Resubmissions
24/02/2025, 12:08
250224-pa55aa1pw5 1024/02/2025, 09:40
250224-lnmnbavpt3 1020/02/2025, 03:42
250220-d9d93awkdk 10Analysis
-
max time kernel
106s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2025, 12:08
Static task
static1
Behavioral task
behavioral1
Sample
01NEW_PURCHASE_ORDER_654576554.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
01NEW_PURCHASE_ORDER_654576554.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
libvlc.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
libvlc.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
libvlccore.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
libvlccore.dll
Resource
win10v2004-20250217-en
General
-
Target
01NEW_PURCHASE_ORDER_654576554.exe
-
Size
969KB
-
MD5
f9538485432d3ec640f89096ba2d4d00
-
SHA1
b050b847b1fe8be78d56b29bd23c25e05c227a92
-
SHA256
5d695d8a0bb1d919cc77a2aa2488a61797bfa065238160278ee458120630aaf9
-
SHA512
ea7aeedd15f4d6a6005f8cfb7d404dfb0c302c837e48de7e3ff44d7d5908f8de6c0a81f736d874a491eddc89fdf753976be6f635e7e8512f5abb7f32caa8cfc5
-
SSDEEP
24576:oFZAiQHDhht8m7FpUi1L1OXJz5zzz3zzzozzz3zzzNz:CZAiQHlhtz7FpWdwz
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7518188422:AAHmsiSJGbuq2bkotqlSAYxEVWayoAQB6Rw/sendMessage?chat_id=5210110905
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Accesses Microsoft Outlook profiles 1 TTPs 27 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 regsvcs.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 regsvcs.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 regsvcs.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 installutil.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\01NEW_PURCHASE_ORDER_654576554 = "cmd.exe /C start \"\" /D \"C:\\Users\\Admin\\SystemRootDoc\" \"C:\\Users\\Admin\\SystemRootDoc\\01NEW_PURCHASE_ORDER_654576554.exe\"" 01NEW_PURCHASE_ORDER_654576554.exe -
Looks up external IP address via web service 11 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 checkip.dyndns.org 24 reallyfreegeoip.org 25 reallyfreegeoip.org 30 reallyfreegeoip.org 44 reallyfreegeoip.org 45 reallyfreegeoip.org 23 reallyfreegeoip.org 36 reallyfreegeoip.org 37 reallyfreegeoip.org 38 reallyfreegeoip.org 43 reallyfreegeoip.org -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 4756 set thread context of 2408 4756 01NEW_PURCHASE_ORDER_654576554.exe 87 PID 4756 set thread context of 3272 4756 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 4756 set thread context of 4628 4756 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 4756 set thread context of 3352 4756 01NEW_PURCHASE_ORDER_654576554.exe 91 PID 4756 set thread context of 5016 4756 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 4756 set thread context of 2072 4756 01NEW_PURCHASE_ORDER_654576554.exe 93 PID 4756 set thread context of 3332 4756 01NEW_PURCHASE_ORDER_654576554.exe 98 PID 4756 set thread context of 4600 4756 01NEW_PURCHASE_ORDER_654576554.exe 100 PID 4756 set thread context of 1796 4756 01NEW_PURCHASE_ORDER_654576554.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installutil.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2408 AddInProcess32.exe 3272 AddInProcess32.exe 4628 AddInProcess32.exe 3352 installutil.exe 5016 AddInProcess32.exe 2072 AddInProcess32.exe 3332 regsvcs.exe 4600 installutil.exe 4600 installutil.exe 1796 AddInProcess32.exe 1796 AddInProcess32.exe 4628 AddInProcess32.exe 4628 AddInProcess32.exe 3272 AddInProcess32.exe 3272 AddInProcess32.exe 2408 AddInProcess32.exe 3352 installutil.exe 4600 installutil.exe 5016 AddInProcess32.exe 1796 AddInProcess32.exe 2072 AddInProcess32.exe 3332 regsvcs.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 3272 AddInProcess32.exe Token: SeDebugPrivilege 2408 AddInProcess32.exe Token: SeDebugPrivilege 4628 AddInProcess32.exe Token: SeDebugPrivilege 3352 installutil.exe Token: SeDebugPrivilege 5016 AddInProcess32.exe Token: SeDebugPrivilege 2072 AddInProcess32.exe Token: SeDebugPrivilege 3332 regsvcs.exe Token: SeDebugPrivilege 4600 installutil.exe Token: SeDebugPrivilege 1796 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4756 wrote to memory of 2408 4756 01NEW_PURCHASE_ORDER_654576554.exe 87 PID 4756 wrote to memory of 2408 4756 01NEW_PURCHASE_ORDER_654576554.exe 87 PID 4756 wrote to memory of 2408 4756 01NEW_PURCHASE_ORDER_654576554.exe 87 PID 4756 wrote to memory of 2408 4756 01NEW_PURCHASE_ORDER_654576554.exe 87 PID 4756 wrote to memory of 2408 4756 01NEW_PURCHASE_ORDER_654576554.exe 87 PID 4756 wrote to memory of 2408 4756 01NEW_PURCHASE_ORDER_654576554.exe 87 PID 4756 wrote to memory of 2408 4756 01NEW_PURCHASE_ORDER_654576554.exe 87 PID 4756 wrote to memory of 2408 4756 01NEW_PURCHASE_ORDER_654576554.exe 87 PID 4756 wrote to memory of 3272 4756 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 4756 wrote to memory of 3272 4756 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 4756 wrote to memory of 3272 4756 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 4756 wrote to memory of 3272 4756 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 4756 wrote to memory of 3272 4756 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 4756 wrote to memory of 3272 4756 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 4756 wrote to memory of 3272 4756 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 4756 wrote to memory of 3272 4756 01NEW_PURCHASE_ORDER_654576554.exe 88 PID 4756 wrote to memory of 4628 4756 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 4756 wrote to memory of 4628 4756 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 4756 wrote to memory of 4628 4756 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 4756 wrote to memory of 4628 4756 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 4756 wrote to memory of 4628 4756 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 4756 wrote to memory of 4628 4756 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 4756 wrote to memory of 4628 4756 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 4756 wrote to memory of 4628 4756 01NEW_PURCHASE_ORDER_654576554.exe 89 PID 4756 wrote to memory of 2424 4756 01NEW_PURCHASE_ORDER_654576554.exe 90 PID 4756 wrote to memory of 2424 4756 01NEW_PURCHASE_ORDER_654576554.exe 90 PID 4756 wrote to memory of 2424 4756 01NEW_PURCHASE_ORDER_654576554.exe 90 PID 4756 wrote to memory of 3352 4756 01NEW_PURCHASE_ORDER_654576554.exe 91 PID 4756 wrote to memory of 3352 4756 01NEW_PURCHASE_ORDER_654576554.exe 91 PID 4756 wrote to memory of 3352 4756 01NEW_PURCHASE_ORDER_654576554.exe 91 PID 4756 wrote to memory of 3352 4756 01NEW_PURCHASE_ORDER_654576554.exe 91 PID 4756 wrote to memory of 3352 4756 01NEW_PURCHASE_ORDER_654576554.exe 91 PID 4756 wrote to memory of 3352 4756 01NEW_PURCHASE_ORDER_654576554.exe 91 PID 4756 wrote to memory of 3352 4756 01NEW_PURCHASE_ORDER_654576554.exe 91 PID 4756 wrote to memory of 3352 4756 01NEW_PURCHASE_ORDER_654576554.exe 91 PID 4756 wrote to memory of 5016 4756 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 4756 wrote to memory of 5016 4756 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 4756 wrote to memory of 5016 4756 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 4756 wrote to memory of 5016 4756 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 4756 wrote to memory of 5016 4756 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 4756 wrote to memory of 5016 4756 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 4756 wrote to memory of 5016 4756 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 4756 wrote to memory of 5016 4756 01NEW_PURCHASE_ORDER_654576554.exe 92 PID 4756 wrote to memory of 2072 4756 01NEW_PURCHASE_ORDER_654576554.exe 93 PID 4756 wrote to memory of 2072 4756 01NEW_PURCHASE_ORDER_654576554.exe 93 PID 4756 wrote to memory of 2072 4756 01NEW_PURCHASE_ORDER_654576554.exe 93 PID 4756 wrote to memory of 2072 4756 01NEW_PURCHASE_ORDER_654576554.exe 93 PID 4756 wrote to memory of 2072 4756 01NEW_PURCHASE_ORDER_654576554.exe 93 PID 4756 wrote to memory of 2072 4756 01NEW_PURCHASE_ORDER_654576554.exe 93 PID 4756 wrote to memory of 2072 4756 01NEW_PURCHASE_ORDER_654576554.exe 93 PID 4756 wrote to memory of 2072 4756 01NEW_PURCHASE_ORDER_654576554.exe 93 PID 4756 wrote to memory of 4324 4756 01NEW_PURCHASE_ORDER_654576554.exe 94 PID 4756 wrote to memory of 4324 4756 01NEW_PURCHASE_ORDER_654576554.exe 94 PID 4756 wrote to memory of 4324 4756 01NEW_PURCHASE_ORDER_654576554.exe 94 PID 4756 wrote to memory of 4364 4756 01NEW_PURCHASE_ORDER_654576554.exe 95 PID 4756 wrote to memory of 4364 4756 01NEW_PURCHASE_ORDER_654576554.exe 95 PID 4756 wrote to memory of 4364 4756 01NEW_PURCHASE_ORDER_654576554.exe 95 PID 4756 wrote to memory of 4356 4756 01NEW_PURCHASE_ORDER_654576554.exe 96 PID 4756 wrote to memory of 4356 4756 01NEW_PURCHASE_ORDER_654576554.exe 96 PID 4756 wrote to memory of 4356 4756 01NEW_PURCHASE_ORDER_654576554.exe 96 PID 4756 wrote to memory of 3396 4756 01NEW_PURCHASE_ORDER_654576554.exe 97 PID 4756 wrote to memory of 3396 4756 01NEW_PURCHASE_ORDER_654576554.exe 97 PID 4756 wrote to memory of 3396 4756 01NEW_PURCHASE_ORDER_654576554.exe 97 PID 4756 wrote to memory of 3332 4756 01NEW_PURCHASE_ORDER_654576554.exe 98 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 regsvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 regsvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01NEW_PURCHASE_ORDER_654576554.exe"C:\Users\Admin\AppData\Local\Temp\01NEW_PURCHASE_ORDER_654576554.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3272
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4628
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:2424
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3352
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:4324
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"2⤵PID:4364
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"2⤵PID:4356
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵PID:3396
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3332
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵PID:2388
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
969KB
MD5f9538485432d3ec640f89096ba2d4d00
SHA1b050b847b1fe8be78d56b29bd23c25e05c227a92
SHA2565d695d8a0bb1d919cc77a2aa2488a61797bfa065238160278ee458120630aaf9
SHA512ea7aeedd15f4d6a6005f8cfb7d404dfb0c302c837e48de7e3ff44d7d5908f8de6c0a81f736d874a491eddc89fdf753976be6f635e7e8512f5abb7f32caa8cfc5
-
Filesize
1KB
MD50b6af20e68d9aa7a878af6c47144133a
SHA11e2f7c1acf45a9655ceb5f6c8ae89f02646796e8
SHA256819496e963edd5549c34666912e6e0d088744b4e495b3d8d6cbf330689c7fac4
SHA51290f975678f4f4030291af6ebf7a601b764a87604a3c0e253124816085fcc2c7734852597388692420f0de52b88eb5434826987c9faf423633b6f6dbf82a595c8
-
Filesize
13KB
MD51036647cd7cbea629ab07756e8e6e82e
SHA1f70ac3bcf18a78517b64a9dda17cd42869f6d3e0
SHA256ceaa604e41730196eaa991744d26774db5761ca0b13036a78dcd1766352b5d64
SHA512b5a20db94c3375121183257c094de553378079462a91cd803a1bc8319897f4c9b21363a52dda12a81ae4a122ec4b782a3908ddb25e0c76c8012a5c40bf6b2322
-
Filesize
94KB
MD5458639b8b5dd7b1d1d534ac6d0ffeea5
SHA1a4dd3245726b680638924a3e0c65996f4e0c46f4
SHA2563e2b12a4a528d5ac76e21549037be1b4ba95ccbbec39f3cb77ab21f5062c9eb9
SHA512abb7d3841a28be8c9e7d11893c48af85add071fc7ee02f7e84e978311020abfbf80a2df5fbd8f50d59c94a015864a2fa9a7777305601f48ebf25b9318fd4df99
-
Filesize
15KB
MD5224870641c794acc8b5fa6e6cad2eb32
SHA1bd10888fe60af05bf124b3c27c929478c356a68d
SHA25669d6d04b6d097ea3bc6503e7c826fcb967b76ae07222939e6442e1c19b31cecf
SHA5127d43f331f607cdd4e5d4fab38106e6f8b9e37eb88eb30af500d378ca738bf400301a8be0846a5650bad0c833d53824870ff2bcbb36e0ff8cec07e8f2fd6680ea
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_6.0.27_(x64)_20250217151155_000_dotnet_runtime_6.0.27_win_x64.msi.log
Filesize551KB
MD5145645e6e8a583a9168a81ce44fdb709
SHA1c22dffeba5e5d1a55323ac3d065502179ac56467
SHA2560c3c395020c0db71ff0de416400973017d3adab7e54f2c3faf0ea097aa843730
SHA512528cedb6ae7fffbf4a476f15d282a80ce5fcacc854caf56f272ac961548fcf713d53ae8d328314946945fe612e1b3256b71b34596f59aac20409b4794fadc4f5
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_6.0.27_(x64)_20250217151155_001_dotnet_hostfxr_6.0.27_win_x64.msi.log
Filesize95KB
MD5f92f9ceecd5091b45c54e0b57a0e7d48
SHA1f1ad539d985aafb489ac48aa60f3df0935d482ac
SHA25690b3dc8658075ce36a7293d0ab4d3b5563863b1f81dcff9f3743072f8bfc08ea
SHA5122ce68ebe73ca2d774dba17463cc5b4c736ec0b864e8baf21a689ec1df7ac20ec9cce8548ba5f43f03d1a9c571421d8f30569e9244f49d53fdfe9c78094e6c65a
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_6.0.27_(x64)_20250217151155_002_dotnet_host_6.0.27_win_x64.msi.log
Filesize105KB
MD59743b2cafd109548f56dbff85b0568bf
SHA12a0ee8d416d2ef1a17241d45acb46495fe6d09f4
SHA256306cfa3abadfe5d0dda74224ec24f84074ee8fb01357e6bb8d62f59ba9358a5f
SHA5128665e67ea9c5e93ca26638b09473f5e6722be77e2b244b27ebe1df461fdef06e999dd8e1b7386e134a6bd256d7f50590843752419da23b7e181e5f9f50e31e55
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_6.0.27_(x64)_20250217151155_003_windowsdesktop_runtime_6.0.27_win_x64.msi.log
Filesize847KB
MD55bc50fd4be7e75a967439169653ddda9
SHA1bf17a2c6e81bf9c7eca9e5cc9cda7d8ad44bf8bc
SHA2562a1f4131993457e914062d074de683a6e7bac72db6f2390de8e73604256c31c1
SHA5129c07d9055e196e637064afdf9bd9efd5b175ba8f039b7b0edc4061c0baf48b8ef61207fdc1dd7d1502b8b990b3d70f8f01e0b242d92b458e9891e87bd796b9e6
-
Filesize
15KB
MD5c1d83c451b346cef3ba481a3db2c3c7c
SHA1eec8a08d53a8bee3e4989fd530a8e1d6668760d9
SHA256f6e311e79473fa2340712ffe001a25fd38cf57e4f429efcc38b6b92bf78ef535
SHA512cd06d43978a79749623f353aba1c089cb96df0e0761d7bc360dbc0258e59f3b0f1e3d5be8c8bd9bcc9cbb4711f61732ed966fd96d4677b0a4b87ce56998191eb
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_7.0.16_(x64)_20250217151222_000_dotnet_runtime_7.0.16_win_x64.msi.log
Filesize470KB
MD585d66d8df0eaee369f109fd115faae60
SHA18229ad3234e5b375dff0ac3691e2e87592847f9b
SHA25660018f1043a0a6e777f81f11aeb34c3149358a85296798daf0bdc35d48effb87
SHA512db4b7dd934336351c0e273eb5b105716b3accce21436991676c8429dd03b2d9a08ddd7fdcff0b238e64bd4afb3e5c7fac1d10880091b539a6191956942042499
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_7.0.16_(x64)_20250217151222_001_dotnet_hostfxr_7.0.16_win_x64.msi.log
Filesize95KB
MD5c7434d0c3d9c7f5c33754f0b4df80511
SHA146e96a1b69cde04e3f66e87747a618322811fa55
SHA256f625158113447148a9f9c2122fc534172bab766daf48d9b5452aa3adfe3f6c34
SHA512ca194276241ccc476ab44ff7a1ce2012cde4e12a34192e9c50bc6cbe3ccddc7b1611ae120f2c91a929203b3439662af676a81a608db16aa52b0eadcd9bc9dc2c
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_7.0.16_(x64)_20250217151222_002_dotnet_host_7.0.16_win_x64.msi.log
Filesize109KB
MD59cd9918ea4d56c29ff8baa4660a2480b
SHA19615fca47469180ac5f2d174bd13b5817bd21bbe
SHA256bc49ded346b6668a76774c71c4654a732ff2f90e0370579ce14896a708450482
SHA5127602f948d5d0b7102c3c675b64a51b9ff20b60dca0ea3094cb2fe546778d09cfe92396bcd642d837c2f77eabdf4c76685ca9338c2f4cd598bfd5b9b2695fc7a8
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_7.0.16_(x64)_20250217151222_003_windowsdesktop_runtime_7.0.16_win_x64.msi.log
Filesize852KB
MD5ab740562416308e57d089e1f9f414a5c
SHA1f4187c1c1b0cdb03827028f553dbf802cf691b72
SHA256bcd8ce542b78f12fec8afd69faa76eb69c9755333a4744fd4ffcd685dbd77e2e
SHA5121f025dd5b8ff6738faf3019026ba75e76d9e335798069a65de4b212707af89aeedecdddff5048306bd94cdd65392ba008474a6dd72d096f43f35fd0a19cf243c
-
Filesize
15KB
MD5ba2da97afba64249a536eb6d0d8a33a1
SHA13eac80d7ad60503df66be933b72166be0ac2dc9b
SHA256d27edcfc13c9d4c86613997c88350513eef09338b049b6de0aa9b54991df1f37
SHA51243803b4a7adf5a2f1bd1ac63299bdc54b947aeb4fdaf041412f0f528eb39e2140c43d1dc79ad6cbfc43227721aa39b0732fe506762a5d8e1610e7fb4f2eddfce
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_8.0.2_(x64)_20250217151244_000_dotnet_runtime_8.0.2_win_x64.msi.log
Filesize469KB
MD5c37c05c985f34c0514dbee186b988ac1
SHA16842824d724c99cc2d62826a36d6d630646de96a
SHA256b551129b43b3f5cdda96e83206f6ef5ff5c8e9fe14c4ba1ff8c4b87991472d17
SHA5127d3bd444f6cd335972a10c3e02065617dbfb27ff88a2a3238647f23693620cc3a46ea09ed07efd572427011eb8edf511c5439a8f0772612acb4f44344c633965
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_8.0.2_(x64)_20250217151244_001_dotnet_hostfxr_8.0.2_win_x64.msi.log
Filesize95KB
MD58d3274b618bb5197f3df0f843b4a940a
SHA19cac7eb4b00d2e1a1fa60f917842c17dc89a3159
SHA256ac2e0ef526da9f947af439bf4d0b816b2fee6d86dabc7213398ff395003ebdb3
SHA51283307f09f1af1c301483a5b3d9c722d1778543a2e4dd7edfa05e33486e1f1a7f15870abcd697c3a40e982a3315f1dc37be072928c1ed56e8847b059cf7d386ed
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_8.0.2_(x64)_20250217151244_002_dotnet_host_8.0.2_win_x64.msi.log
Filesize109KB
MD500323eea33f3318d5b7537f23a0cca99
SHA17c1148c6df432020d1d444d1c87d4cc006a62842
SHA2563891c37eba8c65050cdad15b33a9b8b79843465c16be80332472f94fc65261b5
SHA512d612e00389fbba7443e8da77229e7311ea192d4c2c581275b3191d97f8c22671b25087a87ebb5db4b1fae3745422c01495b2fff06ff90e20181ed8a5c5f8f717
-
C:\Users\Admin\SystemRootDoc\Microsoft_Windows_Desktop_Runtime_-_8.0.2_(x64)_20250217151244_003_windowsdesktop_runtime_8.0.2_win_x64.msi.log
Filesize846KB
MD5bc097b46a5406956643c692973806026
SHA142b7b112aeadc226f37e1ca1bf4386a633c8ed28
SHA256a5fc91c544b46406d87903b3b53a09f5040ac42abf7d6b151ceb17d27a908bd7
SHA5127e701c08f526a996b0a05f21f0cf4bdc7ca98f11f0acdbe36fe18dd32943bb75363b759ab7b10ecbeefa420d42e6cd41a1e84aba30b8df3a079a29f2c056eb2a
-
Filesize
4KB
MD567d905b5864dae086856ec1d38de5ae2
SHA175f9c5513a59555d0cf06789ba833ca4e51ea452
SHA25646c17e4d02182f763486b3bddb676c58fd3f2799b7e8f9739d0b16304e737a46
SHA512661a8d4a7ddd40bde3b2895d92e2c699e406d43d09bc8597d422625f267d30a3bc293cc472e9911377e0962612a366af614b6d91f699b4894ee328b91062c8a4
-
Filesize
53KB
MD5c55b9a3b4b75871e1b6d53b7aaf44a64
SHA12cc12e20b24b6ac3bd1b8f0a358474e312c9e6a1
SHA256984f01b19b17bf04589721c7856a9d298acb3dbe299b2d2fb1178c704001b8a6
SHA512b5872eba75f6c29c8476eee0087854594c2ddb83a2ba9d62331facfd5ec1b50f3e7527ac1f6167d84e4093207968858b3b37b78ab9ba6cf8b8265cb3abc9a9f8
-
Filesize
179KB
MD532664a43082149ea23810f49abb67a3d
SHA1ec30f73bac4603dd031682a353425b2a54562799
SHA2564cd393a0c01a3d44a3789e90da53bd9798dfd8f409c54ab2760b0a5d89e2c95f
SHA5123eb08b565c68afdae5b09fa0dc2a4f7bf2606436dd86d04af71afd2612cc9e4ad5a5355d79709019b7f40af36c31b7a134ae3b5d0dc41f5692a72a0fff117354
-
Filesize
470B
MD51648c9e082e84f4c74b910b4d9db2982
SHA13c9b5c53be413079fd5968d08c742b0a1ebdd4c1
SHA2564567adfb314e38846d1e579d24811e60916a044d28eccf177573576437256572
SHA5129a525e89790256b66a8cb8000a2c04c18eaeabbcaa4bf77ddab238fb896fd241a69e0e8dd32513e0d5ce92e59df5d17083307a17230040af3adcaec20bc25c18
-
Filesize
6KB
MD5c445b6ff44de44a56cebb0f0aede8120
SHA15985fc452f3638a0ed9c2657a8c4fbd5179859ac
SHA2563652f57afcbf8818b7961614d30b13f34504680109af7d68dbd78af3baab7501
SHA512c3c0832dc884e8f4cb99593d37a9377861b14e7cf518991bb4d091f7a6748d3be0abf1a4cd9c3105047f43293d7ed8844b46fbc843a826fce0bdb83bb4b73a13
-
Filesize
1KB
MD5d1ccdf5e1818fd58b46562252cff687c
SHA139c8985a3bbc6070747d7f92c80d1b58f210018d
SHA25644da99fbd745457bfc744cd3d44292e34a8a62ffdb7fbe82a5ddf134ba92b3f7
SHA512b03131536f2f1d989c7b041cecb65810c709c206ce4009cf26965bb16ab69ef4bd15daa2bab42f71e8860a4899282dc83073ed65d0864953082d4ac0bcc1e73c
-
Filesize
426KB
MD552542375b8116af54eb5825d48b0bd64
SHA1b1e3f117ce470d91a8e77f6086acb2e63f9171b3
SHA25657dbfe11bd19d49dd0075b93fae242b02d73315fdcfa6919958fb4ad477abadd
SHA5127934997b352ac3dae2c996ef2d3a106ba314b8384eddaf8416459904566d745092dc3cb39083293e7c7a73a5bbcdc173393c67778a6fa5987d4485d9786ef49c
-
Filesize
413KB
MD524860c0c4349c2d42f5a4b6bcbe18135
SHA136b44ac5261d8b63d0bfb1b4f2c236ee4fa82bd9
SHA25608ab00950ba103198c63a1c47b732a7ce95f606c2f556655bc3037af00255e25
SHA512febe21042dea9efa0297c8a4a7dbd4d2a3a37ce85991e51a17b98a861ed9d7b76a351a1ca0065bfb85ebf4af385fa98e57d17e89fa08fe6d406b21e392ce90c3
-
Filesize
11KB
MD55dd10500761af9f9b7b083f4a795de81
SHA1027868a3a3dda844e74b170f2b74cc22337e355d
SHA2569d4eecf127a5ee5e62bf64e774c2abcf5fef2d66c931cf1694da85c725a997f8
SHA512ad699f195b0eb769845f8ddb48aa5cf4d16162933fdf6cb55468d0227b4dcc0ba2334de86c265405392fb98d0152dae75711df7baed7d8badac45cac43bbb569
-
Filesize
11KB
MD50a459aec347b90dfb80e8d5d80f85f5c
SHA1439a74fab9d9c00bdf728a2d87bc0b58624314e2
SHA25631ee3287e16f653823b572d01a9d436447503ea310f75a850ab3f54b8ecaabaf
SHA5127b332b223f851392e99becb3ed2b3743a22e8eb5230a855ea593e4a78345e3880f344f591f0d590d426e7c7d0c2399335bdbc2521f14965069972a30504529ca
-
Filesize
13B
MD5b2a4bc176e9f29b0c439ef9a53a62a1a
SHA11ae520cbbf7e14af867232784194366b3d1c3f34
SHA2567b4f72a40bd21934680f085afe8a30bf85acff1a8365af43102025c4ccf52b73
SHA512e04b85d8d45d43479abbbe34f57265b64d1d325753ec3d2ecadb5f83fa5822b1d999b39571801ca39fa32e4a0a7caab073ccd003007e5b86dac7b1c892a5de3f
-
Filesize
163KB
MD5b5307b65b9733a3f7aa0e46b3c5d1fb0
SHA1ce5c8cc95da1f0a095779f44539b106d8bcd80b4
SHA256202eebafeeb8cc79836670b0907575fdbca7b08d3899278fb5c794ebca71e892
SHA5127c2f3b1551a70e5876a657d26363cb06d1e673e8fecbdde7c08ac8d7533a6d02bd4d359c90c6fd14067a2e5db7b1b1eace7541a5db07f52c7aafb476f9302ad2
-
Filesize
5.4MB
MD5e339e11223bb5e4ed51e7112dfa617da
SHA1510687d976c6253cb8b3569d71aaf85a2c69ee70
SHA256eeb4c6dd889c40d8b95ee00f2eff67a5d3e0d4a15034ab97a36662599b2e4f3e
SHA512aad3586e35bda596ccfad245856f5a59467b0a3ecc14ef39bc2dbda4e830038eaf80cacb62cdcf7dccdbc1982f72974ef21553a56f35a940657197655a7c34f2
-
Filesize
2.7MB
MD5c62c3ef5753af6e0980f38eebc196b1c
SHA1fd1d62feaaacb7cad5f952b61a6f7bd60d6dc4e1
SHA2562ddb85b36650f85b5a09724c5b17428b1b1b76bd3e3dd85b643933659d5e333d
SHA512f2338d26b073d8a796a7a19ee290b87b63f30f6cfa62e74d147756d2362898a167784c860d9bc098b1ec1a080aaa0fad25ca8c611b7e8f42ea8195c2b14abdfc
-
Filesize
120KB
MD503d157cecbe12b2c52d681fd6c82a470
SHA1f500d78682e107f12b8616aead55bd0b6a22af96
SHA256bd0f339edb631a3a1c8d490876c3eabd3839faeb303895875052936347310b0e
SHA51242cb632e8e169c4ba2316ee77b196f1940a4fe46a0242e060f7d2d41d513b7f6d1d3fd94bcfc1eb7d4d8a5cc57ab09e18dbffe7ec4362b478b22678f94ee7f4d
-
Filesize
3KB
MD5cc6b38f312f70bc508001698f5562990
SHA13205834813a8285d2ad8a9988d4abc7bf7c256a5
SHA2563e6a41b898dcda625785d5ecea5ee0779bc5ef7d0755b5acedf18e83b08cc499
SHA5126476c9009dd002336d59b46464afc4a87cd2dbecb3839503197c76f183e9c5158da80f929a5a5b16ba729a744a36e325a4473b301e4164069730876bdc301391
-
Filesize
63KB
MD5e516a60bc980095e8d156b1a99ab5eee
SHA1238e243ffc12d4e012fd020c9822703109b987f6
SHA256543796a1b343b4ebc0285d89cb8eb70667ac7b513da37495e38003704e9d88d7
SHA5129b51e99ba20e9da56d1acc24a1cf9f9c9dbdeb742bec034e0ff2bc179a60f4aff249f40344f9ddd43229dcdefa1041940f65afb336d46c175ffeff725c638d58
-
Filesize
697B
MD5bee3610b8061a03fcecbfa8f41c75e2a
SHA110c5634d2e7a5562deb18bcdad29978612ffa0c9
SHA25624f133874926cd8d34197934ee5fa97160f7def489e5ba8aa30338de279fe239
SHA51279153ebbb490e7049185cdadb18c6b9f98bc6a306da9fee1d9d7570edd3d8db6d0b17047cc52bd8ccf77a4746bf73da3f34f944fa015aecc1a38a32f02a08774