Analysis
-
max time kernel
148s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 02:42
Static task
static1
Behavioral task
behavioral1
Sample
c348002e3d2cf40a2fc3c819a96b1735dc451bb3ec32ba9355feaccd3eee63c0.msi
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c348002e3d2cf40a2fc3c819a96b1735dc451bb3ec32ba9355feaccd3eee63c0.msi
Resource
win10v2004-20241007-en
General
-
Target
c348002e3d2cf40a2fc3c819a96b1735dc451bb3ec32ba9355feaccd3eee63c0.msi
-
Size
13.8MB
-
MD5
5d2922491b47e1c355103194e069e5ac
-
SHA1
eb918f926c9cc2f9239f1dfe0380727c8170982c
-
SHA256
c348002e3d2cf40a2fc3c819a96b1735dc451bb3ec32ba9355feaccd3eee63c0
-
SHA512
522be674a5fb20af9a4fa42315ae8e780df3310f5b0ea8feccca1cf788cd6af542226aed65e9c6f7353d2daf954522f4067880626a2ccf4b7793178b57eb0bd9
-
SSDEEP
393216:GDFCbAjiImi73v4JPUQ6Rm1feeuQx1qbvto:GRCbAjCK6PEm12ZQx1qbFo
Malware Config
Signatures
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts AudioReaderXL.exe -
Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook AudioReaderXL.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AudioReaderXL.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AudioReaderXL.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AudioReaderXL.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Advanced Chart Manager = "C:\\Users\\Admin\\AppData\\Local\\Programs\\Audio Reader XL Premium\\AudioReaderXL.exe" AudioReaderXL.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\K: msiexec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File created C:\Windows\Installer\f785bf5.msi msiexec.exe File opened for modification C:\Windows\Installer\f785bf5.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI5FAD.tmp msiexec.exe File opened for modification C:\Windows\Installer\f785bf6.ipi msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\f785bf6.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\f785bf8.msi msiexec.exe -
Executes dropped EXE 1 IoCs
pid Process 924 AudioReaderXL.exe -
Loads dropped DLL 5 IoCs
pid Process 924 AudioReaderXL.exe 924 AudioReaderXL.exe 924 AudioReaderXL.exe 924 AudioReaderXL.exe 924 AudioReaderXL.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 2460 msiexec.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AudioReaderXL.exe -
Checks processor information in registry 2 TTPs 25 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor AudioReaderXL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status AudioReaderXL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AudioReaderXL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier AudioReaderXL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature AudioReaderXL.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AudioReaderXL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Signature AudioReaderXL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information AudioReaderXL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data AudioReaderXL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet AudioReaderXL.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 AudioReaderXL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Signature AudioReaderXL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier AudioReaderXL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status AudioReaderXL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Signature AudioReaderXL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data AudioReaderXL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform ID AudioReaderXL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet AudioReaderXL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier AudioReaderXL.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AudioReaderXL.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor AudioReaderXL.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 AudioReaderXL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information AudioReaderXL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier AudioReaderXL.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AudioReaderXL.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main AudioReaderXL.exe -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2840 msiexec.exe 2840 msiexec.exe 924 AudioReaderXL.exe 924 AudioReaderXL.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2460 msiexec.exe Token: SeIncreaseQuotaPrivilege 2460 msiexec.exe Token: SeRestorePrivilege 2840 msiexec.exe Token: SeTakeOwnershipPrivilege 2840 msiexec.exe Token: SeSecurityPrivilege 2840 msiexec.exe Token: SeCreateTokenPrivilege 2460 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2460 msiexec.exe Token: SeLockMemoryPrivilege 2460 msiexec.exe Token: SeIncreaseQuotaPrivilege 2460 msiexec.exe Token: SeMachineAccountPrivilege 2460 msiexec.exe Token: SeTcbPrivilege 2460 msiexec.exe Token: SeSecurityPrivilege 2460 msiexec.exe Token: SeTakeOwnershipPrivilege 2460 msiexec.exe Token: SeLoadDriverPrivilege 2460 msiexec.exe Token: SeSystemProfilePrivilege 2460 msiexec.exe Token: SeSystemtimePrivilege 2460 msiexec.exe Token: SeProfSingleProcessPrivilege 2460 msiexec.exe Token: SeIncBasePriorityPrivilege 2460 msiexec.exe Token: SeCreatePagefilePrivilege 2460 msiexec.exe Token: SeCreatePermanentPrivilege 2460 msiexec.exe Token: SeBackupPrivilege 2460 msiexec.exe Token: SeRestorePrivilege 2460 msiexec.exe Token: SeShutdownPrivilege 2460 msiexec.exe Token: SeDebugPrivilege 2460 msiexec.exe Token: SeAuditPrivilege 2460 msiexec.exe Token: SeSystemEnvironmentPrivilege 2460 msiexec.exe Token: SeChangeNotifyPrivilege 2460 msiexec.exe Token: SeRemoteShutdownPrivilege 2460 msiexec.exe Token: SeUndockPrivilege 2460 msiexec.exe Token: SeSyncAgentPrivilege 2460 msiexec.exe Token: SeEnableDelegationPrivilege 2460 msiexec.exe Token: SeManageVolumePrivilege 2460 msiexec.exe Token: SeImpersonatePrivilege 2460 msiexec.exe Token: SeCreateGlobalPrivilege 2460 msiexec.exe Token: SeBackupPrivilege 2960 vssvc.exe Token: SeRestorePrivilege 2960 vssvc.exe Token: SeAuditPrivilege 2960 vssvc.exe Token: SeBackupPrivilege 2840 msiexec.exe Token: SeRestorePrivilege 2840 msiexec.exe Token: SeRestorePrivilege 1488 DrvInst.exe Token: SeRestorePrivilege 1488 DrvInst.exe Token: SeRestorePrivilege 1488 DrvInst.exe Token: SeRestorePrivilege 1488 DrvInst.exe Token: SeRestorePrivilege 1488 DrvInst.exe Token: SeRestorePrivilege 1488 DrvInst.exe Token: SeRestorePrivilege 1488 DrvInst.exe Token: SeLoadDriverPrivilege 1488 DrvInst.exe Token: SeLoadDriverPrivilege 1488 DrvInst.exe Token: SeLoadDriverPrivilege 1488 DrvInst.exe Token: SeRestorePrivilege 2840 msiexec.exe Token: SeTakeOwnershipPrivilege 2840 msiexec.exe Token: SeRestorePrivilege 2840 msiexec.exe Token: SeTakeOwnershipPrivilege 2840 msiexec.exe Token: SeRestorePrivilege 2840 msiexec.exe Token: SeTakeOwnershipPrivilege 2840 msiexec.exe Token: SeRestorePrivilege 2840 msiexec.exe Token: SeTakeOwnershipPrivilege 2840 msiexec.exe Token: SeRestorePrivilege 2840 msiexec.exe Token: SeTakeOwnershipPrivilege 2840 msiexec.exe Token: SeRestorePrivilege 2840 msiexec.exe Token: SeTakeOwnershipPrivilege 2840 msiexec.exe Token: SeRestorePrivilege 2840 msiexec.exe Token: SeTakeOwnershipPrivilege 2840 msiexec.exe Token: SeRestorePrivilege 2840 msiexec.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2460 msiexec.exe 2460 msiexec.exe 924 AudioReaderXL.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 924 AudioReaderXL.exe 924 AudioReaderXL.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2840 wrote to memory of 924 2840 msiexec.exe 33 PID 2840 wrote to memory of 924 2840 msiexec.exe 33 PID 2840 wrote to memory of 924 2840 msiexec.exe 33 PID 2840 wrote to memory of 924 2840 msiexec.exe 33 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AudioReaderXL.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AudioReaderXL.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\c348002e3d2cf40a2fc3c819a96b1735dc451bb3ec32ba9355feaccd3eee63c0.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2460
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Programs\Audio Reader XL Premium\AudioReaderXL.exe"C:\Users\Admin\AppData\Local\Programs\Audio Reader XL Premium\AudioReaderXL.exe"2⤵
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:924
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000304" "0000000000000330"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1488
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5fb56dc96a77fcea979df9f8d26a85b1c
SHA1d6b8b90ea2096b4516a80331307734e0f855bde2
SHA256010ed443632fa06e16233da9e22bb945f87fc86ecb091c5f31e8397a59bb65ea
SHA5122d7d6623242eac09b8e84a89fac069836bb589838d193c88958d9c5c4338a896bb509c0d0f9fb1ab4b621f84a58d982701e81c8f04cdcfeb615a5b8902567204
-
Filesize
2.3MB
MD55d8a546c266cc1d2f14b3be5c662c67a
SHA1a474fe2bf3311a452bee640dbb423b20e0a99929
SHA2568eaeff4697ce489daee3d82e7c703409907bfb9fa890a3646b56634798e01bc4
SHA512cdd3c8c4a73ccf10d97097826e5b4567d0a3b227a9080e3ff7ad84eec6276a11c94a47f545d2b6023ed6a3b4b377d2073e6584b2ce4492f1de7789a7fa6c2cca
-
Filesize
59KB
MD5947023ba00312c4574a44688a11fd5eb
SHA1164a4609c041d93ccb645ab8df70e04ffb984508
SHA256aa45e23296396e41e3f1547ee8aa59989f2ee3e05651f27b842eca366c87f047
SHA512a6af49ba6e12b886bd30217a7ae5856881f553a4931acda2ae26e372fb79afc09ecf0a6364011adcdf2e2f93d76899a23570f00db2dce9d5c06a1a9c24b5c66d
-
Filesize
5.5MB
MD54035390af4171153c1cb708f7151ed5f
SHA19ed10ad504e6b19f6fd9570ed92a793bd2d79721
SHA256407048f9d01e5bf9051a043261a29c4654190444fe15e5f96f97c446ad7ae8d3
SHA51256c8942340b9d83c0c396aed680000e1a2c9a0f075cb8c96150d9341aeef4a62245a373288ca0546c21605333deca86dc2fd47812de605bb3eaeb08b987e22c8
-
Filesize
125KB
MD54d7d38ca87590e1c4787d834312485fb
SHA17114a6219f62149071e289ff171cb3a78dd43dd7
SHA256ba8827d76c9682a3fbb548c1c392bd058c1cfda1fd8654c715abfbdad750e9a0
SHA51228680ac747344f770d6a724c27f3b5f073c5a0d159ffa620900042ef25433e46f45d3a4c803175a92051f1f10b67f32ed2c41deb5b610f65e37bb41c701b2cd5
-
Filesize
4KB
MD53d44e666ce041981dbf7529916d4c92a
SHA10d51862ae922cebaa9638d542d6b4684e195a1a8
SHA25662edad9e609781d9cc130b3dcb9ac27c7342f79f97be295390c517251e98877b
SHA512665e016a6956588ce761aca0e11d9429164e05e471b8f9c7510b297ddf136b209ec112c6043af5407f3effdde3e09ac4baa47548209c5c09f156e483d447016b
-
Filesize
3KB
MD58c3d5df72e234543b6619a38ea4c9915
SHA142247b1b09814b174742d85a87e842af096426c9
SHA2563a5ddb81221d346b0a4f9dcbdcefa7d63f38d4570d0c9b0627a7698094ba4356
SHA5129f52d48261909bb151449dac60eb5d74128fab03e89c2e50ee9a872d263e0f4d27203fc898e4ba1e39510672de6ca0caea0329640c78b639da58defb1f18c225
-
Filesize
1.2MB
MD5f5dd27918cdc45136567ceb8b216c5b8
SHA1d7da1e100292ab7d6908516a60a555be77b6d01e
SHA2568a4c862ffdf0e858ae721bce97e2a5951c4d8dd665856459c41378141f5f2772
SHA512c1d2240dc168df8cad9355f5266093babf0eaf257f40206a18f3364d0d3f2b1d03042241cef8134df06aa11cfb386f231ea48fa433801ace68282bbe32d904bf
-
Filesize
403KB
MD57d96ebf6ab548ac4e9f6ee761454de9f
SHA1cc121db7480602a3e3a10cfc453f2604258805d2
SHA25639c4355690759ade7e5a645603c46c48ff83b0d47163fbf7ffe9eaa92dfaecaf
SHA512b2bf462d11217c764a5071b2e84b18cfdba778b48705afbde6e38f68dff80f8fe9a8f3c0f27cc731efa114e2ddd3a67219d79b289934c328d3820a2fe017a0df
-
Filesize
322B
MD5df00c215260aaa2d2b571005d38dee66
SHA1a32c80f9023a9efb2d23a0c9d2b67824f5dfe85c
SHA25672d8c1c2d41160e27830af8c48d49c8bb36cbcb03c4dcd0ecada3e43bcea31d8
SHA512b15911c9a908758006200d31bc359611f3e6eb197cf98b61307680fee1bcad011beb5d09b6e7fe4e14b31e00715950b1ba43e5ab26e43207f36c856e3b61cddc
-
Filesize
753B
MD5622f3d0b51d18328020f858c77ac4a9c
SHA184ec68b009c254fbcbf8d0fe38917e27eee26392
SHA2564f39de7b48d8cd80f40267250df737619c122c260e982ca64029ce6bbc852d95
SHA5121f9712be02005380a52806478eb316d9d9f212cedfd7458eb337b9534823ddd5ad69e4f2d968d8ce8825286372a1da90423a8ef0e0bba6068deaeeff228656fa
-
Filesize
782B
MD526c76e66cf53cf7767f08c00e4659b09
SHA10907744fe2d42ebb9b53be23ad28dddb256acbd2
SHA2565cbd87a6585c0bbc9904dff390d98333c36dd7728fbb67ece896bdd93abfd066
SHA512874746b34fe44ba42e3aebb691b446ad6a8f7ceda52ca35c99b2a06ab754e4538931eb3bb3d2beb71196102bd1516a14ddfe9235f94bfd42d117c596a8129b39
-
Filesize
1.8MB
MD51adb1764e42021f4049b1ae9f2e1d614
SHA1813df01ff0a7562f1d0a02ab1f60f3f60435abd4
SHA25688183affe3e1feb95c8b9f55b2d4a63bcbd1e8b40b901ec01bdcaa15a6d442a1
SHA512e3d4f0efb59a7f77b5940a0a3c26aec5a5e879dc42f951376bb6c5e4184f137bd624d766c10b6315294860cb0b7113ff2fd6b4d09c89b4f9421b73705dd5e647
-
Filesize
8.7MB
MD5ba095598cffb424c202781656ca2f2a7
SHA1013486f84aba2a89955c6a62def2fd9524dba151
SHA256f7b8d216b27fa51d835d262ee55fbd836d08b4f413e42bad38dea658f1779aed
SHA512687223da11c8e0507a57b8480421400cbc44476ee94407e3601a8797e86449f95bf72ce47520071816523b40377509a27cfbdab29eac7c97f68c4411a852229c
-
Filesize
255B
MD5a09cd34d7b0c5d9855e09181c6dd72e8
SHA1d6b1fa061c69bc773922336824ed8b6040b9690c
SHA256c7b45450bf29b9e7dbce2b7ebc0583875edd233180eeca698b2b681c5da9200d
SHA512b6af8cd55d1361e248091e4de08a13f6deabaa5e129aef6a29f161916682ab8a9133955e418bcda0e79cdd053f0872c0d1b2525e5fafa275f431886d88580ea1
-
Filesize
46KB
MD5b13fcb3223116f6eec60be9143cae98b
SHA19a9eb6da6d8e008a51e6ce6212c49bfbe7cb3c88
SHA256961fc9bf866c5b58401d3c91735f9a7b7b4fc93c94038c504c965491f622b52b
SHA51289d72b893acd2ec537b3c3deffcc71d1ce02211f9f5b931c561625ee7162052b511e46d4b4596c0a715e1c992310f2536ebdd512db400eeab23c8960ec4d312d
-
Filesize
13.8MB
MD55d2922491b47e1c355103194e069e5ac
SHA1eb918f926c9cc2f9239f1dfe0380727c8170982c
SHA256c348002e3d2cf40a2fc3c819a96b1735dc451bb3ec32ba9355feaccd3eee63c0
SHA512522be674a5fb20af9a4fa42315ae8e780df3310f5b0ea8feccca1cf788cd6af542226aed65e9c6f7353d2daf954522f4067880626a2ccf4b7793178b57eb0bd9
-
Filesize
652KB
MD5f35e190d9847aee93157ad18bee2ff51
SHA1011dd903705ac60f39a74191b41b82c11c53abe6
SHA256faf2b98ef2934c7addf7056a3b6f2fa56c814db79d960f8fb2744e4e4d260500
SHA512f4329b5bed3a840e1e630be9a5a61903d2aae31d6fac068d6f750b98a0d2b65de9b38db1ddd6298c104704d48593996bc7db8f6e6d77f1117bfc8e0431935738
-
Filesize
336KB
MD5741fd2623ad12de3403f39ef575181e3
SHA154f3fa29a9565278109ba6a4049f403970110c49
SHA2561612b2db97aa51736de92be6fc50c502394169ed4dc3e9bfde06f331dd08790a
SHA512045171c2f8b65a0ce41ac86680dbc2683c1561ed008a4f33c34874cddefb8f5b15aa7f402dc98386e7b37428fc7ea86325c19c2e3b1b91bc401fc1659f6b8705