Resubmissions
10-04-2024 02:41
240410-c6hmmsfd7z 1010-04-2024 02:41
240410-c6g14scb46 1010-04-2024 02:41
240410-c6gqcacb45 1010-04-2024 02:41
240410-c6f4tacb44 1014-10-2023 01:33
231014-bysbfahh6s 10Analysis
-
max time kernel
1711s -
max time network
1806s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-04-2024 02:41
Behavioral task
behavioral1
Sample
x19a4f9f3d16fcc9779ba8ea79bf7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
x19a4f9f3d16fcc9779ba8ea79bf7.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
x19a4f9f3d16fcc9779ba8ea79bf7.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
x19a4f9f3d16fcc9779ba8ea79bf7.exe
Resource
win11-20240221-en
General
-
Target
x19a4f9f3d16fcc9779ba8ea79bf7.exe
-
Size
392KB
-
MD5
2299a17350433284e58bd0fcc10edf41
-
SHA1
d477f1cd55365db00ca77cc5459afabe1ffc80b3
-
SHA256
c3439dd56bcf3921cdbfcbdff3f928d14ebd632b3411235657bf9f5452c1ab9d
-
SHA512
123d18cf17b4bb0f0b16414039c2381f77e9f12c96a109d5847c760e4d7fb64f6c592f8f185a4c0375aade6754afd0abd6a196936adac405290f157829ae25a1
-
SSDEEP
6144:5cJGLvLE5hu6Me646G0D1ecme1x9b31v4n:uUvLr6k9b5ecmed1v4
Malware Config
Extracted
gurcu
https://api.telegram.org/bot6193093056:AAHzyNGUGS9aUG6CCx6ENLoXpCFLzEQywIQ/sendMessage?chat_id=1098292643
Signatures
-
Executes dropped EXE 58 IoCs
pid Process 824 x19a4f9f3d16fcc9779ba8ea79bf7.exe 3896 tor.exe 3492 x19a4f9f3d16fcc9779ba8ea79bf7.exe 2808 tor.exe 1716 x19a4f9f3d16fcc9779ba8ea79bf7.exe 2008 tor.exe 4960 x19a4f9f3d16fcc9779ba8ea79bf7.exe 3484 tor.exe 4752 x19a4f9f3d16fcc9779ba8ea79bf7.exe 1372 tor.exe 3228 x19a4f9f3d16fcc9779ba8ea79bf7.exe 5012 tor.exe 4464 x19a4f9f3d16fcc9779ba8ea79bf7.exe 4512 tor.exe 2888 x19a4f9f3d16fcc9779ba8ea79bf7.exe 1296 tor.exe 1780 x19a4f9f3d16fcc9779ba8ea79bf7.exe 2700 tor.exe 1252 x19a4f9f3d16fcc9779ba8ea79bf7.exe 3148 tor.exe 2428 x19a4f9f3d16fcc9779ba8ea79bf7.exe 2352 tor.exe 1452 x19a4f9f3d16fcc9779ba8ea79bf7.exe 4652 tor.exe 1544 x19a4f9f3d16fcc9779ba8ea79bf7.exe 1484 tor.exe 4116 x19a4f9f3d16fcc9779ba8ea79bf7.exe 1916 tor.exe 3400 x19a4f9f3d16fcc9779ba8ea79bf7.exe 4720 tor.exe 3880 x19a4f9f3d16fcc9779ba8ea79bf7.exe 4300 tor.exe 1468 x19a4f9f3d16fcc9779ba8ea79bf7.exe 880 tor.exe 200 x19a4f9f3d16fcc9779ba8ea79bf7.exe 3884 tor.exe 4348 x19a4f9f3d16fcc9779ba8ea79bf7.exe 1620 tor.exe 4760 x19a4f9f3d16fcc9779ba8ea79bf7.exe 4456 tor.exe 3448 x19a4f9f3d16fcc9779ba8ea79bf7.exe 1704 tor.exe 2124 x19a4f9f3d16fcc9779ba8ea79bf7.exe 4956 tor.exe 3484 x19a4f9f3d16fcc9779ba8ea79bf7.exe 1296 tor.exe 3320 x19a4f9f3d16fcc9779ba8ea79bf7.exe 3756 tor.exe 4408 x19a4f9f3d16fcc9779ba8ea79bf7.exe 2460 tor.exe 200 x19a4f9f3d16fcc9779ba8ea79bf7.exe 2864 tor.exe 4092 x19a4f9f3d16fcc9779ba8ea79bf7.exe 2816 tor.exe 3592 x19a4f9f3d16fcc9779ba8ea79bf7.exe 4424 tor.exe 4524 x19a4f9f3d16fcc9779ba8ea79bf7.exe 3696 tor.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-160263616-143223877-1356318919-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 x19a4f9f3d16fcc9779ba8ea79bf7.exe Key opened \REGISTRY\USER\S-1-5-21-160263616-143223877-1356318919-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 x19a4f9f3d16fcc9779ba8ea79bf7.exe Key opened \REGISTRY\USER\S-1-5-21-160263616-143223877-1356318919-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 x19a4f9f3d16fcc9779ba8ea79bf7.exe Key opened \REGISTRY\USER\S-1-5-21-160263616-143223877-1356318919-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 x19a4f9f3d16fcc9779ba8ea79bf7.exe Key opened \REGISTRY\USER\S-1-5-21-160263616-143223877-1356318919-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 x19a4f9f3d16fcc9779ba8ea79bf7.exe Key opened \REGISTRY\USER\S-1-5-21-160263616-143223877-1356318919-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 x19a4f9f3d16fcc9779ba8ea79bf7.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 28 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2348 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3020 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 824 x19a4f9f3d16fcc9779ba8ea79bf7.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeDebugPrivilege 224 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 824 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 3492 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 1716 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 4960 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 4752 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 3228 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 4464 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 2888 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 1780 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 1252 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 2428 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 1452 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 1544 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 4116 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 3400 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 3880 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 1468 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 200 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 4348 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 4760 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 3448 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 2124 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 3484 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 3320 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 4408 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 200 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 4092 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 3592 x19a4f9f3d16fcc9779ba8ea79bf7.exe Token: SeDebugPrivilege 4524 x19a4f9f3d16fcc9779ba8ea79bf7.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 224 wrote to memory of 4012 224 x19a4f9f3d16fcc9779ba8ea79bf7.exe 80 PID 224 wrote to memory of 4012 224 x19a4f9f3d16fcc9779ba8ea79bf7.exe 80 PID 4012 wrote to memory of 4120 4012 cmd.exe 82 PID 4012 wrote to memory of 4120 4012 cmd.exe 82 PID 4012 wrote to memory of 3020 4012 cmd.exe 83 PID 4012 wrote to memory of 3020 4012 cmd.exe 83 PID 4012 wrote to memory of 2348 4012 cmd.exe 84 PID 4012 wrote to memory of 2348 4012 cmd.exe 84 PID 4012 wrote to memory of 824 4012 cmd.exe 85 PID 4012 wrote to memory of 824 4012 cmd.exe 85 PID 824 wrote to memory of 3500 824 x19a4f9f3d16fcc9779ba8ea79bf7.exe 86 PID 824 wrote to memory of 3500 824 x19a4f9f3d16fcc9779ba8ea79bf7.exe 86 PID 824 wrote to memory of 3896 824 x19a4f9f3d16fcc9779ba8ea79bf7.exe 88 PID 824 wrote to memory of 3896 824 x19a4f9f3d16fcc9779ba8ea79bf7.exe 88 PID 3492 wrote to memory of 2808 3492 x19a4f9f3d16fcc9779ba8ea79bf7.exe 92 PID 3492 wrote to memory of 2808 3492 x19a4f9f3d16fcc9779ba8ea79bf7.exe 92 PID 1716 wrote to memory of 2008 1716 x19a4f9f3d16fcc9779ba8ea79bf7.exe 98 PID 1716 wrote to memory of 2008 1716 x19a4f9f3d16fcc9779ba8ea79bf7.exe 98 PID 4960 wrote to memory of 3484 4960 x19a4f9f3d16fcc9779ba8ea79bf7.exe 103 PID 4960 wrote to memory of 3484 4960 x19a4f9f3d16fcc9779ba8ea79bf7.exe 103 PID 4752 wrote to memory of 1372 4752 x19a4f9f3d16fcc9779ba8ea79bf7.exe 108 PID 4752 wrote to memory of 1372 4752 x19a4f9f3d16fcc9779ba8ea79bf7.exe 108 PID 3228 wrote to memory of 5012 3228 x19a4f9f3d16fcc9779ba8ea79bf7.exe 113 PID 3228 wrote to memory of 5012 3228 x19a4f9f3d16fcc9779ba8ea79bf7.exe 113 PID 4464 wrote to memory of 4512 4464 x19a4f9f3d16fcc9779ba8ea79bf7.exe 118 PID 4464 wrote to memory of 4512 4464 x19a4f9f3d16fcc9779ba8ea79bf7.exe 118 PID 2888 wrote to memory of 1296 2888 x19a4f9f3d16fcc9779ba8ea79bf7.exe 123 PID 2888 wrote to memory of 1296 2888 x19a4f9f3d16fcc9779ba8ea79bf7.exe 123 PID 1780 wrote to memory of 2700 1780 x19a4f9f3d16fcc9779ba8ea79bf7.exe 128 PID 1780 wrote to memory of 2700 1780 x19a4f9f3d16fcc9779ba8ea79bf7.exe 128 PID 1252 wrote to memory of 3148 1252 x19a4f9f3d16fcc9779ba8ea79bf7.exe 133 PID 1252 wrote to memory of 3148 1252 x19a4f9f3d16fcc9779ba8ea79bf7.exe 133 PID 2428 wrote to memory of 2352 2428 x19a4f9f3d16fcc9779ba8ea79bf7.exe 138 PID 2428 wrote to memory of 2352 2428 x19a4f9f3d16fcc9779ba8ea79bf7.exe 138 PID 1452 wrote to memory of 4652 1452 x19a4f9f3d16fcc9779ba8ea79bf7.exe 143 PID 1452 wrote to memory of 4652 1452 x19a4f9f3d16fcc9779ba8ea79bf7.exe 143 PID 1544 wrote to memory of 1484 1544 x19a4f9f3d16fcc9779ba8ea79bf7.exe 148 PID 1544 wrote to memory of 1484 1544 x19a4f9f3d16fcc9779ba8ea79bf7.exe 148 PID 4116 wrote to memory of 1916 4116 x19a4f9f3d16fcc9779ba8ea79bf7.exe 153 PID 4116 wrote to memory of 1916 4116 x19a4f9f3d16fcc9779ba8ea79bf7.exe 153 PID 3400 wrote to memory of 4720 3400 x19a4f9f3d16fcc9779ba8ea79bf7.exe 158 PID 3400 wrote to memory of 4720 3400 x19a4f9f3d16fcc9779ba8ea79bf7.exe 158 PID 3880 wrote to memory of 4300 3880 x19a4f9f3d16fcc9779ba8ea79bf7.exe 163 PID 3880 wrote to memory of 4300 3880 x19a4f9f3d16fcc9779ba8ea79bf7.exe 163 PID 1468 wrote to memory of 880 1468 x19a4f9f3d16fcc9779ba8ea79bf7.exe 168 PID 1468 wrote to memory of 880 1468 x19a4f9f3d16fcc9779ba8ea79bf7.exe 168 PID 200 wrote to memory of 3884 200 x19a4f9f3d16fcc9779ba8ea79bf7.exe 173 PID 200 wrote to memory of 3884 200 x19a4f9f3d16fcc9779ba8ea79bf7.exe 173 PID 4348 wrote to memory of 1620 4348 x19a4f9f3d16fcc9779ba8ea79bf7.exe 178 PID 4348 wrote to memory of 1620 4348 x19a4f9f3d16fcc9779ba8ea79bf7.exe 178 PID 4760 wrote to memory of 4456 4760 x19a4f9f3d16fcc9779ba8ea79bf7.exe 183 PID 4760 wrote to memory of 4456 4760 x19a4f9f3d16fcc9779ba8ea79bf7.exe 183 PID 3448 wrote to memory of 1704 3448 x19a4f9f3d16fcc9779ba8ea79bf7.exe 188 PID 3448 wrote to memory of 1704 3448 x19a4f9f3d16fcc9779ba8ea79bf7.exe 188 PID 2124 wrote to memory of 4956 2124 x19a4f9f3d16fcc9779ba8ea79bf7.exe 193 PID 2124 wrote to memory of 4956 2124 x19a4f9f3d16fcc9779ba8ea79bf7.exe 193 PID 3484 wrote to memory of 1296 3484 x19a4f9f3d16fcc9779ba8ea79bf7.exe 198 PID 3484 wrote to memory of 1296 3484 x19a4f9f3d16fcc9779ba8ea79bf7.exe 198 PID 3320 wrote to memory of 3756 3320 x19a4f9f3d16fcc9779ba8ea79bf7.exe 203 PID 3320 wrote to memory of 3756 3320 x19a4f9f3d16fcc9779ba8ea79bf7.exe 203 PID 4408 wrote to memory of 2460 4408 x19a4f9f3d16fcc9779ba8ea79bf7.exe 208 PID 4408 wrote to memory of 2460 4408 x19a4f9f3d16fcc9779ba8ea79bf7.exe 208 PID 200 wrote to memory of 2864 200 x19a4f9f3d16fcc9779ba8ea79bf7.exe 213 PID 200 wrote to memory of 2864 200 x19a4f9f3d16fcc9779ba8ea79bf7.exe 213 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-160263616-143223877-1356318919-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 x19a4f9f3d16fcc9779ba8ea79bf7.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-160263616-143223877-1356318919-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 x19a4f9f3d16fcc9779ba8ea79bf7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\x19a4f9f3d16fcc9779ba8ea79bf7.exe"C:\Users\Admin\AppData\Local\Temp\x19a4f9f3d16fcc9779ba8ea79bf7.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "x19a4f9f3d16fcc9779ba8ea79bf7" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\x19a4f9f3d16fcc9779ba8ea79bf7.exe" &&START "" "C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:4120
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:3020
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "x19a4f9f3d16fcc9779ba8ea79bf7" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:2348
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe"C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\System32\tar.exe"C:\Windows\System32\tar.exe" -xvzf "C:\Users\Admin\AppData\Local\Temp\tmpE407.tmp" -C "C:\Users\Admin\AppData\Local\xtioxntk7k"4⤵PID:3500
-
-
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"4⤵
- Executes dropped EXE
PID:3896
-
-
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:2808
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:2008
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:3484
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:1372
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:5012
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:4512
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:1296
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:2700
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:3148
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:2352
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:4652
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:1484
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:1916
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:4720
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:4300
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:880
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:200 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:3884
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:1620
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:4456
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:1704
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:4956
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:1296
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:3320 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:3756
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:2460
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:200 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:2864
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4092 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:2816
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3592 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:4424
-
-
C:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exeC:\Users\Admin\AppData\Local\TeamViewer\x19a4f9f3d16fcc9779ba8ea79bf7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4524 -
C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe"C:\Users\Admin\AppData\Local\xtioxntk7k\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xtioxntk7k\torrc.txt"2⤵
- Executes dropped EXE
PID:3696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
847B
MD5486ebddc86ea8b3e965d390d22283a23
SHA1eaffc047f067084867e8575c576a9ec60e094ba8
SHA25650a57273ecb794e53b0622eb841341e2643c11f53fa47356e6e754ab2268171d
SHA5120a50ba02250b38355a6f4fb94e40c61258a74031d9aea7cdf675f3e068f39ec0748ecf292aaf2f94b1963b9d66516ee79aa6c552617048e248774af0ff07189d
-
Filesize
392KB
MD52299a17350433284e58bd0fcc10edf41
SHA1d477f1cd55365db00ca77cc5459afabe1ffc80b3
SHA256c3439dd56bcf3921cdbfcbdff3f928d14ebd632b3411235657bf9f5452c1ab9d
SHA512123d18cf17b4bb0f0b16414039c2381f77e9f12c96a109d5847c760e4d7fb64f6c592f8f185a4c0375aade6754afd0abd6a196936adac405290f157829ae25a1
-
Filesize
13.3MB
MD589d2d5811c1aff539bb355f15f3ddad0
SHA15bb3577c25b6d323d927200c48cd184a3e27c873
SHA256b630008f6d3887793d48b87091e56691e292894dd4fa100dc4a418a2f29dcc12
SHA51239e576124c54143520c5435a2ef9b24506131e13403489c0692f09b89135015d611c4988d4772f8a1e6557fa68b4667d467334461009cee8c2227dfc3e295289
-
Filesize
18KB
MD5853516a7ee51c25431309550507b83ac
SHA1e6cc221847793f02773321d1ad3583fe76eefdc6
SHA25698c2a484ab8be204a5f52b9e8b926f2de8ae43d95ff90375d9a4a99b41c91171
SHA5120e5ba4676d089384da7c82021103b53e92c2ee40958ea5a8c55fe273c4e23726a1d6f70f47a0ac54b25002ab34903a3b6bb75cc71f6a1317c42fe63ad8c36db6
-
Filesize
2.7MB
MD5a0db8a87f7b723266c8b04255da46b06
SHA14df00ea56d22d88f3d2e005ef66bad5b3ef92ebf
SHA25660b43cdce0f807f7891521f396f53def34a7d98986dbde0faa2a197189c587f3
SHA51241b8fc467d11af7ca6a42c7e94d1b8295ab3ae5d6d186b4f378e6e079440520e8324b695da1134beb2bc1697d2491edcc70c1b75ab6fc66b9c1cb2ecbcdb4a7d
-
Filesize
5.5MB
MD5648a264a49feb7e9b7f1bf17ef4ded70
SHA1579a3827e4ebe5df2c9090df6347f7c68dd2f95b
SHA256d167882f471ff1913f729fa92d218332e64448946bf53f1303347bc0cea4702b
SHA5123fb5d41b7c4d43cbfe4b25538a9cced090495c0a0c50f95b335f0470bf1574d879b536dce40c8d2609a9738f247bcb1741adbb930088ad1d2e0f703d2ec8c728
-
Filesize
64B
MD57708c7fdb61e1fac2028e897ec280eea
SHA11dafa34832d180657160cf0679772cddf0d2883c
SHA256eacd0b21b8199ab155a550560b81428c7b5817416b88f1e7c03b4140f7fbdbcd
SHA512fceb1215666defb73fabd85ef7c314d0bf68e2ef681c8e767a2de781b928c35e224a14802a59c0e9b5774a166ea25de983ed281b6828b049a3da25acd3641cd0
-
Filesize
4B
MD5e4a93f0332b2519177ed55741ea4e5e7
SHA138740b4e138067226f9545bf27346eda810207ea
SHA256ecd6512bdf3b727d065dec7da7b0523023594a474c7fb63bf0efce1e8d080da6
SHA512f58fabcfc36e9e9c57d6ce46ec8b05efba8a88438599b55e1c4decea4d27a70e4b4df9bff28ce0d01f6fa60e7ab8053ddfac0e82a44708069f3685914b8a6adb
-
Filesize
7.4MB
MD588590909765350c0d70c6c34b1f31dd2
SHA1129b27c3926e53e5df6d44cc6adf39c3a8d9ebf7
SHA25646fe244b548265c78ab961e8f787bc8bf21edbcaaf175fa3b8be3137c6845a82
SHA512a8af08d9169a31a1c3419d4e6e8fbe608c800d323840563b5a560d3e09e78a492201f07cc0d3864efbff8ad81e59885fc43a6b749e0a3377aa8555df258af192
-
Filesize
218B
MD51cdecf4cec2a3608b3de4927e2409374
SHA1e59996e7be3897ef04ac5dfbd0a4d467bbb0f60b
SHA256fd29cfbf25fb7fd78de7000ab26935722496a1ce0bddda706581887baf7840e8
SHA5128009e2d33dfce1b17b9e17a5943ac54122c0a6cda4e0742f2e9e3371e9405eabc9ddfae9c9035eb08b5a4fc095b9f2e9017a5b11bbc4839f702c8a122c2066d6