Analysis
-
max time kernel
107s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2025, 12:01
Static task
static1
Behavioral task
behavioral1
Sample
01NEW_PURCHASE_ORDER_654576554.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
01NEW_PURCHASE_ORDER_654576554.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
libvlc.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
libvlc.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
libvlccore.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
libvlccore.dll
Resource
win10v2004-20250217-en
General
-
Target
01NEW_PURCHASE_ORDER_654576554.exe
-
Size
969KB
-
MD5
f9538485432d3ec640f89096ba2d4d00
-
SHA1
b050b847b1fe8be78d56b29bd23c25e05c227a92
-
SHA256
5d695d8a0bb1d919cc77a2aa2488a61797bfa065238160278ee458120630aaf9
-
SHA512
ea7aeedd15f4d6a6005f8cfb7d404dfb0c302c837e48de7e3ff44d7d5908f8de6c0a81f736d874a491eddc89fdf753976be6f635e7e8512f5abb7f32caa8cfc5
-
SSDEEP
24576:oFZAiQHDhht8m7FpUi1L1OXJz5zzz3zzzozzz3zzzNz:CZAiQHlhtz7FpWdwz
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7518188422:AAHmsiSJGbuq2bkotqlSAYxEVWayoAQB6Rw/sendMessage?chat_id=5210110905
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles 1 TTPs 27 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\01NEW_PURCHASE_ORDER_654576554 = "cmd.exe /C start \"\" /D \"C:\\Users\\Admin\\SystemRootDoc\" \"C:\\Users\\Admin\\SystemRootDoc\\01NEW_PURCHASE_ORDER_654576554.exe\"" 01NEW_PURCHASE_ORDER_654576554.exe -
Looks up external IP address via web service 11 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 reallyfreegeoip.org 25 reallyfreegeoip.org 26 reallyfreegeoip.org 30 reallyfreegeoip.org 22 reallyfreegeoip.org 20 reallyfreegeoip.org 24 reallyfreegeoip.org 27 reallyfreegeoip.org 28 reallyfreegeoip.org 29 reallyfreegeoip.org 7 checkip.dyndns.org -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 4504 set thread context of 4016 4504 01NEW_PURCHASE_ORDER_654576554.exe 87 PID 4504 set thread context of 2756 4504 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 4504 set thread context of 4964 4504 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 4504 set thread context of 940 4504 01NEW_PURCHASE_ORDER_654576554.exe 90 PID 4504 set thread context of 1332 4504 01NEW_PURCHASE_ORDER_654576554.exe 91 PID 4504 set thread context of 2996 4504 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 4504 set thread context of 4884 4504 01NEW_PURCHASE_ORDER_654576554.exe 94 PID 4504 set thread context of 4036 4504 01NEW_PURCHASE_ORDER_654576554.exe 95 PID 4504 set thread context of 5000 4504 01NEW_PURCHASE_ORDER_654576554.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4016 installutil.exe 2756 AddInProcess32.exe 4964 AddInProcess32.exe 940 AddInProcess32.exe 1332 AddInProcess32.exe 4884 installutil.exe 2996 AddInProcess32.exe 4036 AddInProcess32.exe 5000 installutil.exe 4964 AddInProcess32.exe 4884 installutil.exe 1332 AddInProcess32.exe 2756 AddInProcess32.exe 2996 AddInProcess32.exe 4016 installutil.exe 940 AddInProcess32.exe 4036 AddInProcess32.exe 5000 installutil.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 4016 installutil.exe Token: SeDebugPrivilege 2756 AddInProcess32.exe Token: SeDebugPrivilege 4964 AddInProcess32.exe Token: SeDebugPrivilege 940 AddInProcess32.exe Token: SeDebugPrivilege 1332 AddInProcess32.exe Token: SeDebugPrivilege 4884 installutil.exe Token: SeDebugPrivilege 2996 AddInProcess32.exe Token: SeDebugPrivilege 4036 AddInProcess32.exe Token: SeDebugPrivilege 5000 installutil.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4504 wrote to memory of 4992 4504 01NEW_PURCHASE_ORDER_654576554.exe 86 PID 4504 wrote to memory of 4992 4504 01NEW_PURCHASE_ORDER_654576554.exe 86 PID 4504 wrote to memory of 4992 4504 01NEW_PURCHASE_ORDER_654576554.exe 86 PID 4504 wrote to memory of 4016 4504 01NEW_PURCHASE_ORDER_654576554.exe 87 PID 4504 wrote to memory of 4016 4504 01NEW_PURCHASE_ORDER_654576554.exe 87 PID 4504 wrote to memory of 4016 4504 01NEW_PURCHASE_ORDER_654576554.exe 87 PID 4504 wrote to memory of 4016 4504 01NEW_PURCHASE_ORDER_654576554.exe 87 PID 4504 wrote to memory of 4016 4504 01NEW_PURCHASE_ORDER_654576554.exe 87 PID 4504 wrote to memory of 4016 4504 01NEW_PURCHASE_ORDER_654576554.exe 87 PID 4504 wrote to memory of 4016 4504 01NEW_PURCHASE_ORDER_654576554.exe 87 PID 4504 wrote to memory of 4016 4504 01NEW_PURCHASE_ORDER_654576554.exe 87 PID 4504 wrote to memory of 2756 4504 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 4504 wrote to memory of 2756 4504 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 4504 wrote to memory of 2756 4504 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 4504 wrote to memory of 2756 4504 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 4504 wrote to memory of 2756 4504 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 4504 wrote to memory of 2756 4504 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 4504 wrote to memory of 2756 4504 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 4504 wrote to memory of 2756 4504 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 4504 wrote to memory of 4964 4504 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 4504 wrote to memory of 4964 4504 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 4504 wrote to memory of 4964 4504 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 4504 wrote to memory of 4964 4504 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 4504 wrote to memory of 4964 4504 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 4504 wrote to memory of 4964 4504 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 4504 wrote to memory of 4964 4504 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 4504 wrote to memory of 4964 4504 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 4504 wrote to memory of 940 4504 01NEW_PURCHASE_ORDER_654576554.exe 90 PID 4504 wrote to memory of 940 4504 01NEW_PURCHASE_ORDER_654576554.exe 90 PID 4504 wrote to memory of 940 4504 01NEW_PURCHASE_ORDER_654576554.exe 90 PID 4504 wrote to memory of 940 4504 01NEW_PURCHASE_ORDER_654576554.exe 90 PID 4504 wrote to memory of 940 4504 01NEW_PURCHASE_ORDER_654576554.exe 90 PID 4504 wrote to memory of 940 4504 01NEW_PURCHASE_ORDER_654576554.exe 90 PID 4504 wrote to memory of 940 4504 01NEW_PURCHASE_ORDER_654576554.exe 90 PID 4504 wrote to memory of 940 4504 01NEW_PURCHASE_ORDER_654576554.exe 90 PID 4504 wrote to memory of 1332 4504 01NEW_PURCHASE_ORDER_654576554.exe 91 PID 4504 wrote to memory of 1332 4504 01NEW_PURCHASE_ORDER_654576554.exe 91 PID 4504 wrote to memory of 1332 4504 01NEW_PURCHASE_ORDER_654576554.exe 91 PID 4504 wrote to memory of 1332 4504 01NEW_PURCHASE_ORDER_654576554.exe 91 PID 4504 wrote to memory of 1332 4504 01NEW_PURCHASE_ORDER_654576554.exe 91 PID 4504 wrote to memory of 1332 4504 01NEW_PURCHASE_ORDER_654576554.exe 91 PID 4504 wrote to memory of 1332 4504 01NEW_PURCHASE_ORDER_654576554.exe 91 PID 4504 wrote to memory of 1332 4504 01NEW_PURCHASE_ORDER_654576554.exe 91 PID 4504 wrote to memory of 2996 4504 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 4504 wrote to memory of 2996 4504 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 4504 wrote to memory of 2996 4504 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 4504 wrote to memory of 2996 4504 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 4504 wrote to memory of 2996 4504 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 4504 wrote to memory of 2996 4504 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 4504 wrote to memory of 2996 4504 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 4504 wrote to memory of 2996 4504 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 4504 wrote to memory of 4464 4504 01NEW_PURCHASE_ORDER_654576554.exe 93 PID 4504 wrote to memory of 4464 4504 01NEW_PURCHASE_ORDER_654576554.exe 93 PID 4504 wrote to memory of 4464 4504 01NEW_PURCHASE_ORDER_654576554.exe 93 PID 4504 wrote to memory of 4884 4504 01NEW_PURCHASE_ORDER_654576554.exe 94 PID 4504 wrote to memory of 4884 4504 01NEW_PURCHASE_ORDER_654576554.exe 94 PID 4504 wrote to memory of 4884 4504 01NEW_PURCHASE_ORDER_654576554.exe 94 PID 4504 wrote to memory of 4884 4504 01NEW_PURCHASE_ORDER_654576554.exe 94 PID 4504 wrote to memory of 4884 4504 01NEW_PURCHASE_ORDER_654576554.exe 94 PID 4504 wrote to memory of 4884 4504 01NEW_PURCHASE_ORDER_654576554.exe 94 PID 4504 wrote to memory of 4884 4504 01NEW_PURCHASE_ORDER_654576554.exe 94 PID 4504 wrote to memory of 4884 4504 01NEW_PURCHASE_ORDER_654576554.exe 94 PID 4504 wrote to memory of 4036 4504 01NEW_PURCHASE_ORDER_654576554.exe 95 PID 4504 wrote to memory of 4036 4504 01NEW_PURCHASE_ORDER_654576554.exe 95 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01NEW_PURCHASE_ORDER_654576554.exe"C:\Users\Admin\AppData\Local\Temp\01NEW_PURCHASE_ORDER_654576554.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:4992
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:940
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:4464
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4884
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4036
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:1752
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:5000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
969KB
MD5f9538485432d3ec640f89096ba2d4d00
SHA1b050b847b1fe8be78d56b29bd23c25e05c227a92
SHA2565d695d8a0bb1d919cc77a2aa2488a61797bfa065238160278ee458120630aaf9
SHA512ea7aeedd15f4d6a6005f8cfb7d404dfb0c302c837e48de7e3ff44d7d5908f8de6c0a81f736d874a491eddc89fdf753976be6f635e7e8512f5abb7f32caa8cfc5
-
Filesize
1KB
MD5eeb3effd33296260cbf1327ff5edc80b
SHA1ee9e1817be8520b3ffd2d3bcfe5eaac9930e86fa
SHA25638f35ac0456e9019b7e0784c2d5ce6053cb60b2650fafa1e568ee0a433b7b366
SHA5124d820dd8a0a88af4dfb92136f921f6d29f5b5c85a15407c9451546a8b6fc6757fda4388fe01ee6c9832dc0f19910f5752591ee3d41449ebfbcf6cdda3f6c42fc
-
Filesize
1.6MB
MD583f7907f5d4dc316bd1f0f659bb73d52
SHA16fc1ac577f127d231b2a6bf5630e852be5192cf2
SHA256dac76ce6445baeae894875c114c76f95507539cb32a581f152b6f4ed4ff43819
SHA512a57059ef5d66d3c5260c725cae02012cf763268bd060fa6bc3064aedff9275d5d1628ff8138261f474136ab11724e9f951a5fdd3759f91476336903eb3b53224
-
Filesize
704KB
MD53640f664abb0232e89293db691aa664b
SHA1ac9742e7244893a871168495d2ff98e680420749
SHA2563a3e942674bf428b115f86a5aaee7151b1c031dd797ef7377c53e3d9cafeb017
SHA51212634394ef199f175ed17d0ba1212461d4d6e5add031acfbc0c477bcdc5b0a9e6492d1dc38d9be922bb62995e811ece2b397e91a3f4cf28240fdc1480c564346
-
Filesize
13KB
MD59f1c56963269a1fde07e686a47ac46cc
SHA181f928cfa9d805b8b7dec6b145482ff00a9c73ff
SHA256ce5a13b54d06ed403dc03eeec7d920414b4038a4d74be696451813cb8ae209c2
SHA512f3d64f35e03365bd80d8796510cbd4c65ca30cea50dffea33a7d6dafb85637e1e9c357de839f466e10bb2574f4da0afa9ad2ce2d99af1ca81a6db1e824798216
-
Filesize
93KB
MD5910779e60eeda65cf2cb26d377350593
SHA15572b97e3cd1e7dbd06a84307797f0ba2741e873
SHA2562d5767be304e34aceed95b728fbe110672b217b2979f90f1bb756333bbb195ba
SHA512197a352526a39205f0a203358c654abef10c92317727561a4547e225263addd946d02e2231fa25a05448b51d6b7960c4bb781fb74581573b52bdc4f42129415b
-
Filesize
15KB
MD5eab39052b51bf487857128954b553358
SHA1b383227a228cede354ef846e7d41b8b0bd7e9aa8
SHA256338376c70ad786a52cd73d86783b4ea1caf9f51c84682282c5168799671ac32d
SHA512efcfae21bffd2324718758f2078b32e5de4931ec711f766c35f1ef2e60d75a83dac78dba8fe0ead449ea97030699eeba32f4c186535caa30f1f6c23821e41bb8
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_6.0.27_(x64)_20250217151018_000_dotnet_runtime_6.0.27_win_x64.msi.log
Filesize551KB
MD54c544e5c3bcac8223e96e5b4d20ae954
SHA1db56e963fee522feb919c53c8efa9476bba97be6
SHA256aa7e9ee743c79b706292876eb0f7935ea6c483494015852219c8098e23a77769
SHA512d6f5e05c8b3be6dff8333e19d12eb0f45cd2d240dbfddbe288aa1abc44ef2482fb68b1b9d4a28564aad8e071e11c8b6fcf731562bcb680c889bd8d1a3a5d184d
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_6.0.27_(x64)_20250217151018_001_dotnet_hostfxr_6.0.27_win_x64.msi.log
Filesize95KB
MD52141466782212cee4b7fd4ced3ea0ca2
SHA120d74ec481136a5ffdd96a72c4803679b6198213
SHA2561ea8b7c314551e116411339c0a50df734dd059e9a2700de3c68b8d3e39f6e5a1
SHA51237e12882cae97211e113e5d5a86923fc849549494edb5d9c0eb1d38f8c5582801459bace9bc86aed88b140babb0fc807a23f700cb50aeaf8b4c17173b985aa08
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_6.0.27_(x64)_20250217151018_002_dotnet_host_6.0.27_win_x64.msi.log
Filesize105KB
MD589946fa0914543868edd8faf513dacfe
SHA194c1be21fba3d9431419905c4abfc4a735f5b88e
SHA25663d18c68ee00566b86b862d61341c5f88a118e4485b3783b7968339a1202398f
SHA512c8404b1693cbd851520b3906a461f73f6d1f9606ec20b11d247290fd8eb9570d8fb8c84991495395aeb23635a467a0af870bf038559b001e993493fe6c6d702c
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_6.0.27_(x64)_20250217151018_003_windowsdesktop_runtime_6.0.27_win_x64.msi.log
Filesize847KB
MD523969d3f91104760e75cd6ef267271ee
SHA11229e27dd4b2ca70a6861e8c0bf455c76d44ca47
SHA2564db6e2b6210c279a05cf59d997339fe2b0e72fa3bcfa73720950eb4a178c7439
SHA512050b2034297cb6c8e2fdf23f63fbde807545b65b0b0ec9f80fed862d064397a280c0fc9b47fbda606c378f6e31e41e0ec93013ba8781c6f77e6ffffe3ee486cd
-
Filesize
15KB
MD500a22e06d9e27d01b962e3178b77b73c
SHA1712400da8fa91524739674548b3e4056a14f06b1
SHA2568daa721d122af0fb4b064d5cc58b0f8368ce82e895addaa5a04552721fa4630e
SHA512e93f0e3cd285d5d493d707ff66dd879a69a9604e1837276850ba8e8013fb524ca4b0acd96cb180882c1b0fc78800584db23bfa44e02a882c32eeefa9430411c0
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_7.0.16_(x64)_20250217151041_000_dotnet_runtime_7.0.16_win_x64.msi.log
Filesize470KB
MD5ce2498b66cf133a98efa93bbb2c44e07
SHA19a08d5fc20f33f0ff085ec93f1a3a8ff7dc9691e
SHA256180995f6ec772e8d5157511ef5fccfa2228cceb0bbeec09fa2472da297e8e67c
SHA512b82ce0bf82c5b10f577a5b6d904802b2a9f4d394c8fe239f16e5d977f6c1d8c1181fe123391fd81356cc4b77a5142e1beeb009defa204fb1718e289984aa0573
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_7.0.16_(x64)_20250217151041_001_dotnet_hostfxr_7.0.16_win_x64.msi.log
Filesize95KB
MD57eb172882d41527cfa6a2b135c649cdc
SHA1d95b8b1580512386f490e141babb727c9c2256ae
SHA256cf94457acabbfb0d9c1f2fd3a83d246fb93c17f08ce0ff5f0e16687228230596
SHA512d69760901888942ddd0c1042406ee095f2eab9ad475bfc1a10697de547ad154be85fb874c0ab221ab40754da3d043100319e189ddbff7328dfa3bf15c3e004be
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_7.0.16_(x64)_20250217151041_002_dotnet_host_7.0.16_win_x64.msi.log
Filesize109KB
MD50f61a93792d5890eea7d48d6640bbc62
SHA1cf7752b08f456d6d4d8b9287afb1821f1bd0ccb8
SHA256d5bc043fd0df21a129a8db815c22c86f39f20c5f6b54512c18a33291c5d01f78
SHA512c71ca1f9ef65adc045151455853d7acd94c9e5567b9cf535aa81d4578fe09a831713530be23d3fcae2f815cb3b78dd8db91aa7b5a0d36306e8854d547721d387
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_7.0.16_(x64)_20250217151041_003_windowsdesktop_runtime_7.0.16_win_x64.msi.log
Filesize852KB
MD59d9ea7929b8b618acfe0de5ec78e4451
SHA124cd0b7a14eb52395c1ada032b1aee39d8ea318c
SHA256688c008f69593e3d630c1f464691a2fb9f5e46688972f9df7996e5aa6450aaeb
SHA51218910c52d5293fac76b38f9b3ef0eb70e795dd11ee1271bac106a7d4228dea542f430133bf141ba1a7fd89a087af1066fa13b5276130a18f7127aab5acca407d
-
Filesize
15KB
MD5f942734061c183868675b65a9628dc0c
SHA13c71b7cf5df7f7589cae142e0f7ca79f44cae4b4
SHA256cbd027d2b2a3b9bc0a9961f9d15c969c0d67ee3e15487a0ee3d72d36b3fb68f0
SHA51297aa755583cfcba32c2d0cd64a1d3fcecbd7f3c739c465997290fdcf4345336990b57d74c6763ce50009a600d524ec43abc273e11df62da8cdfe8cf30b9f2262
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_8.0.2_(x64)_20250217151102_000_dotnet_runtime_8.0.2_win_x64.msi.log
Filesize469KB
MD583a91aca87063084b6ca32a41209ca36
SHA1554d05ce4c5da3e11ab0c8a5fa10f840940cd7f1
SHA2561b3515971d9d6a8a4bdb27a30b017f28a7e58456045e8e983139703165c4db22
SHA512dee72f4d4c2af2d0906c58671ee649e61d6c34ee0e72d1cde3ebcf2059c1acbd36c1e4256a41ead9875c0b2317b77bd780f33a1f00717c841a4a549dcc0e7b34
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_8.0.2_(x64)_20250217151102_001_dotnet_hostfxr_8.0.2_win_x64.msi.log
Filesize95KB
MD5e2ee6006f43a1c3de83824e1a007de70
SHA12f15fa9461a29c53bfc3453c05078ccbb0851b3e
SHA2569ff56f294fa9561da85422f91e747345b12d8a51998bb4061f5c4d9fdeaab5df
SHA5128f7b86787bdb456172df99cb6b246fd3eafad36f623251ef3fd0f89144a7c0907188480d030fb948c40dc9a09378fde90b7867aa2d5bc929e1142c077708560b
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_8.0.2_(x64)_20250217151102_002_dotnet_host_8.0.2_win_x64.msi.log
Filesize109KB
MD5c47ef1bd33368afd6e6f6cc54cfaf8af
SHA164672254cf605587df6c0d875f346219275b5187
SHA256ad25da78860ae790b4c1e8cc4f1f274c68af47e40228988960e3243c9e854e22
SHA512ffc96d11d647f205727b1a3e0b1332b011c9d647775c9a327ac67dd6bbf8e49e2df163aed9ed21eb834eb67d7efbb1b7f20b3f9d09aa06de8ff3e280707001bc
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_8.0.2_(x64)_20250217151102_003_windowsdesktop_runtime_8.0.2_win_x64.msi.log
Filesize846KB
MD52acb253c2b437bc45466450bb751bca8
SHA12a485f0e513454ac7504f448da6e4d1e212935e3
SHA25651c0a13a44310fe8074d5e0f277134e797599cd7fdcc6e38e18233fba2ca448a
SHA512156c676faf1da09a0f0039f461ffb970b3ce5dbd38509a105f4425549cd3dc9a95c3eb48aeb16bb7493fa6de5be4b813c600ba446bbd25711c0aa89a8e4dfdb9
-
Filesize
55KB
MD5c5d439a2ee473ff399daa4d7d3c31e21
SHA123fd9807258314b560620904ba14a26c9fd0f8b5
SHA256363921e803e5cca88d2aa6048f3fa74398e22dc39ba44ce869b86d29a0054ea8
SHA5126fdc04487bfc313c64ac96bf90d73318fc282612352e2241311042f254bd404696ab7af1b1c77b04b4c3e0ae2826d66b3ccf5525742c61c893dc5ac898a6db2c
-
Filesize
180KB
MD5abee8e70ad6a64eb1c1c045c6b5972e5
SHA1cc9e2ee1336ab7f91d30bf972e2f84b5b17705f2
SHA2569a1c9101e6b074fb9f379bd0e938dacb6e5e116f6c366fa527370c18ed2a29c2
SHA512638cd6e91833998b3341016fcc032ce4d97dbf7758a6199b2d4a45eff59a4238d15b79c534a0387cca7fef654b527c4b28d86f9a525c2f93293932ac8fff6952
-
Filesize
470B
MD5ea84a6c7daa39b123d69ebef0407a6cc
SHA11c80dd369172b3e106be280315e65d34fc34f824
SHA25613a0e5cc451d8c3efbec4d1c02e649194b81fd98787d5083287af24ac1746420
SHA5125dc9ef0f4b394d242d78559734af375035e563f35e518b91bd3a084b7499f925f877cceab99790f9022bd18035af09885b8842fcdaacea5c26ae90dfba7ec5ca
-
Filesize
6KB
MD5dd12bc185d6f577707ddcb41bd1df4ed
SHA189f86bbd79f762b61c2687e48d1ca8229747d24e
SHA256d2bddf7603146904b107e4b1be58d7f4c46e40ccb5d70c6bec79e4f4f213cf76
SHA512a2beaa758b81976842b6146439a53c8102e26dc27790cc4ef621a36a318be417141213a8f0eab8fbb8c41dc503300527a22955a85dc449f622fb41f569282180
-
Filesize
1KB
MD583c27a7232a859b606347d73633fe56f
SHA1800cacf5246ce01299e408e3ef75bacb5e3a2313
SHA256ebae9037dbe9f2d8b1507889c12b7b4f1526dee95eb47de891e0bee2cc0c2215
SHA51249c04d8a0d5b56587db83d3f3825b297a0f471835bdfd60549d4a72e7694d0aea964a50fc783532c2e49b8ced317beff341a684d2caf84dce0a5986a97c6e94c
-
Filesize
428KB
MD5b66ae1843c71695d69dac6edf3bb6062
SHA1dfe6c00461808552bcc083a336501ff23ab22705
SHA2568224c78b80bc26927ee938c539bfa90d32816757b94e4c8a49b7bb8d9bb82c30
SHA512f275dbadbf81f8848c295a501bb7286387369ccfe1c22237a5a5b8c7d1c87807896551db2ee3a5e7cdaf7f30b8ae792c0d1f5ac59f20e914e28db02f7d808924
-
Filesize
415KB
MD5f40669e661764fffa435b0f9c171007a
SHA1da825f4ea359ebae6645fdff207f5a067c2fe992
SHA256cc24e0cd0089e89a1b65f8a7f512816d7abc8ea0956f14f91a95f04776fa3258
SHA512b2944840830b19fe9f4ce56d1a377acf6762004bc980afef5f3d7df04684f3d15846bcd2a5e47e847ad62de356741df751bd415dda6e13cd7debe0e81551a6a3
-
Filesize
11KB
MD58ab9bb9c85b740f1f1d0aa05e1d13790
SHA11533aa912c1f388d6145aa1e883105d28c1c6df3
SHA2560450cf39fd2210b0aa3d59bfc853137d6e8bc1e7e91511464d32cb68ac489566
SHA512991135f1942525847857626f5a4403e34529c3ac67a4e2ece7b7f3d504bc0818e42f89cfee16173da8f4c16cc89a674cd52c69ce02aea9d0123d3bb6f0a0201d
-
Filesize
11KB
MD5dbdbc2d1cbce3d2582a5c6371583a961
SHA185bc95b05fc318e5b410e11e2f9daee87abd2407
SHA25609cc7cc5ed68ddec0a03dd2b333192c92b89a4d56d1ccea604517bb131d39d52
SHA5122dc70f36387789f7617af2f23f87f4948088e4a762138a4eae86d6d85e3cfc6c1d5bc222e2fb25f77089c4364b2d7202d67fe0ca4341e1218e28d8966d626557
-
Filesize
13B
MD5b2a4bc176e9f29b0c439ef9a53a62a1a
SHA11ae520cbbf7e14af867232784194366b3d1c3f34
SHA2567b4f72a40bd21934680f085afe8a30bf85acff1a8365af43102025c4ccf52b73
SHA512e04b85d8d45d43479abbbe34f57265b64d1d325753ec3d2ecadb5f83fa5822b1d999b39571801ca39fa32e4a0a7caab073ccd003007e5b86dac7b1c892a5de3f
-
Filesize
163KB
MD5890541cf533a5e051f39fe52f3819e68
SHA1154030ba1650ffcfdabd000c1c9ccf9117333ae1
SHA256f83ea14306489732cf909a69466ef827dc7108bb8c6c091a08bafba3f8d92625
SHA5121b820b620b97019f8327f9ca599b58d6513d7901d918ba9b580be3bdf146d9c63184b379d909462af51c87671c12d98b370516bd3dd8ecc287fcdb9476d2c5fe
-
Filesize
5.4MB
MD5c4f182929e104fbbc39824af31f9acd0
SHA1544b196ea43d5bcf393416090853e1bba8d97a1d
SHA25612639187c389abbcdf730f03286c2d69092b17dc2f2672823520484603a1b531
SHA512a06ff2799d35aa018a485b41db6910ae323dc933a1052bc318733ce11c7ad7a91d0f8a289a86e2deb627c931bb09b3bc2249fc04bca515099de78378f37cbf7d
-
Filesize
2.7MB
MD5c62c3ef5753af6e0980f38eebc196b1c
SHA1fd1d62feaaacb7cad5f952b61a6f7bd60d6dc4e1
SHA2562ddb85b36650f85b5a09724c5b17428b1b1b76bd3e3dd85b643933659d5e333d
SHA512f2338d26b073d8a796a7a19ee290b87b63f30f6cfa62e74d147756d2362898a167784c860d9bc098b1ec1a080aaa0fad25ca8c611b7e8f42ea8195c2b14abdfc
-
Filesize
120KB
MD5d3186aada63877a1fe1c2ed4b2e2b77d
SHA1f66d9307be6cbbb22941c724d2cf6954b41d7bb0
SHA2562684d360ec473113d922a2738c5c6f6702975e6ac7ee4023258a12ed26c9fefe
SHA512c94e8aa368a44f1df9f0318ca266f5a6a9140945d55a579dee2fd10aff3d4704a72a216718b35e44429012d68c2bb30a92d5179fbc9fb4b222456a017d8981c0
-
Filesize
3KB
MD529235b646cf51280b5adb091278bb0d0
SHA1c45b811d6193428c81c47670168c3bb601e504fb
SHA256707775aa410e2f96bffb63425c4964f324d5b5edbaee2cfb9d99ec069f58956f
SHA51240d1f96b4c3f0407f64756c29f76835963bc6a06f96eeee9d36ddd93b57e80660732cf8e771aa6bcf47329683857860acee6431b8b6d339a91000249974f46fa
-
Filesize
63KB
MD5e516a60bc980095e8d156b1a99ab5eee
SHA1238e243ffc12d4e012fd020c9822703109b987f6
SHA256543796a1b343b4ebc0285d89cb8eb70667ac7b513da37495e38003704e9d88d7
SHA5129b51e99ba20e9da56d1acc24a1cf9f9c9dbdeb742bec034e0ff2bc179a60f4aff249f40344f9ddd43229dcdefa1041940f65afb336d46c175ffeff725c638d58
-
Filesize
697B
MD5bd19af188375d632bb5bc8038534d2d2
SHA1204cd0cc2382259a73a91eb48ff0ffe5a9c80a4e
SHA25629cbc217d9a6c96755301a8d47441f7e4a857948dc1e56b41ff67f4504cc66ff
SHA512ce10934d84a2daeb9cfebf51db2d50b27fabd85a04c14f34abbdf409970d4c8262c22718f880a58ede6a4b34a5b7715884b1cdc0a2357db3eefb8083012e5a2a