Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2024, 09:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://87.120.84.38/txt/f2rPs6mHkljoAcH.exe
Resource
win10v2004-20241007-en
General
-
Target
http://87.120.84.38/txt/f2rPs6mHkljoAcH.exe
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
185.198.59.26 - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@@ - Email To:
[email protected]
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1732 powershell.exe 1636 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation f2rPs6mHkljoAcH.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation f2rPs6mHkljoAcH.exe -
Executes dropped EXE 4 IoCs
pid Process 4120 f2rPs6mHkljoAcH.exe 3940 f2rPs6mHkljoAcH.exe 3484 f2rPs6mHkljoAcH.exe 3376 f2rPs6mHkljoAcH.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 f2rPs6mHkljoAcH.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 f2rPs6mHkljoAcH.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 f2rPs6mHkljoAcH.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 f2rPs6mHkljoAcH.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 f2rPs6mHkljoAcH.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 f2rPs6mHkljoAcH.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 75 checkip.dyndns.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4120 set thread context of 3484 4120 f2rPs6mHkljoAcH.exe 134 PID 3940 set thread context of 3376 3940 f2rPs6mHkljoAcH.exe 136 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2rPs6mHkljoAcH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2rPs6mHkljoAcH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2rPs6mHkljoAcH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2rPs6mHkljoAcH.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 847267.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 3524 msedge.exe 3524 msedge.exe 532 msedge.exe 532 msedge.exe 4784 identity_helper.exe 4784 identity_helper.exe 1984 msedge.exe 1984 msedge.exe 3940 f2rPs6mHkljoAcH.exe 4120 f2rPs6mHkljoAcH.exe 3940 f2rPs6mHkljoAcH.exe 4120 f2rPs6mHkljoAcH.exe 3940 f2rPs6mHkljoAcH.exe 4120 f2rPs6mHkljoAcH.exe 3940 f2rPs6mHkljoAcH.exe 4120 f2rPs6mHkljoAcH.exe 3484 f2rPs6mHkljoAcH.exe 3484 f2rPs6mHkljoAcH.exe 3376 f2rPs6mHkljoAcH.exe 3376 f2rPs6mHkljoAcH.exe 1636 powershell.exe 1636 powershell.exe 1732 powershell.exe 1732 powershell.exe 1732 powershell.exe 1636 powershell.exe 3376 f2rPs6mHkljoAcH.exe 3484 f2rPs6mHkljoAcH.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4120 f2rPs6mHkljoAcH.exe Token: SeDebugPrivilege 3940 f2rPs6mHkljoAcH.exe Token: SeDebugPrivilege 3484 f2rPs6mHkljoAcH.exe Token: SeDebugPrivilege 3376 f2rPs6mHkljoAcH.exe Token: SeDebugPrivilege 1732 powershell.exe Token: SeDebugPrivilege 1636 powershell.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 532 wrote to memory of 3224 532 msedge.exe 84 PID 532 wrote to memory of 3224 532 msedge.exe 84 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3020 532 msedge.exe 85 PID 532 wrote to memory of 3524 532 msedge.exe 86 PID 532 wrote to memory of 3524 532 msedge.exe 86 PID 532 wrote to memory of 4856 532 msedge.exe 87 PID 532 wrote to memory of 4856 532 msedge.exe 87 PID 532 wrote to memory of 4856 532 msedge.exe 87 PID 532 wrote to memory of 4856 532 msedge.exe 87 PID 532 wrote to memory of 4856 532 msedge.exe 87 PID 532 wrote to memory of 4856 532 msedge.exe 87 PID 532 wrote to memory of 4856 532 msedge.exe 87 PID 532 wrote to memory of 4856 532 msedge.exe 87 PID 532 wrote to memory of 4856 532 msedge.exe 87 PID 532 wrote to memory of 4856 532 msedge.exe 87 PID 532 wrote to memory of 4856 532 msedge.exe 87 PID 532 wrote to memory of 4856 532 msedge.exe 87 PID 532 wrote to memory of 4856 532 msedge.exe 87 PID 532 wrote to memory of 4856 532 msedge.exe 87 PID 532 wrote to memory of 4856 532 msedge.exe 87 PID 532 wrote to memory of 4856 532 msedge.exe 87 PID 532 wrote to memory of 4856 532 msedge.exe 87 PID 532 wrote to memory of 4856 532 msedge.exe 87 PID 532 wrote to memory of 4856 532 msedge.exe 87 PID 532 wrote to memory of 4856 532 msedge.exe 87 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 f2rPs6mHkljoAcH.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 f2rPs6mHkljoAcH.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://87.120.84.38/txt/f2rPs6mHkljoAcH.exe1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdce0346f8,0x7ffdce034708,0x7ffdce0347182⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,16187786224597040278,4517284749486935744,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,16187786224597040278,4517284749486935744,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,16187786224597040278,4517284749486935744,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16187786224597040278,4517284749486935744,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16187786224597040278,4517284749486935744,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,16187786224597040278,4517284749486935744,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 /prefetch:82⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,16187786224597040278,4517284749486935744,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16187786224597040278,4517284749486935744,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16187786224597040278,4517284749486935744,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2076,16187786224597040278,4517284749486935744,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5544 /prefetch:82⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16187786224597040278,4517284749486935744,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16187786224597040278,4517284749486935744,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16187786224597040278,4517284749486935744,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2076,16187786224597040278,4517284749486935744,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3392 /prefetch:82⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2076,16187786224597040278,4517284749486935744,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1856 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
-
C:\Users\Admin\Downloads\f2rPs6mHkljoAcH.exe"C:\Users\Admin\Downloads\f2rPs6mHkljoAcH.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4120 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads\f2rPs6mHkljoAcH.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
C:\Users\Admin\Downloads\f2rPs6mHkljoAcH.exe"C:\Users\Admin\Downloads\f2rPs6mHkljoAcH.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3484
-
-
-
C:\Users\Admin\Downloads\f2rPs6mHkljoAcH.exe"C:\Users\Admin\Downloads\f2rPs6mHkljoAcH.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3940 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Downloads\f2rPs6mHkljoAcH.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
C:\Users\Admin\Downloads\f2rPs6mHkljoAcH.exe"C:\Users\Admin\Downloads\f2rPs6mHkljoAcH.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3376
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,16187786224597040278,4517284749486935744,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5648 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4120
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:848
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
Filesize
124KB
MD5852f378d85159e3bacb397cb2bb592a5
SHA175dd461550f9fd56c16aaf987fc2404dfc76011f
SHA256f6c1e85c14b18ac731203ce028932d384721ccc22e01563b0f224e98e77d3597
SHA512dbff63af53904c44e6df3b2280af8634d29f0193111269b7c59cddcfa3ede61a463b4e69c981ccf3c0ca40623fc30de462af5a8ff9ed16cd3315d91c20329bdc
-
Filesize
5KB
MD53a9c9c2a2a2e6e5294467d86364e9770
SHA1ace83bd6a87b69eb3b204afaf17103ac4d5c5b96
SHA2561de05f72803e2322c8c0ca271c35bb5681b8ad5c684ed2c1c6f5bbbf0692bc9e
SHA51251f535dda5eaa79840a277cee851aeabbd0dcf371e2075afe2979f916654921b95f51f21f2f2adf96da68eba7d877b4bd8920073128fd3a9244a8b346f43d3b0
-
Filesize
6KB
MD558c380bf94880122c39acc44676ecc5b
SHA1ec4abcba1b6609ce2d1fcb9fe92ae2f9974ba645
SHA256317c595469d002ecfc710e13d6f7173a3666b12321361877eab3e2d1815b9f8b
SHA512de93b756cc0c4954301235c201f45e9540b1dbb51212b405fa20573d90d0a177640f773a5a5162ad30308b579d0ed97bc89ca60ba17b5627ff2307ef78ac9adc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b86887dec2b2feeb763922ce51b98044
SHA17035b4faeb611df7cf2c477764cbb53ad0440db7
SHA2562ed3187556366f736a59d9e93dbdad12f8ce5291e4b1760c9c6bc39d9a836456
SHA51268d2af59f923578d1161d24c354b6678f9bb287c1e2778b61e2f35af1e6c407558cf080da48ceff242b715742ecc183318957fb36118b75e27af7ff40e2196a8
-
Filesize
12KB
MD55bee7bdc3bb5edbafddcc08e4671fdfa
SHA11d5cabfdc2607b11776b1361f9fd55289bc4f160
SHA256d23223c3d475d7fa673558f88430a5142d8500e1885a60cb94fac6b2de3c8529
SHA5125ab15c9365b46c8cd2e9a2e18501f4ac435ebce31836dae0e11a31e0b856fbb3392c4d191cbf128190d7072fbefa001a87a503cc66f6fd3c9e2be148efc3733b
-
Filesize
18KB
MD59777baee6cd6d31aa8dff7937eb2a9da
SHA1e7fbb7dfec13a83f1734a9d2e630e6a01d54d85c
SHA256c844a66507f0442f2424f79cf6f1c3c81af99daae070848380674f033c5b3c6a
SHA5122cad921f49bfc51b2ae018e648b89719f501afab76c4e882d9008f66d82c2127d43a6e12b7b7ef284584ee2ab8d27122ab69f333d40995077a7d579ec6835742
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
960KB
MD5cd437678986f11ba11e754bb1153f9a0
SHA124fe760f960ce0653d014fa5348decfae1918f13
SHA256548c158482e4cc2f2b6c931c92f66dc70a0e35c8a8031709249f8634e10e0108
SHA51278eb44e2c9b64ecaf87875ce4aff4dc97bc84e4706f56ff263066e138fbaf5cd0cbf4b4eb63deb82413d20bd9eb2b6b3f468d4e7ba127ba640ff5163ba615a1c