Malware Analysis Report

2024-12-07 14:14

Sample ID 241115-cl7q2azqgr
Target f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056
SHA256 f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056
Tags
agenttesla collection credential_access discovery keylogger persistence privilege_escalation spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056

Threat Level: Known bad

The file f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056 was found to be: Known bad.

Malicious Activity Summary

agenttesla collection credential_access discovery keylogger persistence privilege_escalation spyware stealer trojan

AgentTesla

Agenttesla family

AgentTesla payload

Reads user/profile data of local email clients

Reads data files stored by FTP clients

Reads user/profile data of web browsers

Unsecured Credentials: Credentials In Files

Reads WinSCP keys stored on the system

Checks computer location settings

Accesses Microsoft Outlook profiles

Adds Run key to start application

Suspicious use of SetThreadContext

System Network Configuration Discovery: Wi-Fi Discovery

System Location Discovery: System Language Discovery

Unsigned PE

Enumerates physical storage devices

Event Triggered Execution: Netsh Helper DLL

Scheduled Task/Job: Scheduled Task

Suspicious use of WriteProcessMemory

outlook_office_path

Suspicious behavior: RenamesItself

outlook_win_path

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-15 02:10

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-15 02:10

Reported

2024-11-15 02:13

Platform

win10v2004-20241007-en

Max time kernel

93s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe"

Signatures

AgentTesla

keylogger trojan stealer spyware agenttesla

Agenttesla family

agenttesla

AgentTesla payload

Description Indicator Process Target
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe N/A

Reads WinSCP keys stored on the system

spyware stealer

Reads data files stored by FTP clients

spyware stealer

Reads user/profile data of local email clients

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Unsecured Credentials: Credentials In Files

credential_access stealer

Accesses Microsoft Outlook profiles

collection
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MJVkSQ = "C:\\Users\\Admin\\AppData\\Roaming\\MJVkSQ\\MJVkSQ.exe" C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe N/A

Enumerates physical storage devices

Event Triggered Execution: Netsh Helper DLL

persistence privilege_escalation
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh C:\Windows\SysWOW64\netsh.exe N/A
Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh C:\Windows\SysWOW64\netsh.exe N/A
Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh C:\Windows\SysWOW64\netsh.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\schtasks.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\netsh.exe N/A

System Network Configuration Discovery: Wi-Fi Discovery

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: RenamesItself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1612 wrote to memory of 3536 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Windows\SysWOW64\schtasks.exe
PID 1612 wrote to memory of 3536 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Windows\SysWOW64\schtasks.exe
PID 1612 wrote to memory of 3536 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Windows\SysWOW64\schtasks.exe
PID 1612 wrote to memory of 1500 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe
PID 1612 wrote to memory of 1500 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe
PID 1612 wrote to memory of 1500 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe
PID 1612 wrote to memory of 1500 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe
PID 1612 wrote to memory of 1500 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe
PID 1612 wrote to memory of 1500 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe
PID 1612 wrote to memory of 1500 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe
PID 1612 wrote to memory of 1500 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe
PID 1500 wrote to memory of 4148 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Windows\SysWOW64\netsh.exe
PID 1500 wrote to memory of 4148 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Windows\SysWOW64\netsh.exe
PID 1500 wrote to memory of 4148 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Windows\SysWOW64\netsh.exe

outlook_office_path

Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe N/A

outlook_win_path

Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe

"C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unlOvmub" /XML "C:\Users\Admin\AppData\Local\Temp\tmp27C.tmp"

C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe

"{path}"

C:\Windows\SysWOW64\netsh.exe

"netsh" wlan show profile

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 71.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 217.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 us2.smtp.mailhostbox.com udp
US 208.91.199.223:587 us2.smtp.mailhostbox.com tcp
US 8.8.8.8:53 223.199.91.208.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp

Files

memory/1612-0-0x0000000075242000-0x0000000075243000-memory.dmp

memory/1612-1-0x0000000075240000-0x00000000757F1000-memory.dmp

memory/1612-2-0x0000000075240000-0x00000000757F1000-memory.dmp

memory/1612-3-0x0000000075240000-0x00000000757F1000-memory.dmp

memory/1612-4-0x0000000075242000-0x0000000075243000-memory.dmp

memory/1612-5-0x0000000075240000-0x00000000757F1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp27C.tmp

MD5 c9eb50169b73349a83618d95fdd4bec0
SHA1 de019467fafd64d731354025f5b8f5031b217a09
SHA256 374dbf28f4c5bcc448de0bd85f58b353bf86c8eefed8f849ba34d57818b6f1a9
SHA512 3b2de41ef39050b74b146484aaae2766bda41c0853f552e5873d1f4653cfd3d164ac593dd4f2c54a80649a9e0c518bbb4c97be0e5e941b96b714901930b02c55

memory/1500-11-0x0000000000400000-0x0000000000452000-memory.dmp

memory/1500-13-0x0000000075240000-0x00000000757F1000-memory.dmp

memory/1612-14-0x0000000075240000-0x00000000757F1000-memory.dmp

memory/1500-15-0x0000000075240000-0x00000000757F1000-memory.dmp

memory/1500-16-0x0000000075240000-0x00000000757F1000-memory.dmp

memory/1500-18-0x0000000075240000-0x00000000757F1000-memory.dmp

memory/1500-19-0x0000000075240000-0x00000000757F1000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-15 02:10

Reported

2024-11-15 02:13

Platform

win7-20240903-en

Max time kernel

119s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe"

Signatures

AgentTesla

keylogger trojan stealer spyware agenttesla

Agenttesla family

agenttesla

AgentTesla payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Reads WinSCP keys stored on the system

spyware stealer

Reads data files stored by FTP clients

spyware stealer

Reads user/profile data of local email clients

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Unsecured Credentials: Credentials In Files

credential_access stealer

Accesses Microsoft Outlook profiles

collection
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\MJVkSQ = "C:\\Users\\Admin\\AppData\\Roaming\\MJVkSQ\\MJVkSQ.exe" C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe N/A

Enumerates physical storage devices

Event Triggered Execution: Netsh Helper DLL

persistence privilege_escalation
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh C:\Windows\SysWOW64\netsh.exe N/A
Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh C:\Windows\SysWOW64\netsh.exe N/A
Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh C:\Windows\SysWOW64\netsh.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\netsh.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\schtasks.exe N/A

System Network Configuration Discovery: Wi-Fi Discovery

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\netsh.exe N/A

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious behavior: RenamesItself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2320 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Windows\SysWOW64\schtasks.exe
PID 2320 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Windows\SysWOW64\schtasks.exe
PID 2320 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Windows\SysWOW64\schtasks.exe
PID 2320 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Windows\SysWOW64\schtasks.exe
PID 2320 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe
PID 2320 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe
PID 2320 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe
PID 2320 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe
PID 2320 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe
PID 2320 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe
PID 2320 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe
PID 2320 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe
PID 2320 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe
PID 2512 wrote to memory of 852 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Windows\SysWOW64\netsh.exe
PID 2512 wrote to memory of 852 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Windows\SysWOW64\netsh.exe
PID 2512 wrote to memory of 852 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Windows\SysWOW64\netsh.exe
PID 2512 wrote to memory of 852 N/A C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe C:\Windows\SysWOW64\netsh.exe

outlook_office_path

Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe N/A

outlook_win_path

Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe

"C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\unlOvmub" /XML "C:\Users\Admin\AppData\Local\Temp\tmp10A.tmp"

C:\Users\Admin\AppData\Local\Temp\f069d9a92a90362bf1e409c0308a320e732ec7a01f33acd0522bee9ac4a00056.exe

"{path}"

C:\Windows\SysWOW64\netsh.exe

"netsh" wlan show profile

Network

N/A

Files

memory/2320-0-0x0000000074421000-0x0000000074422000-memory.dmp

memory/2320-1-0x0000000074420000-0x00000000749CB000-memory.dmp

memory/2320-2-0x0000000074420000-0x00000000749CB000-memory.dmp

memory/2320-3-0x0000000074420000-0x00000000749CB000-memory.dmp

memory/2320-4-0x0000000074420000-0x00000000749CB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp10A.tmp

MD5 ce453ab5e7b8b9880a0e13de5e8489d0
SHA1 2aea77104bdae0d6b369af01f826da62e3dddb18
SHA256 1002975d7596eda4b30cca39622f98d2b71adb3a177d15c83447aefcdac337bd
SHA512 5650d24acad2154ce77ee990cfb7cf1dcdb9ce84ba4ab72c16c9a312b5c89438af9c77d0fa85d45c36edb5d3dcbfb106c2a17a1e9e33336a9c02e2010840159b

memory/2512-10-0x0000000000400000-0x0000000000452000-memory.dmp

memory/2512-22-0x0000000000400000-0x0000000000452000-memory.dmp

memory/2512-20-0x0000000000400000-0x0000000000452000-memory.dmp

memory/2512-18-0x0000000000400000-0x0000000000452000-memory.dmp

memory/2512-16-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2512-24-0x0000000074420000-0x00000000749CB000-memory.dmp

memory/2512-25-0x0000000074420000-0x00000000749CB000-memory.dmp

memory/2320-23-0x0000000074420000-0x00000000749CB000-memory.dmp

memory/2512-15-0x0000000000400000-0x0000000000452000-memory.dmp

memory/2512-13-0x0000000000400000-0x0000000000452000-memory.dmp

memory/2512-12-0x0000000000400000-0x0000000000452000-memory.dmp

memory/2512-26-0x0000000074420000-0x00000000749CB000-memory.dmp

memory/2512-27-0x0000000074420000-0x00000000749CB000-memory.dmp

memory/2512-28-0x0000000074420000-0x00000000749CB000-memory.dmp

memory/2512-29-0x0000000074420000-0x00000000749CB000-memory.dmp

memory/2512-31-0x0000000074420000-0x00000000749CB000-memory.dmp