Resubmissions
24/02/2025, 12:08
250224-pa55aa1pw5 1024/02/2025, 09:40
250224-lnmnbavpt3 1020/02/2025, 03:42
250220-d9d93awkdk 10Analysis
-
max time kernel
121s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2025, 09:40
Static task
static1
Behavioral task
behavioral1
Sample
01NEW_PURCHASE_ORDER_654576554.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
01NEW_PURCHASE_ORDER_654576554.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
libvlc.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
libvlc.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
libvlccore.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
libvlccore.dll
Resource
win10v2004-20250217-en
General
-
Target
01NEW_PURCHASE_ORDER_654576554.exe
-
Size
969KB
-
MD5
f9538485432d3ec640f89096ba2d4d00
-
SHA1
b050b847b1fe8be78d56b29bd23c25e05c227a92
-
SHA256
5d695d8a0bb1d919cc77a2aa2488a61797bfa065238160278ee458120630aaf9
-
SHA512
ea7aeedd15f4d6a6005f8cfb7d404dfb0c302c837e48de7e3ff44d7d5908f8de6c0a81f736d874a491eddc89fdf753976be6f635e7e8512f5abb7f32caa8cfc5
-
SSDEEP
24576:oFZAiQHDhht8m7FpUi1L1OXJz5zzz3zzzozzz3zzzNz:CZAiQHlhtz7FpWdwz
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7518188422:AAHmsiSJGbuq2bkotqlSAYxEVWayoAQB6Rw/sendMessage?chat_id=5210110905
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles 1 TTPs 27 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\01NEW_PURCHASE_ORDER_654576554 = "cmd.exe /C start \"\" /D \"C:\\Users\\Admin\\SystemRootDoc\" \"C:\\Users\\Admin\\SystemRootDoc\\01NEW_PURCHASE_ORDER_654576554.exe\"" 01NEW_PURCHASE_ORDER_654576554.exe -
Looks up external IP address via web service 11 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 39 reallyfreegeoip.org 40 reallyfreegeoip.org 14 checkip.dyndns.org 28 reallyfreegeoip.org 29 reallyfreegeoip.org 33 reallyfreegeoip.org 36 reallyfreegeoip.org 37 reallyfreegeoip.org 41 reallyfreegeoip.org 42 reallyfreegeoip.org 27 reallyfreegeoip.org -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 3764 set thread context of 4812 3764 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 3764 set thread context of 3980 3764 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 3764 set thread context of 3068 3764 01NEW_PURCHASE_ORDER_654576554.exe 90 PID 3764 set thread context of 4560 3764 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 3764 set thread context of 4800 3764 01NEW_PURCHASE_ORDER_654576554.exe 93 PID 3764 set thread context of 2408 3764 01NEW_PURCHASE_ORDER_654576554.exe 94 PID 3764 set thread context of 2364 3764 01NEW_PURCHASE_ORDER_654576554.exe 95 PID 3764 set thread context of 4892 3764 01NEW_PURCHASE_ORDER_654576554.exe 96 PID 3764 set thread context of 3400 3764 01NEW_PURCHASE_ORDER_654576554.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 4812 AddInProcess32.exe 3980 AddInProcess32.exe 3068 AddInProcess32.exe 4560 installutil.exe 4800 AddInProcess32.exe 2408 AddInProcess32.exe 2364 AddInProcess32.exe 4892 AddInProcess32.exe 3400 installutil.exe 3400 installutil.exe 4812 AddInProcess32.exe 3980 AddInProcess32.exe 3068 AddInProcess32.exe 4560 installutil.exe 4800 AddInProcess32.exe 2364 AddInProcess32.exe 2408 AddInProcess32.exe 4892 AddInProcess32.exe 3400 installutil.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 4812 AddInProcess32.exe Token: SeDebugPrivilege 3980 AddInProcess32.exe Token: SeDebugPrivilege 3068 AddInProcess32.exe Token: SeDebugPrivilege 4560 installutil.exe Token: SeDebugPrivilege 4800 AddInProcess32.exe Token: SeDebugPrivilege 2408 AddInProcess32.exe Token: SeDebugPrivilege 2364 AddInProcess32.exe Token: SeDebugPrivilege 4892 AddInProcess32.exe Token: SeDebugPrivilege 3400 installutil.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3764 wrote to memory of 4812 3764 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 3764 wrote to memory of 4812 3764 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 3764 wrote to memory of 4812 3764 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 3764 wrote to memory of 4812 3764 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 3764 wrote to memory of 4812 3764 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 3764 wrote to memory of 4812 3764 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 3764 wrote to memory of 4812 3764 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 3764 wrote to memory of 4812 3764 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 3764 wrote to memory of 3980 3764 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 3764 wrote to memory of 3980 3764 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 3764 wrote to memory of 3980 3764 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 3764 wrote to memory of 3980 3764 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 3764 wrote to memory of 3980 3764 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 3764 wrote to memory of 3980 3764 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 3764 wrote to memory of 3980 3764 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 3764 wrote to memory of 3980 3764 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 3764 wrote to memory of 3068 3764 01NEW_PURCHASE_ORDER_654576554.exe 90 PID 3764 wrote to memory of 3068 3764 01NEW_PURCHASE_ORDER_654576554.exe 90 PID 3764 wrote to memory of 3068 3764 01NEW_PURCHASE_ORDER_654576554.exe 90 PID 3764 wrote to memory of 3068 3764 01NEW_PURCHASE_ORDER_654576554.exe 90 PID 3764 wrote to memory of 3068 3764 01NEW_PURCHASE_ORDER_654576554.exe 90 PID 3764 wrote to memory of 3068 3764 01NEW_PURCHASE_ORDER_654576554.exe 90 PID 3764 wrote to memory of 3068 3764 01NEW_PURCHASE_ORDER_654576554.exe 90 PID 3764 wrote to memory of 3068 3764 01NEW_PURCHASE_ORDER_654576554.exe 90 PID 3764 wrote to memory of 2112 3764 01NEW_PURCHASE_ORDER_654576554.exe 91 PID 3764 wrote to memory of 2112 3764 01NEW_PURCHASE_ORDER_654576554.exe 91 PID 3764 wrote to memory of 2112 3764 01NEW_PURCHASE_ORDER_654576554.exe 91 PID 3764 wrote to memory of 4560 3764 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 3764 wrote to memory of 4560 3764 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 3764 wrote to memory of 4560 3764 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 3764 wrote to memory of 4560 3764 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 3764 wrote to memory of 4560 3764 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 3764 wrote to memory of 4560 3764 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 3764 wrote to memory of 4560 3764 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 3764 wrote to memory of 4560 3764 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 3764 wrote to memory of 4800 3764 01NEW_PURCHASE_ORDER_654576554.exe 93 PID 3764 wrote to memory of 4800 3764 01NEW_PURCHASE_ORDER_654576554.exe 93 PID 3764 wrote to memory of 4800 3764 01NEW_PURCHASE_ORDER_654576554.exe 93 PID 3764 wrote to memory of 4800 3764 01NEW_PURCHASE_ORDER_654576554.exe 93 PID 3764 wrote to memory of 4800 3764 01NEW_PURCHASE_ORDER_654576554.exe 93 PID 3764 wrote to memory of 4800 3764 01NEW_PURCHASE_ORDER_654576554.exe 93 PID 3764 wrote to memory of 4800 3764 01NEW_PURCHASE_ORDER_654576554.exe 93 PID 3764 wrote to memory of 4800 3764 01NEW_PURCHASE_ORDER_654576554.exe 93 PID 3764 wrote to memory of 2408 3764 01NEW_PURCHASE_ORDER_654576554.exe 94 PID 3764 wrote to memory of 2408 3764 01NEW_PURCHASE_ORDER_654576554.exe 94 PID 3764 wrote to memory of 2408 3764 01NEW_PURCHASE_ORDER_654576554.exe 94 PID 3764 wrote to memory of 2408 3764 01NEW_PURCHASE_ORDER_654576554.exe 94 PID 3764 wrote to memory of 2408 3764 01NEW_PURCHASE_ORDER_654576554.exe 94 PID 3764 wrote to memory of 2408 3764 01NEW_PURCHASE_ORDER_654576554.exe 94 PID 3764 wrote to memory of 2408 3764 01NEW_PURCHASE_ORDER_654576554.exe 94 PID 3764 wrote to memory of 2408 3764 01NEW_PURCHASE_ORDER_654576554.exe 94 PID 3764 wrote to memory of 2364 3764 01NEW_PURCHASE_ORDER_654576554.exe 95 PID 3764 wrote to memory of 2364 3764 01NEW_PURCHASE_ORDER_654576554.exe 95 PID 3764 wrote to memory of 2364 3764 01NEW_PURCHASE_ORDER_654576554.exe 95 PID 3764 wrote to memory of 2364 3764 01NEW_PURCHASE_ORDER_654576554.exe 95 PID 3764 wrote to memory of 2364 3764 01NEW_PURCHASE_ORDER_654576554.exe 95 PID 3764 wrote to memory of 2364 3764 01NEW_PURCHASE_ORDER_654576554.exe 95 PID 3764 wrote to memory of 2364 3764 01NEW_PURCHASE_ORDER_654576554.exe 95 PID 3764 wrote to memory of 2364 3764 01NEW_PURCHASE_ORDER_654576554.exe 95 PID 3764 wrote to memory of 4892 3764 01NEW_PURCHASE_ORDER_654576554.exe 96 PID 3764 wrote to memory of 4892 3764 01NEW_PURCHASE_ORDER_654576554.exe 96 PID 3764 wrote to memory of 4892 3764 01NEW_PURCHASE_ORDER_654576554.exe 96 PID 3764 wrote to memory of 4892 3764 01NEW_PURCHASE_ORDER_654576554.exe 96 PID 3764 wrote to memory of 4892 3764 01NEW_PURCHASE_ORDER_654576554.exe 96 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01NEW_PURCHASE_ORDER_654576554.exe"C:\Users\Admin\AppData\Local\Temp\01NEW_PURCHASE_ORDER_654576554.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:2112
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4560
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4800
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:4280
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
969KB
MD5f9538485432d3ec640f89096ba2d4d00
SHA1b050b847b1fe8be78d56b29bd23c25e05c227a92
SHA2565d695d8a0bb1d919cc77a2aa2488a61797bfa065238160278ee458120630aaf9
SHA512ea7aeedd15f4d6a6005f8cfb7d404dfb0c302c837e48de7e3ff44d7d5908f8de6c0a81f736d874a491eddc89fdf753976be6f635e7e8512f5abb7f32caa8cfc5
-
Filesize
1KB
MD5b97ae254205bf091ea41d3d0db347748
SHA1c5e61940b06ce0f2659a7adc49854e23c634ff18
SHA25667bd08ff305a1042a4983e0f1478d5ed8a18e899cf6c96ffe47c1ea0ad55991a
SHA5122ad0ddbf484099e2a2364f60483935080270ff822ee326e3ad30c3219b48e20772056257363b844b6359ba4fee5486fe4be6867a910d6523b1695825c7b802ed
-
Filesize
1.6MB
MD583f7907f5d4dc316bd1f0f659bb73d52
SHA16fc1ac577f127d231b2a6bf5630e852be5192cf2
SHA256dac76ce6445baeae894875c114c76f95507539cb32a581f152b6f4ed4ff43819
SHA512a57059ef5d66d3c5260c725cae02012cf763268bd060fa6bc3064aedff9275d5d1628ff8138261f474136ab11724e9f951a5fdd3759f91476336903eb3b53224
-
Filesize
13KB
MD518a2b4f28eff58dbba586c51b2052ce0
SHA125f6e83e099e7ba633ae3b82a1d6bb81ba39a656
SHA256471538e44ec4e5c781b08343d8e3ef2b00f2744a2cd40e93b37012a44e8096df
SHA512b061500ad9208cae1e49d7631da80f1f0b21650fd7fbdf1bedd693caa9343449010b2c93580df04ccbcb1b69703f69a7ddb3d07bd03b6ef92088bbbd126ecb31
-
Filesize
93KB
MD560a336c96525cbf3ad641701563195a3
SHA19bc30c3ec986a1ff01cb07b1ed12dbc54f8137c7
SHA2562f1cbff4a2210a3a46ffdc971724ca68a8885055234548d9d21d0032a3a817cb
SHA5126c4c958c4c0ec81fd5c1577e100b28ab9fa4cf6da3f3fde86263092ed84440ad9795179d0806daa353e4d806529a353e1e9b6f892d9d315d585f13ab9e516844
-
Filesize
15KB
MD5ea98db3e2cebabf397203dc7bf7efa80
SHA1f21c58971313d17e2dc13cacb4680030e750cfac
SHA256c2da2421a9f77f499cf103cd0d8b2cb42c7f7012ba33c07f5f83bacd9571d005
SHA51262559f47ddd54096412322185f7adb2aa1561635a3027413c8ea4b7f825dfc33fee7d2310fd5629c03d693faa8fd987113a9b05101ef52116974f997d61362f6
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_6.0.27_(x64)_20250217150957_000_dotnet_runtime_6.0.27_win_x64.msi.log
Filesize551KB
MD5ca7ccfc8c340003f761cdd7c518db5da
SHA1b8400c1f5296f16ed811a137e78433b9d4340c84
SHA256ba812b4bd6ec02db5b9c57bfacfa600773d290054046e6eb750520549c8fc575
SHA512b57794fd49a0ab1e4c5c95f8eba8f6515f1c73505d36552002b951e20ff024ecdccfb02e188d56b5ee00f64ca8f746da8004d4ab96ef42058c61e071be644d47
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_6.0.27_(x64)_20250217150957_001_dotnet_hostfxr_6.0.27_win_x64.msi.log
Filesize95KB
MD58b1ca74b37b471bdb95fba2b41912448
SHA16c42bd4244ba63e3ad4c417a219aa71a2f8d933a
SHA2567625213119b2bc48bb3a4d724560b738de21c86956f02e5aeb46d48f27d6a59d
SHA512f5af52d0b04bb31be91e7d5c433f3a0925e7bbbb757e29dc346c5ef3de6dbf884ef487a7f8d9251d84e4bd0fc41735292edd694057dd4b9c539dc3cec02dd3fa
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_6.0.27_(x64)_20250217150957_002_dotnet_host_6.0.27_win_x64.msi.log
Filesize105KB
MD54edf71be18da5d7b24de314d0e5ce7d8
SHA1dfe13e2b1d17f433f2d1a1a28a0da49f5134c07f
SHA256c2e893905ada5c1ae85f37d2b0a6f4c7e83827c92a686a631cd95837458ddf30
SHA51270efc449e13f2cfeba5abc9e89cfd4e731e11ea0a50e61f1236b3880b241b43c7fcd0bba74016e3bb97c20d46a0479252cb3ac9f98ea78ba5d2f6098d4186c1a
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_6.0.27_(x64)_20250217150957_003_windowsdesktop_runtime_6.0.27_win_x64.msi.log
Filesize847KB
MD55b5030a44a7cb9259d96aa0e9d7b9174
SHA1f23338eb09ddc2c791867a242c58ff7c8482a3d3
SHA256e479da5ca6ea67ac940a6812d9bed525658805d38f5c15be70b0dcdb56be3fb5
SHA512222b012bfed62eb2b9545dfd3659a58a9b4c0c05a39ccddfe548a2f08acb5afa9029fc2551c664b3f9de6fe9b7798797f3497a5c6ad209ba231d5ec3c3a1b477
-
Filesize
15KB
MD5dd13865ffe92f83af52f4c846701c9e1
SHA152cf4f351362d52588bf2f1e9b07ca770597bcb2
SHA25601416f178e093e36c53cf8697ee9d97cf2ef17739fda2a686cf06034160aa872
SHA512f7f792cdd1fe747e7d98957280911401718a5e68ce910165a17ae8462737f3c0730271769889cb67054542bd2c2834c6be0e6ea9eb74facfadc8720dc5479983
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_7.0.16_(x64)_20250217151019_000_dotnet_runtime_7.0.16_win_x64.msi.log
Filesize470KB
MD592eb728594ef635a0b3756038d5fe502
SHA1900561897ea504b0f1906fc5ce53e62ee5c60dfd
SHA256950d6015231387cc9b9e30468c8323c92bea86b2189edf869dd30a94ed780755
SHA512ea5d492cf3bcbc6993d9f854adad6b79c1706cd47979482c84c41bf27a464d9dd6d11d77e1704d08b7e3e42d95a75921d83789da34fdb2a703ec83aa2f7c3b34
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_7.0.16_(x64)_20250217151019_001_dotnet_hostfxr_7.0.16_win_x64.msi.log
Filesize95KB
MD55cf8c9fcc62fb0fbd79293c21e4a16dd
SHA13d644c462bd34aa383d7cce304ac088dbf2bcac3
SHA256a754fb0aea4989e5f870c2e86301cc3e04b018d37c6d53808c657d683544b766
SHA5129d7e12e54d31e8fed511d8c92ae0376a13871ec6049e94118e945defd69c5b14a69d71d4f8d81492406f26ad7106fdd12ca19dc0328d550c41675a0a282c2ad2
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_7.0.16_(x64)_20250217151019_002_dotnet_host_7.0.16_win_x64.msi.log
Filesize109KB
MD58b82b2ac9244824a9492c81065f1eb26
SHA19265aad90418edb308d2cb0822719ea182e1aad5
SHA25656946fba306b7204ab91b9750a2d944371d992a72037ed554ac50a7dfaa2a052
SHA51292a1800af89d89f04909c2ce721e3e17f893f94299c8aae7e0735123fb7abed78e325f3b07eca6ed0f48964ef14daf42de24d3e51b8dd970814d2b2e7a2a6ef6
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_7.0.16_(x64)_20250217151019_003_windowsdesktop_runtime_7.0.16_win_x64.msi.log
Filesize852KB
MD5c07191cf0999e77965740a30956f29bb
SHA1ee1aed73784e47173b56d8b7af61da3c305d802f
SHA256772fb69cb8fd1dbbcbd1ec3e84f4003fde65cf0dc8a276ca031ff694a88b2f49
SHA512d7aeb5c5b0ac21dc5d503a74b8a4d914cf8bf9552137a68931d0d1812325569dcda754879967ea057c67f5662645103e6c0b7a4f1d15a3341535718ee88d5e4b
-
Filesize
15KB
MD5885609eb90e74f10b240143f3ac24534
SHA190c44a3ebd3836f8ecdf70045220df8aaaef11ff
SHA256fb67818cde23e8c8607680b59f8c6fe706cfd7ec2a89fa437167eb07b39e4d17
SHA512d73d1296545aa75e7311464dec5422caa303d33715e7605532c9756695bd112a3c1263355c82fdd756b20893b1ac6ce4ab97460e98baa16b24f57dbc95d33f29
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_8.0.2_(x64)_20250217151042_000_dotnet_runtime_8.0.2_win_x64.msi.log
Filesize469KB
MD5d6b5ddb25d4d6f7ea037cb8d43ca52df
SHA1a589e1a6fc27347a99b15199b4aa1e6ec1f9011c
SHA256be5517754ebded77bdf445d50c63778796711a190c3535ab8ea4e9742a9e50dd
SHA5129ef65d9b54740bffa509a17bb24a0afa74ad9addae01f2c0d6a3b1253917aba3b8a1bdcbe12226ce36b74ad76a265945ecdb18b091d3bb929dc8e36a6818cb88
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_8.0.2_(x64)_20250217151042_001_dotnet_hostfxr_8.0.2_win_x64.msi.log
Filesize95KB
MD50b2af2bfad9b5d951647369e21114d06
SHA11a147f8c1e1dea2620dd12c779a848713d026b78
SHA256fba6c7e4550af7f121f47d83458f8265a98c58fdc4e52646314de6ae232ffb98
SHA512b861c9078406446c3f365b0d12646f93244d75288c4372442258aeaf5dc6610f32f3db9eb1aabe5c4edabbc61d7f7acfe9b0e9eff8f5dec589cd0a6928d69648
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_8.0.2_(x64)_20250217151042_002_dotnet_host_8.0.2_win_x64.msi.log
Filesize109KB
MD5fd414ce54e7ec1103b73dbcbdebca7ee
SHA17ff26b063eff9ddf9ea61a1e19f37b236cb99f4d
SHA25646508e4c159887e9a41d675b786c270d4c39b3396628dcdda9eab2448c2ccb86
SHA512052f516c36f0bb15570b9386482de8f03799b90559981b62a718eef686d9b95c0bcf2383b0e6d3c9dfacfe4426d1b617e6678c9b07325bd3c51b128ca6371114
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_8.0.2_(x64)_20250217151042_003_windowsdesktop_runtime_8.0.2_win_x64.msi.log
Filesize846KB
MD56ab649e9da59ed6d181ab5bc00746394
SHA17f040e9bff38f8045d9e328c97c4ba2dcc1c4f53
SHA256d1203d096e376ffbc017c68518e3201f80fde379295041de06b4e237252aaa39
SHA51269a2450433dda3b2e370f656e43b8a750a08daecbbbbed11272edf3c38db0909636e38f23fdf28fa7ebef42c9599ea68912e6d63523686c6341271ab70a8faa6
-
Filesize
55KB
MD551c433e11d46a59557393a6489590f28
SHA173be3f6cce33783f6bfb0729ffa0710f27c1f00e
SHA256b1a99c70bea2654ba260254b78b4d28deef7a63355ede0b9b7e80cc9da799429
SHA512314043677dc909094ce46eefb801d0bee3e394dc1ca721fb18c9d2b1cffed2e3731f38466ae54ab1209e3843c9fef1ef2add27c43de78b6658e7c3865cdc6c3c
-
Filesize
178KB
MD5de699a74574d839d35d419c6b37d4fc6
SHA1835df5fa1482ad64a4e4b95df90f3e87c832d664
SHA2569fd46fcb615fbff477e131faf77422ee9f7060c240416a8cd3a5480e3eb2d13e
SHA512028509a59813e41d004092fef5b1ac24d18c403a5cdde47370dfe461a097aa6611682cd580fc1b923274426226b3ab5f50685e573a756815e0691e2b02dfb8c2
-
Filesize
6KB
MD540c2ccebaa577b78ec38669a5daa62f0
SHA1e890d1d9ee04f99cd1e24281256ccf9e42f7fedf
SHA2563dd95d44e1b9f3e9588efa042a222c47ef1505af70c9681caa2e93b24e915307
SHA5123d697df6e4e317e79c1c802693ec4aebc91b60ac624eba931bf47685bf73d9c64331c595fbc0bdb54d277e9569700c10a9fb23dbcd0cb21738442f3f4d0d8cb1
-
Filesize
1KB
MD5433a4a3f298731e113a3dc810e72f91a
SHA1789215c497abdab2742be62b15988fd0d68b4494
SHA2563b64ed5e6ab88d92e504ae8177c203bf185f55b93d295b51071d2dddd21ebdef
SHA512b1b85712808dc65726b9615230a7939c172eef2a07b00968fc744cf5dbf081643cfe10add8214347b464bbfe5e4a4c4b4b0db559182cf64881718a898c0c062b
-
Filesize
425KB
MD59bf47e2a21e66ed2fadc541779865530
SHA16a6917027a0b903504a0f3426a2cfa3b2d008882
SHA2566f2d980ae17de27e0db6b59b107626456eae0a1b41c1bb2ba3aab5000ef9aad6
SHA5120658da7c6a4de53cec0bc77644b670e39fe76b9e6786ecc890bf9dfe3838b6d06308156df9b9b76f3993aeaffadfe9564067098b30560712e4809c90ae7074e9
-
Filesize
414KB
MD52888ec95048636e3fde0677d39443988
SHA10534503daf4222368f43514b4c25c827a1722e22
SHA2561eea905491a3730b51c6241d07fc6d4b533a2f2bc4bf56f12e5f2cdbad6b211d
SHA5126727a002a94c11daa42ff59440af19453806a2148451748244bdb45128a20edb040b8e394da1569897e9a988008a29bffa79a02b2728555a597c5305e1fee5d0
-
Filesize
11KB
MD55be849bfc44ec940948de52283a1fe15
SHA1c146df6035df0f3f24eee47d7dc5df74aadf6de2
SHA256848e8ef4e55de3ad9a8552e099791ce48d4bf517b071a8e82ca8345508bcc805
SHA51216fe5a8d2f7e3807f30b640e30a64b17ecb86a3301b4fe59500c6f7909e1240ab6c00b3c355354e31e49e8eeaa3d8355c44264eca4fcc92048491055a6cd3b28
-
Filesize
11KB
MD5b8febfc76daf641f5b8bb6629d58ef97
SHA1f45e04ebcf7fc65cb8db610a0bf4b8a8866ce543
SHA25635e7b1aa0010ee1a70c34833924cd92b08fd3da7abbf16c16528024435529df3
SHA5121e9ef3a3df6ea967763a6671999ac5dec23f3f35aa7532d4cdc16f8be34604aa001326e0303c8aa9e8eb9194b860a12073b22eae02100dffaacf5dcb779d62e7
-
Filesize
13B
MD5b2a4bc176e9f29b0c439ef9a53a62a1a
SHA11ae520cbbf7e14af867232784194366b3d1c3f34
SHA2567b4f72a40bd21934680f085afe8a30bf85acff1a8365af43102025c4ccf52b73
SHA512e04b85d8d45d43479abbbe34f57265b64d1d325753ec3d2ecadb5f83fa5822b1d999b39571801ca39fa32e4a0a7caab073ccd003007e5b86dac7b1c892a5de3f
-
Filesize
163KB
MD587a906fe710b10790c7cbafc8268624e
SHA164dd4e2758a503279fc7201d4a267084c061c7e2
SHA256d6f0c5c559f8bb9a20a059229964a2556b73e7b01d7440dd0a2c9f95b1fdf536
SHA512f9f02cce37a653f2cb4fc379c365f9205914c688eea29810b1513d30d380d6b37caeeb3d85671a9fa7ec64a94b130d986eb62d5904093558ce2106ec52d00896
-
Filesize
5.4MB
MD5e339e11223bb5e4ed51e7112dfa617da
SHA1510687d976c6253cb8b3569d71aaf85a2c69ee70
SHA256eeb4c6dd889c40d8b95ee00f2eff67a5d3e0d4a15034ab97a36662599b2e4f3e
SHA512aad3586e35bda596ccfad245856f5a59467b0a3ecc14ef39bc2dbda4e830038eaf80cacb62cdcf7dccdbc1982f72974ef21553a56f35a940657197655a7c34f2
-
Filesize
2.7MB
MD5c62c3ef5753af6e0980f38eebc196b1c
SHA1fd1d62feaaacb7cad5f952b61a6f7bd60d6dc4e1
SHA2562ddb85b36650f85b5a09724c5b17428b1b1b76bd3e3dd85b643933659d5e333d
SHA512f2338d26b073d8a796a7a19ee290b87b63f30f6cfa62e74d147756d2362898a167784c860d9bc098b1ec1a080aaa0fad25ca8c611b7e8f42ea8195c2b14abdfc
-
Filesize
120KB
MD5d3186aada63877a1fe1c2ed4b2e2b77d
SHA1f66d9307be6cbbb22941c724d2cf6954b41d7bb0
SHA2562684d360ec473113d922a2738c5c6f6702975e6ac7ee4023258a12ed26c9fefe
SHA512c94e8aa368a44f1df9f0318ca266f5a6a9140945d55a579dee2fd10aff3d4704a72a216718b35e44429012d68c2bb30a92d5179fbc9fb4b222456a017d8981c0
-
Filesize
3KB
MD57fe2ce481aa6db1c3f0ef5f48c53fd67
SHA1c17e0d34d7fcb665d1c5583feed7e190d2bed568
SHA2565b5f014403c98798c68df6935d5963983742812b2244cc6d888d76011bfb13aa
SHA5122cd8fda78531d031c649819d08f901731bbeb6a3fb5b8186d0ebf1fb6ea21279c3e9249db3e72921655506d7a0b4884014831c5595562e698a0e9ad883378292
-
Filesize
18.6MB
MD581ab9c75ba4a3d7f4265d0885e5104e9
SHA15ab39b066249b034b68fa0b9185d68e8a2238428
SHA25626520b4c791df73ca0271563f8c44e7bad77101d43eff99e321021d5b0ac2df7
SHA512f7e43de4226e69b97d859c35dd539a1c5aa15937deb7641556d600e9cbd3ae4aeb07072781a00234339210e14cb8b4bf546c7a664f2a82dc6c8b06fae4cbd20b
-
Filesize
1.8MB
MD5a8ffba97cd8fc1081d760f99729baa16
SHA1839032419030cc0c40c8c8d22fc7496f31ba739d
SHA25664efaab9a2f1453e0b0c7189363bfc9507b00ed1530fd5fa8dd461be057c70df
SHA5124fb6c68a5a71ad8953121fb2ac1b05e44af21df6852ed5d75f89e979f2d1a69cde1840f0891567ce0afdb3a2a2deb713dd8605bf1c8b97b13d49374c8821a650
-
Filesize
63KB
MD5e516a60bc980095e8d156b1a99ab5eee
SHA1238e243ffc12d4e012fd020c9822703109b987f6
SHA256543796a1b343b4ebc0285d89cb8eb70667ac7b513da37495e38003704e9d88d7
SHA5129b51e99ba20e9da56d1acc24a1cf9f9c9dbdeb742bec034e0ff2bc179a60f4aff249f40344f9ddd43229dcdefa1041940f65afb336d46c175ffeff725c638d58
-
Filesize
697B
MD5be34dc0b475792dc826c48fa0c6b01b4
SHA1d8f7686c9d001313cd6e2b7d016764bd9b1e8071
SHA25633258661c3a678cd9a029e0f4d7dd3430381dfe34ab7c278d9cb2d6b67eb4ded
SHA5129934348659efd809fc686327b854d4030b9f1afcf2aea6a1e844990ba5ba27f9aa618aee6197756d146c176f746ddec193ee42e1f47c550e6062de14cdc68f6b