9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

memory/2072-6-0x0000000000400000-0x0000000000408000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\zincite.log

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/4772-13-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2072-14-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2072-19-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2072-24-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2072-26-0x0000000000400000-0x0000000000408000-memory.dmp

memory/4772-30-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2072-31-0x0000000000400000-0x0000000000408000-memory.dmp

memory/4772-35-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2072-36-0x0000000000400000-0x0000000000408000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\zincite.log

MD5 658a40942ae3dfe1216d771205fb55dc
SHA1 6c9819f4b92599a5fdf4ea5388401c29407cb7bf
SHA256 30a5b45de127f8b17f339e7c9d37627d2686ec2a860cad787f7da5181e370fdc
SHA512 062527c4931c78ae98539b9f755e254d264e8eeaf78e3242ec22080c6e79460f0004f0667c35f6d671a138bf8ad4e62522354f239780d3ab73b83329a6a1d630

C:\Users\Admin\AppData\Local\Temp\tmp922B.tmp

MD5 43b54c9cbc9f4040e47de6bab1c247cd
SHA1 6c2eb2f5b802731258be6002e3319866268a199c
SHA256 9b1e7c7d3dbf96c71cd715d740396e1638acf0c4503ecddc8c0fa62ef66a386f
SHA512 437a702e1dad086467b7629619ca1e12bd26777062c61e651e808dfbe572f41bcf9cc89b84e7b1e8b991a8195cf1e816e97a61f16db8a34cc276b9104532fc7e

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\68XY2BI1\EFCXHKDN.htm

MD5 36ec1a18e773d4ad082c5826159fa386
SHA1 a3c74e301a0592827ed1b2ea32a409d3cf9858b3
SHA256 f1860e4d53347789da9ac36955afb4e5c2743a6efeca1c7979e4e09c8a2769ba
SHA512 1ddd359b8d821a2249d5fb807ba3231e90a36b42191cf40cb5af7719e5c7389cf50d7cc5e9a2d20fe8599871760802cce44fbb5624ca8340626445edb4c4434d

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\F1EZZCYM\search[3].htm

MD5 8ba61a16b71609a08bfa35bc213fce49
SHA1 8374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA256 6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA512 5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

memory/4772-158-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2072-159-0x0000000000400000-0x0000000000408000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\F1EZZCYM\search[4].htm

MD5 e31a484b21a49c826aa2d17aa0a0c7df
SHA1 f49a9deec193ef6f4f1f273c74bb9fb0ee6422aa
SHA256 666ae5e3259097b27a9a9219cb004eebe958963ddce1c039af4b531760b7b2d6
SHA512 933b89d9613cb87a8c63fbe03d7120f24e04a88c4134f94971648d75b8e1649ff9719bd371146144ea866a18007dedd69ef5154c4cf636a180f2541b0aab7619

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\F1EZZCYM\search[6].htm

MD5 acaa1ebe7dc55fcc2d3efc4eb25475cc
SHA1 4a0982af9595383de5b08e7b8036de985385f537
SHA256 6479839b4687399216aebeb6d9127cc53cd92f0a26e51dab20d0fc7488285a05
SHA512 270b58a6e7bb387f31d78cc94348595d99dadf4e871bd2e1303d36e4ad73987fc2caade26632c51ee15001098c49b96e9c479c28d3f6fbda0680ed29af8017e7

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\F1EZZCYM\results[3].htm

MD5 211da0345fa466aa8dbde830c83c19f8
SHA1 779ece4d54a099274b2814a9780000ba49af1b81
SHA256 aec2ac9539d1b0cac493bbf90948eca455c6803342cc83d0a107055c1d131fd5
SHA512 37fd7ef6e11a1866e844439318ae813059106fbd52c24f580781d90da3f64829cf9654acac0dd0f2098081256c5dcdf35c70b2cbef6cbe3f0b91bd2d8edd22ca

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\2VX66VOV\search[10].htm

MD5 b96aaf7b7e250b2fb6a4c3b17c0ab125
SHA1 5efc281f4ed3500b2577385ab88634ea078e89fa
SHA256 81f4421aae5478d6c8af211e5adbe67327d05d8a16c20cadbc8bbf4510428934
SHA512 4ff82caf19d028937ba4427f220c27860b5c5fafe8170e15ea4d61bf98348dced5647cec72c06674ab3ee6cc7196bc6e082e768738985c320bbab37f16dc5e91

C:\Users\Admin\AppData\Local\Temp\zincite.log

MD5 7b0eb17cd5279a00af0ae9618ad0f689
SHA1 827eeeede4bde2d45ad9dd09aeb98f09e4471add
SHA256 4792f1e31de3e2547221ad145b040b3ee3da2cd503e9c48a6beb902d9856acde
SHA512 8683923776791e9c703728b53da489d542eb2172cbe1ceac96685c61d7b1aaeab6f11ccd579eae3e11d62ee449768287989713b9e23525669858fe5941ae396c

memory/4772-273-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2072-274-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2072-278-0x0000000000400000-0x0000000000408000-memory.dmp

memory/4772-279-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2072-280-0x0000000000400000-0x0000000000408000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\zincite.log

MD5 8e06f4dfad925ceb3666abc428e7e015
SHA1 d498cc7bbf24b9898e8c8953b48a8364f6fc4fba
SHA256 a1e36620c10545fd120a0a56159fbf7bf32c2df2f2f47592426f0983a1e4b511
SHA512 7dfa906f75f8f9aebfc47c6159761be8e73a80e47dee9652231b5c2bc745e7c020359224d8f29b30295cbb75e3e098a8a9e0dd8f2bdc48f29795831d5bab9189

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\T1CTRFUW\search[9].htm

MD5 a16f04592e3ddb9d5e518708d14f3e26
SHA1 9cda73ab4ffcf7166878f49ff76ed9359ac1806e
SHA256 a1ad0498a903128fcc71692c15996e04ee6e09bc816b9268410d4c6a6d7f1ed3
SHA512 3f40a966accc5328da92b51c8f24f50ec63934c4fdad7fa5eec85abe46f80ecbab3d0091a9c9ab857913e8fbd870f8bbecd04faf8ccedae9f1d6b559e17bca8d

memory/4772-321-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2072-322-0x0000000000400000-0x0000000000408000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\T1CTRFUW\searchUN9E8JRZ.htm

MD5 665279bd03237124fc0b62562569a830
SHA1 3f2c992baac1a7b3bdd080f8f5ff2470665fa31e
SHA256 9b0557dc0b18e6beac46dd28e28c1ef2b920f91c903bd64f7add26e42f14eb6c
SHA512 bf6394bb69f8fa9f067cf26a1e02398ea61a366a95864f50eb991787c9327c1bfdeae7fe95cbef61eb0a24f2ac8be5fe4fc9ad96f5696689dc511dcb89857ccd