Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2025, 02:40
Static task
static1
Behavioral task
behavioral1
Sample
46a1eec81e8b0d889b6fde07a85405874d4b21da998b34e8b91fd852d1ddb458.dll
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
46a1eec81e8b0d889b6fde07a85405874d4b21da998b34e8b91fd852d1ddb458.dll
Resource
win10v2004-20250314-en
General
-
Target
46a1eec81e8b0d889b6fde07a85405874d4b21da998b34e8b91fd852d1ddb458.dll
-
Size
5.5MB
-
MD5
8d252f7a6ff4f929d86cf7feb95a5b08
-
SHA1
fa67e72ea1f9a6018407490359007022c784bdf8
-
SHA256
46a1eec81e8b0d889b6fde07a85405874d4b21da998b34e8b91fd852d1ddb458
-
SHA512
297ab8de6d887c1807bbbb49a04fe83c74874bf8647ab16e69f1680551c4dc50153affc92395c6c0705309df33a035c3368eba67d17220562f3c8c98a5c27f29
-
SSDEEP
98304:DW0704A7pKmwDNRdBYaAGmOGio38um37R6BJZO4A5cfebV/FkZQ:DW044gnwPnbAGmO83OR6BJZ9ATF
Malware Config
Extracted
danabot
-
type
loader
Signatures
-
Danabot family
-
Blocklisted process makes network request 36 IoCs
flow pid Process 1 6084 rundll32.exe 24 6084 rundll32.exe 25 6084 rundll32.exe 26 6084 rundll32.exe 27 6084 rundll32.exe 29 6084 rundll32.exe 31 6084 rundll32.exe 37 6084 rundll32.exe 39 6084 rundll32.exe 41 6084 rundll32.exe 42 6084 rundll32.exe 43 6084 rundll32.exe 44 6084 rundll32.exe 45 6084 rundll32.exe 46 6084 rundll32.exe 48 6084 rundll32.exe 49 6084 rundll32.exe 59 6084 rundll32.exe 60 6084 rundll32.exe 61 6084 rundll32.exe 62 6084 rundll32.exe 63 6084 rundll32.exe 68 6084 rundll32.exe 69 6084 rundll32.exe 72 6084 rundll32.exe 74 6084 rundll32.exe 80 6084 rundll32.exe 82 6084 rundll32.exe 86 6084 rundll32.exe 89 6084 rundll32.exe 129 6084 rundll32.exe 139 6084 rundll32.exe 148 6084 rundll32.exe 149 6084 rundll32.exe 152 6084 rundll32.exe 129 6084 rundll32.exe -
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3964 chrome.exe 5084 chrome.exe 4876 chrome.exe 4612 chrome.exe 1260 msedge.exe 3040 msedge.exe 1868 msedge.exe 5176 chrome.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts rundll32.exe -
Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\L: rundll32.exe -
Suspicious use of SetThreadContext 22 IoCs
description pid Process procid_target PID 6084 set thread context of 3896 6084 rundll32.exe 90 PID 6084 set thread context of 4188 6084 rundll32.exe 106 PID 6084 set thread context of 1580 6084 rundll32.exe 116 PID 6084 set thread context of 2420 6084 rundll32.exe 119 PID 6084 set thread context of 3916 6084 rundll32.exe 120 PID 6084 set thread context of 4888 6084 rundll32.exe 122 PID 6084 set thread context of 4644 6084 rundll32.exe 123 PID 6084 set thread context of 4392 6084 rundll32.exe 124 PID 6084 set thread context of 1236 6084 rundll32.exe 125 PID 6084 set thread context of 5128 6084 rundll32.exe 126 PID 6084 set thread context of 6104 6084 rundll32.exe 127 PID 6084 set thread context of 2504 6084 rundll32.exe 128 PID 6084 set thread context of 4396 6084 rundll32.exe 129 PID 6084 set thread context of 1224 6084 rundll32.exe 130 PID 6084 set thread context of 1928 6084 rundll32.exe 131 PID 6084 set thread context of 5708 6084 rundll32.exe 132 PID 6084 set thread context of 3624 6084 rundll32.exe 133 PID 6084 set thread context of 5680 6084 rundll32.exe 134 PID 6084 set thread context of 2540 6084 rundll32.exe 135 PID 6084 set thread context of 3996 6084 rundll32.exe 136 PID 6084 set thread context of 5276 6084 rundll32.exe 137 PID 6084 set thread context of 2848 6084 rundll32.exe 138 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks processor information in registry 2 TTPs 22 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies registry class 22 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000_Classes\Local Settings rundll32.exe -
Modifies system certificate store 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\4A96518D6679D0656C9A5D1FF5DA7D762B090B59 rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\4A96518D6679D0656C9A5D1FF5DA7D762B090B59\Blob = 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 rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 6084 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe 6084 rundll32.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1260 msedge.exe 1260 msedge.exe 5176 chrome.exe 5176 chrome.exe 5176 chrome.exe 5176 chrome.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 6084 rundll32.exe Token: SeDebugPrivilege 6084 rundll32.exe Token: SeDebugPrivilege 6084 rundll32.exe Token: SeDebugPrivilege 6084 rundll32.exe Token: SeDebugPrivilege 6084 rundll32.exe Token: SeDebugPrivilege 6084 rundll32.exe Token: SeDebugPrivilege 6084 rundll32.exe Token: SeDebugPrivilege 6084 rundll32.exe Token: SeDebugPrivilege 6084 rundll32.exe Token: SeDebugPrivilege 6084 rundll32.exe Token: SeDebugPrivilege 6084 rundll32.exe Token: SeDebugPrivilege 6084 rundll32.exe Token: SeDebugPrivilege 6084 rundll32.exe Token: SeDebugPrivilege 6084 rundll32.exe Token: SeDebugPrivilege 6084 rundll32.exe Token: SeDebugPrivilege 6084 rundll32.exe Token: SeDebugPrivilege 6084 rundll32.exe Token: SeDebugPrivilege 6084 rundll32.exe Token: SeDebugPrivilege 6084 rundll32.exe Token: SeDebugPrivilege 6084 rundll32.exe Token: SeDebugPrivilege 6084 rundll32.exe Token: SeDebugPrivilege 6084 rundll32.exe Token: SeShutdownPrivilege 5176 chrome.exe Token: SeCreatePagefilePrivilege 5176 chrome.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3896 rundll32.exe 6084 rundll32.exe 1260 msedge.exe 5176 chrome.exe 4188 rundll32.exe 1580 rundll32.exe 2420 rundll32.exe 3916 rundll32.exe 4888 rundll32.exe 4644 rundll32.exe 4392 rundll32.exe 1236 rundll32.exe 5128 rundll32.exe 6104 rundll32.exe 2504 rundll32.exe 4396 rundll32.exe 1224 rundll32.exe 1928 rundll32.exe 5708 rundll32.exe 3624 rundll32.exe 5680 rundll32.exe 2540 rundll32.exe 3996 rundll32.exe 5276 rundll32.exe 2848 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 6084 rundll32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5500 wrote to memory of 6084 5500 rundll32.exe 85 PID 5500 wrote to memory of 6084 5500 rundll32.exe 85 PID 5500 wrote to memory of 6084 5500 rundll32.exe 85 PID 6084 wrote to memory of 3896 6084 rundll32.exe 90 PID 6084 wrote to memory of 3896 6084 rundll32.exe 90 PID 6084 wrote to memory of 3896 6084 rundll32.exe 90 PID 6084 wrote to memory of 1260 6084 rundll32.exe 94 PID 6084 wrote to memory of 1260 6084 rundll32.exe 94 PID 1260 wrote to memory of 620 1260 msedge.exe 95 PID 1260 wrote to memory of 620 1260 msedge.exe 95 PID 1260 wrote to memory of 2608 1260 msedge.exe 96 PID 1260 wrote to memory of 2608 1260 msedge.exe 96 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2204 1260 msedge.exe 118 PID 1260 wrote to memory of 2220 1260 msedge.exe 98 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\46a1eec81e8b0d889b6fde07a85405874d4b21da998b34e8b91fd852d1ddb458.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5500 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\46a1eec81e8b0d889b6fde07a85405874d4b21da998b34e8b91fd852d1ddb458.dll,#12⤵
- Blocklisted process makes network request
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Enumerates connected drives
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:6084 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe--restore-last-session --remote-debugging-port=9225 --remote-allow-origins=* --headless "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory="Default"3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x2f0,0x7fff5615f208,0x7fff5615f214,0x7fff5615f2204⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2908,i,6003210583772483325,17596027891009489153,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2912 /prefetch:34⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2880,i,6003210583772483325,17596027891009489153,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2376 /prefetch:24⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2932,i,6003210583772483325,17596027891009489153,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2904 /prefetch:84⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3608,i,6003210583772483325,17596027891009489153,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3604 /prefetch:14⤵
- Uses browser remote debugging
PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3628,i,6003210583772483325,17596027891009489153,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3612 /prefetch:14⤵
- Uses browser remote debugging
PID:3040
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe--restore-last-session --remote-debugging-port=9223 --remote-allow-origins=* --headless "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory="Default"3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5176 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff46eedcf8,0x7fff46eedd04,0x7fff46eedd104⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2552,i,5167455887402560517,2827034345343703646,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2544 /prefetch:24⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2576,i,5167455887402560517,2827034345343703646,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2564 /prefetch:34⤵PID:4012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2776,i,5167455887402560517,2827034345343703646,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2760 /prefetch:84⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3216,i,5167455887402560517,2827034345343703646,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3212 /prefetch:14⤵
- Uses browser remote debugging
PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3240,i,5167455887402560517,2827034345343703646,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3236 /prefetch:14⤵
- Uses browser remote debugging
PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4236,i,5167455887402560517,2827034345343703646,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4232 /prefetch:24⤵
- Uses browser remote debugging
PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4680,i,5167455887402560517,2827034345343703646,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4676 /prefetch:14⤵
- Uses browser remote debugging
PID:4612
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4188
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1580
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:2420
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:3916
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4888
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4644
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4392
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1236
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:5128
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:6104
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:2504
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4396
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1224
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:1928
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:5708
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:3624
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:5680
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:2540
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:3996
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:5276
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#613⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:2848
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:2164
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4784
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2204
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Authentication Process
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD579663a72053226abc12936ca4f180a76
SHA12cbba634bb3a3630146cebc4733478211427052e
SHA256718f2bb81ed1a55a722042b962a62d14065e994679bfc4c6e5c310b03c117901
SHA51234be95dd4a85c7712e9ce75ab1203d0464e3036949dfc670948fc8a4c251a4578a0fb800e1f67adc504a0d0c1abcc1c504d70b305d2ffc18f6c272fd689e5bea
-
Filesize
80KB
MD544aa3f5b6fe3e7da05561b74e712220f
SHA15b2c4558be81e16aeab9df7de9066843e7bc47a9
SHA256abfc091c6d9202a834745d98d4bffde2a32aec20be9bf7e18e7a0d8ce4747923
SHA51226a61f60b377094ab81548becdb392c418a950dde87f09479e710a9d1915dc5599fffb6e58f3ff98d786529d5e3040a6459b833b282241dc0e55bb0757e37479
-
Filesize
280B
MD5c37f9d2c357647fca20f2eaa89c18edd
SHA1cfd1035ed2d057c317b48546f467209cbbe15f2e
SHA2562ea3a0b7e6145fd110653b1a77cb827ad7e4a145c29378344bd3d28f595b2072
SHA5123563f4aca9e47f35de8cb38e42a3c0448bb3ec4c9183fa392abc28fee4ca08bf16da028ffbf31cf0c0f8301ed810238961e745590e5c71621bc5a2a889dd12f7
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40KB
MD5b1494364c9adaa3cf7cf15f495d7ed05
SHA1b0a88f3cbd0326be5362490fdc7b5583525dbd96
SHA256b59891434e3f09dfeecc67ede5d43ae94184443e011c0e5a9c49b1bd86ecedcb
SHA512bc41489f2ad164cf61f964d6ceb488025009eeece9f0163677f216a2c05cbaddceba3e4a0556862dae8cde8d3944f9407ea6328bd2c28c6e57c40927a73889c0
-
Filesize
746KB
MD51f3ea8d57d89c45f2ead13bc02fcfb93
SHA17e9dfa5b36333dbeaddec1266db07246577af2fe
SHA256af8d3dbf01d2e8caf5bb94b13c791a1a34cadb229375fdb5df1fffdd17d11582
SHA512fb0ec00abed1b7e90aff6e93a80d8adaf31229be259c8394f600b15cb1210832625eef7de0fe4019db8a14221fd4b65ca9aceeb82d1310e244ad31ec662b52d4
-
Filesize
40KB
MD5ab893875d697a3145af5eed5309bee26
SHA1c90116149196cbf74ffb453ecb3b12945372ebfa
SHA25602b1c2234680617802901a77eae606ad02e4ddb4282ccbc60061eac5b2d90bba
SHA5126b65c0a1956ce18df2d271205f53274d2905c803d059a0801bf8331ccaa28a1d4842d3585dd9c2b01502a4be6664bde2e965b15fcfec981e85eed37c595cd6bc