Resubmissions
09-04-2024 13:06
240409-qcaa3aba2z 1009-04-2024 13:06
240409-qb91asba2y 1009-04-2024 13:06
240409-qb9drsba2x 1009-04-2024 13:06
240409-qb831afg26 1028-08-2023 01:00
230828-bcmttsgb4v 10Analysis
-
max time kernel
1798s -
max time network
1801s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
09-04-2024 13:06
Behavioral task
behavioral1
Sample
06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe
Resource
win11-20240221-en
General
-
Target
06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe
-
Size
7.8MB
-
MD5
03b9dd8b1e16ad5c2a605ad6b18493a7
-
SHA1
725f4473d8e09a8a9fcad2e8900dfb74623d4f18
-
SHA256
06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3
-
SHA512
8c5c077bd7575483b3601221b77e5b49b9acb7181fe73173dd5879cd19b6d517b5f2454390884ea87490da72cb2e37b5d476132f96415a68b209ce740c7b1c4f
-
SSDEEP
196608:LIRcbH4jSteTGvwxwhzav1yo31CPwDv3uFZjeg2EeJUO9WLQkDxtw3iFFrS6XOf:LdHsfuwxwZ6v1CPwDv3uFteg2EeJUO9E
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 7 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000700000001ac2b-14.dat acprotect behavioral2/files/0x000700000001ac2c-15.dat acprotect behavioral2/files/0x000700000001ac30-27.dat acprotect behavioral2/files/0x000700000001ac2d-29.dat acprotect behavioral2/files/0x000700000001ac32-23.dat acprotect behavioral2/files/0x000700000001ac2f-21.dat acprotect behavioral2/files/0x000700000001ac2e-17.dat acprotect -
Executes dropped EXE 63 IoCs
pid Process 780 dllhost.exe 5104 dllhost.exe 4984 dllhost.exe 1996 dllhost.exe 1112 dllhost.exe 4048 dllhost.exe 3488 dllhost.exe 1080 dllhost.exe 2576 dllhost.exe 2140 dllhost.exe 4192 dllhost.exe 828 dllhost.exe 2096 dllhost.exe 4508 dllhost.exe 2328 dllhost.exe 680 dllhost.exe 2092 dllhost.exe 4336 dllhost.exe 1572 dllhost.exe 5096 dllhost.exe 1068 dllhost.exe 5100 dllhost.exe 68 dllhost.exe 4584 dllhost.exe 772 dllhost.exe 4248 dllhost.exe 2096 dllhost.exe 4816 dllhost.exe 1240 dllhost.exe 1584 dllhost.exe 4436 dllhost.exe 932 dllhost.exe 3488 dllhost.exe 2848 dllhost.exe 1572 dllhost.exe 3500 dllhost.exe 5044 dllhost.exe 512 dllhost.exe 1792 dllhost.exe 2440 dllhost.exe 1348 dllhost.exe 2132 dllhost.exe 3516 dllhost.exe 2116 dllhost.exe 4500 dllhost.exe 1564 dllhost.exe 4688 dllhost.exe 4788 dllhost.exe 3236 dllhost.exe 3080 dllhost.exe 1480 dllhost.exe 4716 dllhost.exe 2400 dllhost.exe 3688 dllhost.exe 780 dllhost.exe 1672 dllhost.exe 4068 dllhost.exe 3476 dllhost.exe 4784 dllhost.exe 928 dllhost.exe 3324 dllhost.exe 4108 dllhost.exe 2088 dllhost.exe -
Loads dropped DLL 64 IoCs
pid Process 780 dllhost.exe 780 dllhost.exe 780 dllhost.exe 780 dllhost.exe 780 dllhost.exe 780 dllhost.exe 780 dllhost.exe 780 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 5104 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 4984 dllhost.exe 1996 dllhost.exe 1996 dllhost.exe 1996 dllhost.exe 1996 dllhost.exe 1996 dllhost.exe 1996 dllhost.exe 1996 dllhost.exe 1112 dllhost.exe 1112 dllhost.exe 1112 dllhost.exe 1112 dllhost.exe 1112 dllhost.exe 1112 dllhost.exe 1112 dllhost.exe 4048 dllhost.exe 4048 dllhost.exe 4048 dllhost.exe 4048 dllhost.exe 4048 dllhost.exe 4048 dllhost.exe 4048 dllhost.exe 3488 dllhost.exe 3488 dllhost.exe 3488 dllhost.exe 3488 dllhost.exe 3488 dllhost.exe 3488 dllhost.exe 3488 dllhost.exe 1080 dllhost.exe 1080 dllhost.exe 1080 dllhost.exe 1080 dllhost.exe 1080 dllhost.exe 1080 dllhost.exe 1080 dllhost.exe 2576 dllhost.exe 2576 dllhost.exe 2576 dllhost.exe 2576 dllhost.exe 2576 dllhost.exe 2576 dllhost.exe 2576 dllhost.exe -
resource yara_rule behavioral2/files/0x000700000001ac31-12.dat upx behavioral2/files/0x000700000001ac2b-14.dat upx behavioral2/files/0x000700000001ac2c-15.dat upx behavioral2/files/0x000700000001ac30-27.dat upx behavioral2/memory/780-30-0x0000000072F60000-0x0000000073028000-memory.dmp upx behavioral2/files/0x000700000001ac2d-29.dat upx behavioral2/files/0x000700000001ac32-23.dat upx behavioral2/memory/780-22-0x0000000001320000-0x0000000001724000-memory.dmp upx behavioral2/files/0x000700000001ac2f-21.dat upx behavioral2/files/0x000700000001ac2e-17.dat upx behavioral2/memory/780-35-0x0000000072EE0000-0x0000000072F04000-memory.dmp upx behavioral2/memory/780-34-0x0000000072F10000-0x0000000072F59000-memory.dmp upx behavioral2/memory/780-37-0x0000000072C10000-0x0000000072EDF000-memory.dmp upx behavioral2/memory/780-38-0x0000000072B80000-0x0000000072C08000-memory.dmp upx behavioral2/memory/780-39-0x0000000072A70000-0x0000000072B7A000-memory.dmp upx behavioral2/memory/780-40-0x0000000073030000-0x00000000730FE000-memory.dmp upx behavioral2/memory/780-50-0x0000000001320000-0x0000000001724000-memory.dmp upx behavioral2/memory/780-52-0x0000000072F60000-0x0000000073028000-memory.dmp upx behavioral2/memory/780-67-0x0000000001320000-0x0000000001724000-memory.dmp upx behavioral2/memory/780-68-0x0000000001320000-0x0000000001724000-memory.dmp upx behavioral2/memory/780-76-0x0000000001320000-0x0000000001724000-memory.dmp upx behavioral2/memory/780-84-0x0000000001320000-0x0000000001724000-memory.dmp upx behavioral2/memory/780-93-0x0000000001320000-0x0000000001724000-memory.dmp upx behavioral2/memory/5104-104-0x0000000001320000-0x0000000001724000-memory.dmp upx behavioral2/memory/5104-109-0x0000000072F60000-0x0000000073028000-memory.dmp upx behavioral2/memory/5104-112-0x0000000001320000-0x0000000001724000-memory.dmp upx behavioral2/memory/5104-114-0x0000000072F10000-0x0000000072F59000-memory.dmp upx behavioral2/memory/5104-111-0x0000000073030000-0x00000000730FE000-memory.dmp upx behavioral2/memory/5104-106-0x0000000072C10000-0x0000000072EDF000-memory.dmp upx behavioral2/memory/5104-115-0x0000000072C10000-0x0000000072EDF000-memory.dmp upx behavioral2/memory/5104-118-0x0000000072EE0000-0x0000000072F04000-memory.dmp upx behavioral2/memory/5104-120-0x0000000072A70000-0x0000000072B7A000-memory.dmp upx behavioral2/memory/5104-122-0x0000000072B80000-0x0000000072C08000-memory.dmp upx behavioral2/memory/5104-117-0x0000000072F60000-0x0000000073028000-memory.dmp upx behavioral2/memory/4984-138-0x0000000073160000-0x0000000073228000-memory.dmp upx behavioral2/memory/4984-139-0x0000000073090000-0x000000007315E000-memory.dmp upx behavioral2/memory/4984-140-0x0000000073A00000-0x0000000073A49000-memory.dmp upx behavioral2/memory/4984-132-0x0000000001320000-0x0000000001724000-memory.dmp upx behavioral2/memory/4984-143-0x00000000739D0000-0x00000000739F4000-memory.dmp upx behavioral2/memory/4984-146-0x0000000072F80000-0x000000007308A000-memory.dmp upx behavioral2/memory/4984-147-0x0000000072EF0000-0x0000000072F78000-memory.dmp upx behavioral2/memory/4984-148-0x0000000073230000-0x00000000734FF000-memory.dmp upx behavioral2/memory/4984-156-0x0000000001320000-0x0000000001724000-memory.dmp upx behavioral2/memory/4984-158-0x0000000073160000-0x0000000073228000-memory.dmp upx behavioral2/memory/4984-159-0x0000000073090000-0x000000007315E000-memory.dmp upx behavioral2/memory/4984-168-0x0000000001320000-0x0000000001724000-memory.dmp upx behavioral2/memory/4984-169-0x0000000001320000-0x0000000001724000-memory.dmp upx behavioral2/memory/1996-213-0x0000000001320000-0x0000000001724000-memory.dmp upx behavioral2/memory/1996-216-0x0000000073230000-0x00000000734FF000-memory.dmp upx behavioral2/memory/1996-218-0x0000000073160000-0x0000000073228000-memory.dmp upx behavioral2/memory/1996-222-0x0000000073A00000-0x0000000073A49000-memory.dmp upx behavioral2/memory/1996-224-0x00000000739D0000-0x00000000739F4000-memory.dmp upx behavioral2/memory/4984-226-0x0000000001320000-0x0000000001724000-memory.dmp upx behavioral2/memory/1996-227-0x0000000072F80000-0x000000007308A000-memory.dmp upx behavioral2/memory/1996-229-0x0000000072EF0000-0x0000000072F78000-memory.dmp upx behavioral2/memory/1996-219-0x0000000073090000-0x000000007315E000-memory.dmp upx behavioral2/memory/1996-236-0x0000000001320000-0x0000000001724000-memory.dmp upx behavioral2/memory/1996-237-0x0000000073230000-0x00000000734FF000-memory.dmp upx behavioral2/memory/1996-238-0x0000000073160000-0x0000000073228000-memory.dmp upx behavioral2/memory/1996-239-0x0000000073090000-0x000000007315E000-memory.dmp upx behavioral2/memory/1112-251-0x0000000073160000-0x0000000073228000-memory.dmp upx behavioral2/memory/1112-252-0x0000000073090000-0x000000007315E000-memory.dmp upx behavioral2/memory/1112-253-0x0000000073A00000-0x0000000073A49000-memory.dmp upx behavioral2/memory/1112-254-0x0000000072F80000-0x000000007308A000-memory.dmp upx -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 73 myexternalip.com 74 myexternalip.com 217 myexternalip.com 239 myexternalip.com -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3988 wrote to memory of 780 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 73 PID 3988 wrote to memory of 780 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 73 PID 3988 wrote to memory of 780 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 73 PID 3988 wrote to memory of 5104 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 74 PID 3988 wrote to memory of 5104 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 74 PID 3988 wrote to memory of 5104 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 74 PID 3988 wrote to memory of 4984 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 75 PID 3988 wrote to memory of 4984 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 75 PID 3988 wrote to memory of 4984 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 75 PID 3988 wrote to memory of 1996 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 76 PID 3988 wrote to memory of 1996 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 76 PID 3988 wrote to memory of 1996 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 76 PID 3988 wrote to memory of 1112 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 77 PID 3988 wrote to memory of 1112 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 77 PID 3988 wrote to memory of 1112 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 77 PID 3988 wrote to memory of 4048 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 78 PID 3988 wrote to memory of 4048 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 78 PID 3988 wrote to memory of 4048 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 78 PID 3988 wrote to memory of 3488 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 79 PID 3988 wrote to memory of 3488 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 79 PID 3988 wrote to memory of 3488 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 79 PID 3988 wrote to memory of 1080 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 80 PID 3988 wrote to memory of 1080 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 80 PID 3988 wrote to memory of 1080 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 80 PID 3988 wrote to memory of 2576 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 81 PID 3988 wrote to memory of 2576 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 81 PID 3988 wrote to memory of 2576 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 81 PID 3988 wrote to memory of 2140 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 82 PID 3988 wrote to memory of 2140 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 82 PID 3988 wrote to memory of 2140 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 82 PID 3988 wrote to memory of 4192 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 83 PID 3988 wrote to memory of 4192 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 83 PID 3988 wrote to memory of 4192 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 83 PID 3988 wrote to memory of 828 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 84 PID 3988 wrote to memory of 828 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 84 PID 3988 wrote to memory of 828 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 84 PID 3988 wrote to memory of 2096 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 85 PID 3988 wrote to memory of 2096 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 85 PID 3988 wrote to memory of 2096 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 85 PID 3988 wrote to memory of 4508 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 86 PID 3988 wrote to memory of 4508 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 86 PID 3988 wrote to memory of 4508 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 86 PID 3988 wrote to memory of 2328 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 87 PID 3988 wrote to memory of 2328 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 87 PID 3988 wrote to memory of 2328 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 87 PID 3988 wrote to memory of 680 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 88 PID 3988 wrote to memory of 680 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 88 PID 3988 wrote to memory of 680 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 88 PID 3988 wrote to memory of 2092 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 89 PID 3988 wrote to memory of 2092 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 89 PID 3988 wrote to memory of 2092 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 89 PID 3988 wrote to memory of 4336 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 90 PID 3988 wrote to memory of 4336 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 90 PID 3988 wrote to memory of 4336 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 90 PID 3988 wrote to memory of 1572 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 91 PID 3988 wrote to memory of 1572 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 91 PID 3988 wrote to memory of 1572 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 91 PID 3988 wrote to memory of 5096 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 92 PID 3988 wrote to memory of 5096 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 92 PID 3988 wrote to memory of 5096 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 92 PID 3988 wrote to memory of 1068 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 93 PID 3988 wrote to memory of 1068 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 93 PID 3988 wrote to memory of 1068 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 93 PID 3988 wrote to memory of 5100 3988 06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe"C:\Users\Admin\AppData\Local\Temp\06f5ae2998205719e3541415641a8afc2f5d6877b50c860df066e0e95c7ed3f3.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:780
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5104
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4984
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1996
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1112
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4048
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3488
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1080
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2576
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:2140
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:4192
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:828
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:2096
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:4508
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:2328
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:680
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:2092
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:4336
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:1572
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:5096
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:1068
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:5100
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:68
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:4584
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:772
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:4248
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:2096
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:4816
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:1240
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:1584
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:4436
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:932
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:3488
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:2848
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:1572
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:3500
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:5044
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:512
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:1792
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:2440
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:1348
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:2132
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:3516
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:2116
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:4500
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:1564
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:4688
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:4788
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:3236
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:3080
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:1480
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:4716
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:2400
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:3688
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:780
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:1672
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:4068
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:3476
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:4784
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:928
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:3324
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:4108
-
-
C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe"C:\Users\Admin\AppData\Local\951497bb\tor\dllhost.exe" -f torrc2⤵
- Executes dropped EXE
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD583b8d3c284b1d2560131e38b9e7925fb
SHA14d7ec085aa526ef5de78185101950fc798ebd62d
SHA256dba0e232642bc7fd58ce955ffd9b15218fa99fed5dfd987a53a052c7062178c0
SHA5125975d4c7fdbfa40dfc3e8c6f687b408c2daa5f47ed6c8bd96a099b8afb47e60ba350bfcd9eab6508ace1fb2e46b2e3318dc7d7037f002e48a90a6f1029967013
-
Filesize
2.6MB
MD51e2769f7012387ea5b91b1e7c79ce55d
SHA188876090487a4e7e93ec3b6b70f78ba1ff3d37e0
SHA256fb95200fe4c6f12b24a66f7febf24099ccb3bc7a8bd64fa4d368001418019306
SHA51214dc40bb0166a01ac73bd53cf3f68dc7aff17e234e724814710b96a87eabbae3ee0edd0f3b8a0cedfd20f78ed5f75c32c56f69022d46869980a25134534bd6bf
-
Filesize
11.8MB
MD5f6fb1d735a29160e80d1b0728cafbd84
SHA13259e4e0f17c37c15d4895efbbe1bfe574b73c9f
SHA256bdef54295b38bca2464b9fe6126d7de8c4abb6c25e4a04633125c5659a113994
SHA5120c0e21ead92d885513c5ea6c206e320040144b47c8d46c68f48424d075581e282ebb34906e6608731a4dcb4307e82059ee471ef99345c6aa237461efe783d766
-
Filesize
11.8MB
MD55d474dc81870df16d814a8477c66ec83
SHA1015cfe7d4b6360b9ffb414215f10af9096e752aa
SHA256504e9bab6f17f1eae204410464136c38537c2f1572f2c482b884cebe6558f549
SHA512a45b1ebfabdeebc6c36f8138c963d7e8a0b64ffaac06b7ab401b619fff1d6d39e6b9263c2aed36f5a4374ef24b79c02e4f72f181b1f1c70873a1419873034334
-
Filesize
7.6MB
MD5ad857a8062e6df53fb1da483b549786c
SHA10f0307487df36818afc302626b383c9c9fba2626
SHA256528f2eab2436a09830a5608147ee0dbb92c41d3cb1d2b2a7ff8924bd0e15e17d
SHA5126b637a6708f4dd2ad7594a133da91c2f311727e9afc0417ee0c485dcc61575dfb040ab92b2bfbd4627a71af2b91c04b571fa18c59a70dd5855ff4f60019c58aa
-
Filesize
3.5MB
MD5268469c606e253572ce516ef7c5f8ce1
SHA15c03c73c10f61aabbb571cf0e5e0fa3d947f7c3d
SHA256127784cb44e3504dc533767a11fd254700e48340aec99ea6e89bbd0767b8e7a0
SHA5121fcf00cabb88d1dd8f1131893ef93a2695b21ff3a6d532b62717500f66147cb8f5dae067f534ce865bc3304100ecb76d1e0adb6dcc406119ef236b97f8a507d6
-
Filesize
3.6MB
MD5e027c173bc393852034bd8cb1c376e25
SHA1d373b4c01f41ed304f12b14e2e08698e088fcf5d
SHA25657aecff4106a7a0ae87743a130003bdf43ada4e256abd5fb3d80b0414935dce4
SHA512fc6818efe08142d5ab2570d9e28d2c707e3dd6d0c9444325ef5b1db5e923ab81718b6bf37cac72a9c95da15d38088967c769e92916f5c52f011dc759fdca266f
-
Filesize
232B
MD56e3ff7c9f05cce658c3f05731fea9270
SHA1b3bb9a853895636f9ef00eb6ac8f5470ad9c73aa
SHA256f0217aac10def9f7d16d891de1d05c79b9bf2fa3fbd0fdf786f4666ae00a9bea
SHA5129551dca14a4aa2740ba54834213c59837a8a8f06dbc8cf2d0695717dde3353b0bf335af6dfec0cf66ca97a9372d727fff92a7c8f4273bec55c51afdf883cd774
-
Filesize
3KB
MD5cfb92e3fca1324a3db10a8e7d08d62a8
SHA1b9e4e08242f5b5ed02a233a25e9fbf7f3bc6b0ae
SHA2569d07878bde77eb9600bc2ed315a03fff0a1f358dd761cd88cbf99df30c5f0c5a
SHA5126f2ebc0cf72715251581a31e98cc5bfba30f5317450d9bcdb2cd321eceac0900a18ba9fd25a849975ce9a7f4cecc280fade84939fef98d3bac2496562175bd7f
-
Filesize
973KB
MD55cfe61ff895c7daa889708665ef05d7b
SHA15e58efe30406243fbd58d4968b0492ddeef145f2
SHA256f9c1d18b50ce7484bf212cb61a9035602cfb90ebdfe66a077b9f6df73196a9f5
SHA51243b6f10391a863a21f70e05cee41900729c7543750e118ff5d74c0cac3d1383f10bcb73eade2a28b555a393cada4795e204246129b01ad9177d1167827dd68da
-
Filesize
1.7MB
MD52384a02c4a1f7ec481adde3a020607d3
SHA17e848d35a10bf9296c8fa41956a3daa777f86365
SHA256c8db0ff0f7047ed91b057005e86ad3a23eae616253313aa047c560d9eb398369
SHA5121ac74dd2d863acd7415ef8b9490a5342865462fbabdad0645da22424b0d56f5e9c389a3d7c41386f2414d6c4715c79a6ddecb6e6cff29e98319e1fd1060f4503
-
Filesize
366KB
MD5099983c13bade9554a3c17484e5481f1
SHA1a84e69ad9722f999252d59d0ed9a99901a60e564
SHA256b65f9aa0c7912af64bd9b05e9322e994339a11b0c8907e6a6166d7b814bda838
SHA51289f1a963de77873296395662d4150e3eff7a2d297fb9ec54ec06aa2e40d41e5f4fc4611e9bc34126d760c9134f2907fea3bebdf2fbbd7eaddad99f8e4be1f5e2
-
Filesize
188KB
MD5d407cc6d79a08039a6f4b50539e560b8
SHA121171adbc176dc19aaa5e595cd2cd4bd1dfd0c71
SHA25692cfd0277c8781a15a0f17b7aee6cff69631b9606a001101631f04b3381efc4e
SHA512378a10fed915591445d97c6d04e82d28008d8ea65e0e40c142b8ee59867035d561d4e103495c8f0d9c19b51597706ce0b450c25516aa0f1744579ffcd097ae0c
-
Filesize
157B
MD50abc0c2c50e17f9ae5c8ab3245eb656b
SHA1079865f62cef9dd3577f1b16e5a33411e38bbc7a
SHA256eee8bdeac9340fd17d498eced366348b65e9da7176aaa5614cdb7f5fa34394ea
SHA5129adf325f4bd495e93a380e5dda2f08cbdd2cb30045f669b3d3a979dce09c71f5a7677cff009f234bd14943f995b38d3675571fb56f201208b947df82130a9ddd
-
Filesize
286KB
MD5b0d98f7157d972190fe0759d4368d320
SHA15715a533621a2b642aad9616e603c6907d80efc4
SHA2562922193133dabab5b82088d4e87484e2fac75e9e0c765dacaf22eb5f4f18b0c5
SHA51241ce56c428158533bf8b8ffe0a71875b5a3abc549b88d7d3e69acc6080653abea344d6d66fff39c04bf019fcaa295768d620377d85a933ddaf17f3d90df29496
-
Filesize
439KB
MD5c88826ac4bb879622e43ead5bdb95aeb
SHA187d29853649a86f0463bfd9ad887b85eedc21723
SHA256c4d898b1a4285a45153af9ed88d79aa2a073dcb7225961b6b276b532b4d18b6f
SHA512f733041ef35b9b8058fbcf98faa0d1fea5c0858fea941ecebbe9f083cd73e3e66323afffd8d734097fcdd5e6e59db4d94f51fca5874edbcd2a382d9ba6cd97b3
-
Filesize
88KB
MD52c916456f503075f746c6ea649cf9539
SHA1fa1afc1f3d728c89b2e90e14ca7d88b599580a9d
SHA256cbb5236d923d4f4baf2f0d2797c72a2cbae42ef7ac0acce786daf5fdc5b456e6
SHA5121c1995e1aa7c33c597c64122395275861d9219e46d45277d4f1768a2e06227b353d5d77d6b7cb655082dc6fb9736ad6f7cfcc0c90e02776e27d50857e792e3fd
-
Filesize
52KB
MD5add33041af894b67fe34e1dc819b7eb6
SHA16db46eb021855a587c95479422adcc774a272eeb
SHA2568688bd7ca55dcc0c23c429762776a0a43fe5b0332dfd5b79ef74e55d4bbc1183
SHA512bafc441198d03f0e7fe804bab89283c389d38884d0f87d81b11950a9b79fcbf7b32be4bb16f4fcd9179b66f865c563c172a46b4514a6087ef0af64425a4b2cfa