Analysis
-
max time kernel
148s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 13:12
Static task
static1
Behavioral task
behavioral1
Sample
ZoomInstallerFull.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ZoomInstallerFull.exe
Resource
win10v2004-20240802-en
General
-
Target
ZoomInstallerFull.exe
-
Size
85.3MB
-
MD5
0ad91ce888ace42b95ca1c9bb5b47a75
-
SHA1
1c3b3205f99cd54640a0eedee9e689bb8acb6ca9
-
SHA256
4c582dd6e6b21ff8f9bbd470876ebe06f008505ed498abb38c34038cd5c1c3d7
-
SHA512
58ae442e2224e07824d4443cbb0c3c43f555b3f84c59f49e85eecdff7f11204729165ad678c433d9102ef73d28aaf70157dbec7a031d589eb028cca4704d8945
-
SSDEEP
1572864:KaDXhgywVFx7XC9US6K8Xotmi4PEC+KuzGQ+CHM2+A2e2cAaXs9:KMXNqz7XCCVi4PEC+KO55s2f2cF0
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1624 powershell.exe 1704 powershell.exe 912 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 2360 Zoom.exe 1200 Process not Found 2892 OWFlMWIyMD.exe 2984 ZGNkNGFkNT.exe -
Loads dropped DLL 6 IoCs
pid Process 1460 ZoomInstallerFull.exe 2360 Zoom.exe 2360 Zoom.exe 2360 Zoom.exe 1668 pipanel.exe 1668 pipanel.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Zoom\mscorrc.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\PresentationFramework-SystemXml.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Collections.Immutable.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Runtime.Loader.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Threading.Tasks.Dataflow.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\System.Xml.ReaderWriter.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\clrgc.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\System.DirectoryServices.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Net.Primitives.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Net.WebHeaderCollection.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\System.Threading.Thread.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Collections.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\System.Collections.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Collections.Specialized.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.ComponentModel.Primitives.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Diagnostics.Process.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Security.Cryptography.Xml.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Diagnostics.PerformanceCounter.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Drawing.Primitives.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\System.Text.Encoding.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\UIAutomationClient.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\System.Windows.Forms.Design.Editors.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Private.CoreLib.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Security.Cryptography.Pkcs.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\Microsoft.VisualBasic.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\PresentationFramework.AeroLite.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.IO.Pipes.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\System.IO.Pipes.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\System.Net.Http.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Net.NetworkInformation.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Windows.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\System.Windows.Extensions.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\Microsoft.Win32.SystemEvents.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\System.Web.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\Microsoft.Win32.Registry.AccessControl.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Diagnostics.EventLog.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\System.Drawing.Primitives.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Net.Mail.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Net.WebSockets.Client.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\System.Reflection.TypeExtensions.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\Microsoft.Win32.Primitives.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\PresentationFramework.Royale.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Diagnostics.TextWriterTraceListener.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Net.WebClient.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\System.Security.AccessControl.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\PresentationFramework.Aero.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\System.Core.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.IO.Compression.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Net.Requests.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Resources.Reader.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Resources.ResourceManager.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\mscorrc.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\System.Net.Sockets.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\UIAutomationProvider.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\System.AppContext.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.IO.FileSystem.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Net.Quic.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\mscordaccore.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Reflection.Emit.ILGeneration.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Runtime.Extensions.dll ZoomInstallerFull.exe File created C:\Program Files (x86)\Zoom\System.Windows.Forms.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\System.Collections.Immutable.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\System.ComponentModel.dll ZoomInstallerFull.exe File opened for modification C:\Program Files (x86)\Zoom\System.Runtime.Loader.dll ZoomInstallerFull.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ZoomInstallerFull.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OWFlMWIyMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pipanel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ZGNkNGFkNT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pipanel.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 pipanel.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString pipanel.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 Zoom.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Zoom.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 Zoom.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa20f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349040000000100000010000000497904b0eb8719ac47b0bc11519b74d0200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e Zoom.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 912 powershell.exe 1624 powershell.exe 1704 powershell.exe 2892 OWFlMWIyMD.exe 2892 OWFlMWIyMD.exe 2892 OWFlMWIyMD.exe 2892 OWFlMWIyMD.exe 2892 OWFlMWIyMD.exe 2892 OWFlMWIyMD.exe 2892 OWFlMWIyMD.exe 2892 OWFlMWIyMD.exe 2892 OWFlMWIyMD.exe 2892 OWFlMWIyMD.exe 2892 OWFlMWIyMD.exe 2892 OWFlMWIyMD.exe 2892 OWFlMWIyMD.exe 2892 OWFlMWIyMD.exe 2892 OWFlMWIyMD.exe 2892 OWFlMWIyMD.exe 2892 OWFlMWIyMD.exe 2892 OWFlMWIyMD.exe 2892 OWFlMWIyMD.exe 2892 OWFlMWIyMD.exe 2892 OWFlMWIyMD.exe 1668 pipanel.exe 2984 ZGNkNGFkNT.exe 2984 ZGNkNGFkNT.exe 2984 ZGNkNGFkNT.exe 2984 ZGNkNGFkNT.exe 2984 ZGNkNGFkNT.exe 2984 ZGNkNGFkNT.exe 2984 ZGNkNGFkNT.exe 2984 ZGNkNGFkNT.exe 2984 ZGNkNGFkNT.exe 2984 ZGNkNGFkNT.exe 2984 ZGNkNGFkNT.exe 2984 ZGNkNGFkNT.exe 2984 ZGNkNGFkNT.exe 2984 ZGNkNGFkNT.exe 2984 ZGNkNGFkNT.exe 2984 ZGNkNGFkNT.exe 2984 ZGNkNGFkNT.exe 2984 ZGNkNGFkNT.exe 2984 ZGNkNGFkNT.exe 2984 ZGNkNGFkNT.exe 2984 ZGNkNGFkNT.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2360 Zoom.exe Token: SeDebugPrivilege 912 powershell.exe Token: SeDebugPrivilege 1624 powershell.exe Token: SeDebugPrivilege 1704 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1460 ZoomInstallerFull.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2892 OWFlMWIyMD.exe 2984 ZGNkNGFkNT.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1460 wrote to memory of 2360 1460 ZoomInstallerFull.exe 30 PID 1460 wrote to memory of 2360 1460 ZoomInstallerFull.exe 30 PID 1460 wrote to memory of 2360 1460 ZoomInstallerFull.exe 30 PID 1460 wrote to memory of 2360 1460 ZoomInstallerFull.exe 30 PID 2360 wrote to memory of 912 2360 Zoom.exe 32 PID 2360 wrote to memory of 912 2360 Zoom.exe 32 PID 2360 wrote to memory of 912 2360 Zoom.exe 32 PID 2360 wrote to memory of 1624 2360 Zoom.exe 34 PID 2360 wrote to memory of 1624 2360 Zoom.exe 34 PID 2360 wrote to memory of 1624 2360 Zoom.exe 34 PID 2360 wrote to memory of 1704 2360 Zoom.exe 36 PID 2360 wrote to memory of 1704 2360 Zoom.exe 36 PID 2360 wrote to memory of 1704 2360 Zoom.exe 36 PID 2360 wrote to memory of 2892 2360 Zoom.exe 38 PID 2360 wrote to memory of 2892 2360 Zoom.exe 38 PID 2360 wrote to memory of 2892 2360 Zoom.exe 38 PID 2360 wrote to memory of 2892 2360 Zoom.exe 38 PID 2892 wrote to memory of 1668 2892 OWFlMWIyMD.exe 40 PID 2892 wrote to memory of 1668 2892 OWFlMWIyMD.exe 40 PID 2892 wrote to memory of 1668 2892 OWFlMWIyMD.exe 40 PID 2892 wrote to memory of 1668 2892 OWFlMWIyMD.exe 40 PID 2892 wrote to memory of 1668 2892 OWFlMWIyMD.exe 40 PID 2892 wrote to memory of 1668 2892 OWFlMWIyMD.exe 40 PID 2892 wrote to memory of 1668 2892 OWFlMWIyMD.exe 40 PID 2892 wrote to memory of 1668 2892 OWFlMWIyMD.exe 40 PID 2892 wrote to memory of 1668 2892 OWFlMWIyMD.exe 40 PID 2892 wrote to memory of 1668 2892 OWFlMWIyMD.exe 40 PID 2892 wrote to memory of 1668 2892 OWFlMWIyMD.exe 40 PID 2892 wrote to memory of 1668 2892 OWFlMWIyMD.exe 40 PID 2892 wrote to memory of 1668 2892 OWFlMWIyMD.exe 40 PID 2892 wrote to memory of 1668 2892 OWFlMWIyMD.exe 40 PID 2892 wrote to memory of 1668 2892 OWFlMWIyMD.exe 40 PID 2360 wrote to memory of 2984 2360 Zoom.exe 42 PID 2360 wrote to memory of 2984 2360 Zoom.exe 42 PID 2360 wrote to memory of 2984 2360 Zoom.exe 42 PID 2360 wrote to memory of 2984 2360 Zoom.exe 42 PID 2984 wrote to memory of 2104 2984 ZGNkNGFkNT.exe 43 PID 2984 wrote to memory of 2104 2984 ZGNkNGFkNT.exe 43 PID 2984 wrote to memory of 2104 2984 ZGNkNGFkNT.exe 43 PID 2984 wrote to memory of 2104 2984 ZGNkNGFkNT.exe 43 PID 2984 wrote to memory of 2104 2984 ZGNkNGFkNT.exe 43 PID 2984 wrote to memory of 2104 2984 ZGNkNGFkNT.exe 43 PID 2984 wrote to memory of 2104 2984 ZGNkNGFkNT.exe 43 PID 2984 wrote to memory of 2104 2984 ZGNkNGFkNT.exe 43 PID 2984 wrote to memory of 2104 2984 ZGNkNGFkNT.exe 43 PID 2984 wrote to memory of 2104 2984 ZGNkNGFkNT.exe 43 PID 2984 wrote to memory of 2104 2984 ZGNkNGFkNT.exe 43 PID 2984 wrote to memory of 2104 2984 ZGNkNGFkNT.exe 43 PID 2984 wrote to memory of 2104 2984 ZGNkNGFkNT.exe 43 PID 2984 wrote to memory of 2104 2984 ZGNkNGFkNT.exe 43 PID 2984 wrote to memory of 2104 2984 ZGNkNGFkNT.exe 43 PID 2984 wrote to memory of 2104 2984 ZGNkNGFkNT.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstallerFull.exe"C:\Users\Admin\AppData\Local\Temp\ZoomInstallerFull.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files (x86)\Zoom\Zoom.exe"C:\Program Files (x86)\Zoom\Zoom.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" /command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\9d4ffcb4-6ecf-4b8c-bca9-5f25c14ebb8a'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" /command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\9d4ffcb4-6ecf-4b8c-bca9-5f25c14ebb8a'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" /command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\9d4ffcb4-6ecf-4b8c-bca9-5f25c14ebb8a'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Users\Admin\AppData\Local\Temp\9d4ffcb4-6ecf-4b8c-bca9-5f25c14ebb8a\OWFlMWIyMD.exe"C:\Users\Admin\AppData\Local\Temp\9d4ffcb4-6ecf-4b8c-bca9-5f25c14ebb8a\OWFlMWIyMD.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe"C:\Users\Admin\AppData\Local\Temp\9d4ffcb4-6ecf-4b8c-bca9-5f25c14ebb8a\OWFlMWIyMD.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1668
-
-
-
C:\Users\Admin\AppData\Local\Temp\9d4ffcb4-6ecf-4b8c-bca9-5f25c14ebb8a\ZGNkNGFkNT.exe"C:\Users\Admin\AppData\Local\Temp\9d4ffcb4-6ecf-4b8c-bca9-5f25c14ebb8a\ZGNkNGFkNT.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe"C:\Users\Admin\AppData\Local\Temp\9d4ffcb4-6ecf-4b8c-bca9-5f25c14ebb8a\ZGNkNGFkNT.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2104
-
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD553e03d5e3bffa02fbc7fb1420ac8e858
SHA136c44c9ff39815aa167f341c286c5cd1514f771f
SHA25623a433398be5135222ee14bb1de6334e7b22bad1a38664a83f1cf19dfbddd960
SHA512f6aca16b90f6b4efa413dc9a8f1d05e83c1e3791b2cb988f9bce69d5272a0077c1edcae4111a494d166b5e3ab4e25956dead4e93ee1e43417c2b7bb082292170
-
Filesize
935KB
MD570eb44eb0dd30b93164e79141f484bac
SHA17142ca3672c89611b5276f7e7840ba15df4b823b
SHA25673dc36c220221e46ee9bd34e6bd6ae0cb567dc27b8434174dbe70998322aadf9
SHA512b9e33050d8b1019ee513c5d5481e954027bc3caa92f2dc653b5062e90b357cbc890a19445314959c0166857cf72af78d4195c845a9d89a3761b6c0da51acbb86
-
Filesize
1.1MB
MD593171815851f50223dc6e4343ee82e56
SHA12bbe250758e5d1b8f4f0ad34911f82da69e018f1
SHA2568a537682c8a328cd7f6220525e3cb63adf0323985fe4b109a3ff2df6fc228133
SHA512966581c6da0007bf2b212536f682bdda14b777396c9035455bfc05935baca2e557eda63b27c114ab21b598a8b2b932e3f25d910072a9258f9c63c77b507f7b2d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5b386a4a55a6c7998272f5a4bfd28c4ff
SHA1e0651e191c16f565c30fe64b5034fb7430499bfb
SHA2567b7fb473fdc1265d5916539ee42d1e4dd90b439c583905be5c4bece5e1c7bf26
SHA5129b4d13a505e2f33871f628297dac8bb6972fd7f7313d6b0e716fad7ec273353b7feee7c2ceebd97a6a5086dacb8c7a153e24124a1e7d975ebfe351001af7af91
-
Filesize
4.7MB
MD503a60a6652caf4f49ea5912ce4e1b33c
SHA1a0d949d4af7b1048dc55e39d1d1260a1e0660c4f
SHA256b23e7b820ed5c6ea7dcd77817e2cd79f1cec9561d457172287ee634a8bd658c3
SHA5126711d40d171ea200c92d062226a69f33eb41e9232d74291ef6f0202de73cf4dc54fbdd769104d2bb3e89dc2d81f2f2f3479e4258a5d6a54c545e56b07746b4c4
-
Filesize
1.2MB
MD5274761a595f86982214221b5685b3218
SHA1b908013028cb07fb799de2e48b6492404add6069
SHA2566d5910c0a0a4e3ee8863e4dadc73662d28ae9bfcda4a52960e26c1237386851a
SHA5123f9cf3d8e428619b798374f2e2a6ef9cf4213428277a74306978552772aae1a4a9ae7247c2dc893c0054d480dda871bbd74b0bc4afd65b0f584958d501ed8867
-
Filesize
1.9MB
MD5627ecf139beed59b4e1b26caac8f68e4
SHA19747fe073aed451c936a66f8ad112bbb1a8c31c8
SHA2560a01412b64e6889ace8933dd2f559d186b693aefe31e6b084e2d435b1737af39
SHA51225bdb740039c867ce0cc1347493cf456e32d767c898a683da1306992ae77ed3605612c804c2eae483320f18f2cd0850c17226ef21e09fe07997aa47679b6030e
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571