Resubmissions
10-04-2024 02:45
240410-c88xlscb89 1010-04-2024 02:45
240410-c88a3scb88 1010-04-2024 02:45
240410-c8631scb86 1010-04-2024 02:45
240410-c86ggscb85 1014-10-2023 02:07
231014-cj7cgsba81 10Analysis
-
max time kernel
1198s -
max time network
1200s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 02:45
Behavioral task
behavioral1
Sample
I63f8affb2294c837814c33f5446924ba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
I63f8affb2294c837814c33f5446924ba.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
I63f8affb2294c837814c33f5446924ba.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
I63f8affb2294c837814c33f5446924ba.exe
Resource
win11-20240221-en
General
-
Target
I63f8affb2294c837814c33f5446924ba.exe
-
Size
89KB
-
MD5
dfb3936eb972928af9ec106505364786
-
SHA1
06a05bf8d2675ea58e44d3fdc0d9e610be021ca8
-
SHA256
2d1765fd2323db0b7a1b2a4413f793bb6b3a544ed7ba19c1b0d9c4db80747a93
-
SHA512
e71c24d1804792be45281e70e97d909817e18d0948dcaf86b3e49d22d9f085278b8d043613f1fee0468a28f9e10218ac2cce3315e4c1575f242b324f606e950f
-
SSDEEP
1536:/JVNAuC4/P1xAqm9wRC+IWMVYJGOupb1cus6SQsjhp5cNbMQaZ9bqk4gxmsuZmQ+:fN//HAqm9wRC+IWMVYJGOubXsjL5wvsD
Malware Config
Signatures
-
Detect Gurcu Stealer V3 payload 3 IoCs
resource yara_rule behavioral3/memory/1732-0-0x000001DFCA590000-0x000001DFCA5AC000-memory.dmp family_gurcu_v3 behavioral3/files/0x000b000000023181-8.dat family_gurcu_v3 behavioral3/memory/3032-77-0x0000021A7A9E0000-0x0000021A7A9F0000-memory.dmp family_gurcu_v3 -
Checks computer location settings 2 TTPs 22 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation I63f8affb2294c837814c33f5446924ba.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation I63f8affb2294c837814c33f5446924ba.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation I63f8affb2294c837814c33f5446924ba.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation I63f8affb2294c837814c33f5446924ba.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation I63f8affb2294c837814c33f5446924ba.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation I63f8affb2294c837814c33f5446924ba.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation I63f8affb2294c837814c33f5446924ba.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation I63f8affb2294c837814c33f5446924ba.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation I63f8affb2294c837814c33f5446924ba.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation I63f8affb2294c837814c33f5446924ba.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation I63f8affb2294c837814c33f5446924ba.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation I63f8affb2294c837814c33f5446924ba.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation I63f8affb2294c837814c33f5446924ba.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation I63f8affb2294c837814c33f5446924ba.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation I63f8affb2294c837814c33f5446924ba.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation I63f8affb2294c837814c33f5446924ba.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation I63f8affb2294c837814c33f5446924ba.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation I63f8affb2294c837814c33f5446924ba.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation I63f8affb2294c837814c33f5446924ba.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation I63f8affb2294c837814c33f5446924ba.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation I63f8affb2294c837814c33f5446924ba.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation I63f8affb2294c837814c33f5446924ba.exe -
Executes dropped EXE 42 IoCs
pid Process 3032 I63f8affb2294c837814c33f5446924ba.exe 3240 tor.exe 4588 I63f8affb2294c837814c33f5446924ba.exe 2152 tor.exe 4600 I63f8affb2294c837814c33f5446924ba.exe 3984 tor.exe 3880 I63f8affb2294c837814c33f5446924ba.exe 1112 tor.exe 1296 I63f8affb2294c837814c33f5446924ba.exe 592 tor.exe 4596 I63f8affb2294c837814c33f5446924ba.exe 3892 tor.exe 180 I63f8affb2294c837814c33f5446924ba.exe 548 tor.exe 5076 I63f8affb2294c837814c33f5446924ba.exe 4496 tor.exe 2380 I63f8affb2294c837814c33f5446924ba.exe 536 tor.exe 4336 I63f8affb2294c837814c33f5446924ba.exe 1480 tor.exe 4004 I63f8affb2294c837814c33f5446924ba.exe 976 tor.exe 4984 I63f8affb2294c837814c33f5446924ba.exe 2252 tor.exe 2364 I63f8affb2294c837814c33f5446924ba.exe 3092 tor.exe 2976 I63f8affb2294c837814c33f5446924ba.exe 4456 tor.exe 2252 I63f8affb2294c837814c33f5446924ba.exe 112 tor.exe 1920 I63f8affb2294c837814c33f5446924ba.exe 1416 tor.exe 3504 I63f8affb2294c837814c33f5446924ba.exe 1240 tor.exe 4556 I63f8affb2294c837814c33f5446924ba.exe 3388 tor.exe 5108 I63f8affb2294c837814c33f5446924ba.exe 3524 tor.exe 508 I63f8affb2294c837814c33f5446924ba.exe 4568 tor.exe 224 I63f8affb2294c837814c33f5446924ba.exe 2160 tor.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 63 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 17 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 163 ip-api.com 178 ip-api.com 299 ip-api.com 313 ip-api.com 117 ip-api.com 134 ip-api.com 193 ip-api.com 263 ip-api.com 102 ip-api.com 329 ip-api.com 221 ip-api.com 148 ip-api.com 206 ip-api.com 236 ip-api.com 249 ip-api.com 274 ip-api.com 15 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3992 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4720 PING.EXE -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3032 I63f8affb2294c837814c33f5446924ba.exe 3032 I63f8affb2294c837814c33f5446924ba.exe 4588 I63f8affb2294c837814c33f5446924ba.exe 4600 I63f8affb2294c837814c33f5446924ba.exe 3880 I63f8affb2294c837814c33f5446924ba.exe 1296 I63f8affb2294c837814c33f5446924ba.exe 4596 I63f8affb2294c837814c33f5446924ba.exe 180 I63f8affb2294c837814c33f5446924ba.exe 5076 I63f8affb2294c837814c33f5446924ba.exe 2380 I63f8affb2294c837814c33f5446924ba.exe 4336 I63f8affb2294c837814c33f5446924ba.exe 4004 I63f8affb2294c837814c33f5446924ba.exe 4984 I63f8affb2294c837814c33f5446924ba.exe 2364 I63f8affb2294c837814c33f5446924ba.exe 2976 I63f8affb2294c837814c33f5446924ba.exe 2252 I63f8affb2294c837814c33f5446924ba.exe 1920 I63f8affb2294c837814c33f5446924ba.exe 3504 I63f8affb2294c837814c33f5446924ba.exe 4556 I63f8affb2294c837814c33f5446924ba.exe 5108 I63f8affb2294c837814c33f5446924ba.exe 508 I63f8affb2294c837814c33f5446924ba.exe 224 I63f8affb2294c837814c33f5446924ba.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 1732 I63f8affb2294c837814c33f5446924ba.exe Token: SeDebugPrivilege 3032 I63f8affb2294c837814c33f5446924ba.exe Token: SeDebugPrivilege 4588 I63f8affb2294c837814c33f5446924ba.exe Token: SeDebugPrivilege 4600 I63f8affb2294c837814c33f5446924ba.exe Token: SeDebugPrivilege 3880 I63f8affb2294c837814c33f5446924ba.exe Token: SeDebugPrivilege 1296 I63f8affb2294c837814c33f5446924ba.exe Token: SeDebugPrivilege 4596 I63f8affb2294c837814c33f5446924ba.exe Token: SeDebugPrivilege 180 I63f8affb2294c837814c33f5446924ba.exe Token: SeDebugPrivilege 5076 I63f8affb2294c837814c33f5446924ba.exe Token: SeDebugPrivilege 2380 I63f8affb2294c837814c33f5446924ba.exe Token: SeDebugPrivilege 4336 I63f8affb2294c837814c33f5446924ba.exe Token: SeDebugPrivilege 4004 I63f8affb2294c837814c33f5446924ba.exe Token: SeDebugPrivilege 4984 I63f8affb2294c837814c33f5446924ba.exe Token: SeDebugPrivilege 2364 I63f8affb2294c837814c33f5446924ba.exe Token: SeDebugPrivilege 2976 I63f8affb2294c837814c33f5446924ba.exe Token: SeDebugPrivilege 2252 I63f8affb2294c837814c33f5446924ba.exe Token: SeDebugPrivilege 1920 I63f8affb2294c837814c33f5446924ba.exe Token: SeDebugPrivilege 3504 I63f8affb2294c837814c33f5446924ba.exe Token: SeDebugPrivilege 4556 I63f8affb2294c837814c33f5446924ba.exe Token: SeDebugPrivilege 5108 I63f8affb2294c837814c33f5446924ba.exe Token: SeDebugPrivilege 508 I63f8affb2294c837814c33f5446924ba.exe Token: SeDebugPrivilege 224 I63f8affb2294c837814c33f5446924ba.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 1732 wrote to memory of 3608 1732 I63f8affb2294c837814c33f5446924ba.exe 86 PID 1732 wrote to memory of 3608 1732 I63f8affb2294c837814c33f5446924ba.exe 86 PID 3608 wrote to memory of 3616 3608 cmd.exe 88 PID 3608 wrote to memory of 3616 3608 cmd.exe 88 PID 3608 wrote to memory of 4720 3608 cmd.exe 89 PID 3608 wrote to memory of 4720 3608 cmd.exe 89 PID 3608 wrote to memory of 3992 3608 cmd.exe 96 PID 3608 wrote to memory of 3992 3608 cmd.exe 96 PID 3608 wrote to memory of 3032 3608 cmd.exe 97 PID 3608 wrote to memory of 3032 3608 cmd.exe 97 PID 3032 wrote to memory of 4280 3032 I63f8affb2294c837814c33f5446924ba.exe 99 PID 3032 wrote to memory of 4280 3032 I63f8affb2294c837814c33f5446924ba.exe 99 PID 3032 wrote to memory of 3240 3032 I63f8affb2294c837814c33f5446924ba.exe 101 PID 3032 wrote to memory of 3240 3032 I63f8affb2294c837814c33f5446924ba.exe 101 PID 4588 wrote to memory of 2152 4588 I63f8affb2294c837814c33f5446924ba.exe 105 PID 4588 wrote to memory of 2152 4588 I63f8affb2294c837814c33f5446924ba.exe 105 PID 4600 wrote to memory of 3984 4600 I63f8affb2294c837814c33f5446924ba.exe 114 PID 4600 wrote to memory of 3984 4600 I63f8affb2294c837814c33f5446924ba.exe 114 PID 3880 wrote to memory of 1112 3880 I63f8affb2294c837814c33f5446924ba.exe 119 PID 3880 wrote to memory of 1112 3880 I63f8affb2294c837814c33f5446924ba.exe 119 PID 1296 wrote to memory of 592 1296 I63f8affb2294c837814c33f5446924ba.exe 124 PID 1296 wrote to memory of 592 1296 I63f8affb2294c837814c33f5446924ba.exe 124 PID 4596 wrote to memory of 3892 4596 I63f8affb2294c837814c33f5446924ba.exe 129 PID 4596 wrote to memory of 3892 4596 I63f8affb2294c837814c33f5446924ba.exe 129 PID 180 wrote to memory of 548 180 I63f8affb2294c837814c33f5446924ba.exe 134 PID 180 wrote to memory of 548 180 I63f8affb2294c837814c33f5446924ba.exe 134 PID 5076 wrote to memory of 4496 5076 I63f8affb2294c837814c33f5446924ba.exe 139 PID 5076 wrote to memory of 4496 5076 I63f8affb2294c837814c33f5446924ba.exe 139 PID 2380 wrote to memory of 536 2380 I63f8affb2294c837814c33f5446924ba.exe 144 PID 2380 wrote to memory of 536 2380 I63f8affb2294c837814c33f5446924ba.exe 144 PID 4336 wrote to memory of 1480 4336 I63f8affb2294c837814c33f5446924ba.exe 149 PID 4336 wrote to memory of 1480 4336 I63f8affb2294c837814c33f5446924ba.exe 149 PID 4004 wrote to memory of 976 4004 I63f8affb2294c837814c33f5446924ba.exe 154 PID 4004 wrote to memory of 976 4004 I63f8affb2294c837814c33f5446924ba.exe 154 PID 4984 wrote to memory of 2252 4984 I63f8affb2294c837814c33f5446924ba.exe 159 PID 4984 wrote to memory of 2252 4984 I63f8affb2294c837814c33f5446924ba.exe 159 PID 2364 wrote to memory of 3092 2364 I63f8affb2294c837814c33f5446924ba.exe 164 PID 2364 wrote to memory of 3092 2364 I63f8affb2294c837814c33f5446924ba.exe 164 PID 2976 wrote to memory of 4456 2976 I63f8affb2294c837814c33f5446924ba.exe 169 PID 2976 wrote to memory of 4456 2976 I63f8affb2294c837814c33f5446924ba.exe 169 PID 2252 wrote to memory of 112 2252 I63f8affb2294c837814c33f5446924ba.exe 174 PID 2252 wrote to memory of 112 2252 I63f8affb2294c837814c33f5446924ba.exe 174 PID 1920 wrote to memory of 1416 1920 I63f8affb2294c837814c33f5446924ba.exe 179 PID 1920 wrote to memory of 1416 1920 I63f8affb2294c837814c33f5446924ba.exe 179 PID 3504 wrote to memory of 1240 3504 I63f8affb2294c837814c33f5446924ba.exe 184 PID 3504 wrote to memory of 1240 3504 I63f8affb2294c837814c33f5446924ba.exe 184 PID 4556 wrote to memory of 3388 4556 I63f8affb2294c837814c33f5446924ba.exe 189 PID 4556 wrote to memory of 3388 4556 I63f8affb2294c837814c33f5446924ba.exe 189 PID 5108 wrote to memory of 3524 5108 I63f8affb2294c837814c33f5446924ba.exe 194 PID 5108 wrote to memory of 3524 5108 I63f8affb2294c837814c33f5446924ba.exe 194 PID 508 wrote to memory of 4568 508 I63f8affb2294c837814c33f5446924ba.exe 199 PID 508 wrote to memory of 4568 508 I63f8affb2294c837814c33f5446924ba.exe 199 PID 224 wrote to memory of 2160 224 I63f8affb2294c837814c33f5446924ba.exe 204 PID 224 wrote to memory of 2160 224 I63f8affb2294c837814c33f5446924ba.exe 204 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 I63f8affb2294c837814c33f5446924ba.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\I63f8affb2294c837814c33f5446924ba.exe"C:\Users\Admin\AppData\Local\Temp\I63f8affb2294c837814c33f5446924ba.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "I63f8affb2294c837814c33f5446924ba" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\I63f8affb2294c837814c33f5446924ba.exe" &&START "" "C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:3616
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:4720
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "I63f8affb2294c837814c33f5446924ba" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:3992
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe"C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\System32\tar.exe"C:\Windows\System32\tar.exe" -xvzf "C:\Users\Admin\AppData\Local\Temp\tmp4A47.tmp" -C "C:\Users\Admin\AppData\Local\jdm9hu6p1h"4⤵PID:4280
-
-
C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe"C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"4⤵
- Executes dropped EXE
PID:3240
-
-
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exeC:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe"C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"2⤵
- Executes dropped EXE
PID:2152
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exeC:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe"C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"2⤵
- Executes dropped EXE
PID:3984
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exeC:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe"C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"2⤵
- Executes dropped EXE
PID:1112
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exeC:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe"C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"2⤵
- Executes dropped EXE
PID:592
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exeC:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe"C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"2⤵
- Executes dropped EXE
PID:3892
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exeC:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:180 -
C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe"C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"2⤵
- Executes dropped EXE
PID:548
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exeC:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe"C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"2⤵
- Executes dropped EXE
PID:4496
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exeC:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe"C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"2⤵
- Executes dropped EXE
PID:536
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exeC:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe"C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"2⤵
- Executes dropped EXE
PID:1480
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exeC:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe"C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"2⤵
- Executes dropped EXE
PID:976
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exeC:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe"C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"2⤵
- Executes dropped EXE
PID:2252
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exeC:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe"C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"2⤵
- Executes dropped EXE
PID:3092
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exeC:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe"C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"2⤵
- Executes dropped EXE
PID:4456
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exeC:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe"C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"2⤵
- Executes dropped EXE
PID:112
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exeC:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe"C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"2⤵
- Executes dropped EXE
PID:1416
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exeC:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe"C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"2⤵
- Executes dropped EXE
PID:1240
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exeC:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe"C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"2⤵
- Executes dropped EXE
PID:3388
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exeC:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe"C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"2⤵
- Executes dropped EXE
PID:3524
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exeC:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe"C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"2⤵
- Executes dropped EXE
PID:4568
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exeC:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:224 -
C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe"C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"2⤵
- Executes dropped EXE
PID:2160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5dfb3936eb972928af9ec106505364786
SHA106a05bf8d2675ea58e44d3fdc0d9e610be021ca8
SHA2562d1765fd2323db0b7a1b2a4413f793bb6b3a544ed7ba19c1b0d9c4db80747a93
SHA512e71c24d1804792be45281e70e97d909817e18d0948dcaf86b3e49d22d9f085278b8d043613f1fee0468a28f9e10218ac2cce3315e4c1575f242b324f606e950f
-
Filesize
1KB
MD5fc1be6f3f52d5c841af91f8fc3f790cb
SHA1ac79b4229e0a0ce378ae22fc6104748c5f234511
SHA2566da862f7c7feffca99cd58712ece93928c6ca6aed617f5d8c10a4718eaa2a910
SHA5122f46165017309ee1a0c1b23e30a71e52e86ad8933e2649bf58c3f4628c5aa75659f5b8f6be32c2882f220b2f3ff2fd50d8766bf0a3708c94c2c634c051a05ea6
-
Filesize
354B
MD51edca53d39a925a69a308b8af7b9408f
SHA1eff3f40475c0f09e49f8a77a5b829873e30c9360
SHA25623bdc7d796e5837920659ecf92e712f8cb529ef5165471f6d56fbb9e6882a3e4
SHA512722f323df82f688a0f9e5479ecbe98880b14c7790613be7eee4c10e32120d4a6c624ea3f02e7e034cf201f4325173d2be22644a8f76760b3dded6c791136ceb7
-
Filesize
472B
MD5171d9e2a0e656c13c51cff5b32080a53
SHA10966ed9665df99628b2473b6d437097f7cac3499
SHA256f21cd1bd19ec8e1a961c89e1ae36954bacafdc5febde55fe5e7937c743398340
SHA51299d34447ef17c21e08e23c370c627af649480b81f40cb11ded83291f9c8cdd1f3908b3ef676c30e2f24fa13c410dd883a75cc1fdac891cf5122e93756c212b5b
-
Filesize
590B
MD5ed0d0818fc4628a0a3e212cf7faf99f8
SHA1341367e614cd7c5ace36f577356af68d298e7160
SHA256a5be0cfe80236d1c71b3ea04fe28539161145ee74c7c7ca226a9edadc5f95327
SHA512fe3669245a0a65b87ba3f08415aed5ddc68066d7e35f02cfc8e8e9b34ae6fff3a4425e71708d08351c06e3229a549434f820ded2b857b5023862a59bbddaeb35
-
Filesize
708B
MD54a34a9aab19553dd20b8144a6864cad8
SHA154564e79f04c90bb50170bf7bc95dc7daff141ef
SHA256efab7bc3cec897ae8634cc9ddfac31bf63357d13bcfa0c1edbdb3668c4725f26
SHA512d05fb7559985aab60818050487b3892d83be4e2e83f4b4efdfd45a0d1d853f421276dc631a80b2a4ca55fc6f090c0cd328b674a33918d6191c7a84835e69c127
-
Filesize
826B
MD5355035f4bb10ed25ef1a9e587636dfe8
SHA1a6711115bc1f7bac3efd226238b4beba2016d1e1
SHA2562318f7c8f8fad49a74bb10ebef8496ae06c652556eb333c2bb4c84506221591a
SHA512e96d969841e3a2149f20cda7928a8c90f40727cef604b2fc813eb68da558d7f009887e8125545091d85bdb24d2a04d1fb952ac259c1ea8aa9384f6b374fe0ac5
-
Filesize
944B
MD5409450aa42ee8f528757dacc96aa8d46
SHA1904eb629fcae4638dc22ac0e453dff29a1cac2c9
SHA25647512703805cc5c783f0c771e2cee6b5e7fd1b07aae60400dec1bf4b45d86ea4
SHA512f82597337dda783dd7bd710b3add93227d2cfbe712d556ab6c94833b96ef2203ff8faca9d7f91748191b3e5b9b08b35282b112e9aa490dae23e3a98724e09641
-
Filesize
1KB
MD5f9b82a56b312e26987808d593f4c1ba4
SHA1db0a0bfd5aa0ed3f325b84d8682e110c77da2ee9
SHA2563b7f54e109f153ab32ab15e0f60c24700134c2dcca30eff4c2c67ebd57ed1160
SHA512fd191f412d054256eaccfe3dcbab95c211fcf293075a99b35d61bc7b6380cc0fa43e7c0ae74070e923d3c276102bc9472562f13ffd28f91f5cfbe940044e95ec
-
Filesize
1KB
MD5ed9d50140b7d20a3863a10485d266bf1
SHA19a64a8d3a8a000df4996fd36f733a0a13c0c1c07
SHA2561d1fe6abedab4f6e63d65a694e512ff538eb78431f84072f17ad4147c722366e
SHA5128be4d3c55c8a5ddb9f714451c104222fda60c0d0058684d5d85eece548be17fc1fabf955472fdb38ff0e2e253b481de9326b61e9168c0034708484563c46c91e
-
Filesize
1KB
MD50bdd4adb5f6924fef3e1749ec7279fc8
SHA1455b5655c01dbcaf5b6e72c948befca4b5904bc4
SHA256d61cc4efa620108b74bfda882068533112c610c6fa890e64c2633decb5d0a5ca
SHA512560484d15613749be8291163682a8722639cedf5548490c795c09210408166a77bfbc3f9ece5846d3cf4253ddb369b4e8d07f38ebfa91332059379aba7f45e8a
-
Filesize
1KB
MD531df9e656d14506331f24fe91efcb480
SHA19ac3d2028c5ac274f9bfcd39633c8af24957c284
SHA256ba3ff2ffb5dfa7328b7a069c93146811b4095efcb338c85f5495d72f1c63d421
SHA5127f524b51ba562e456bae3e4a2d172e50026b8245b12d484ed4f1c51f38e53d837f3833a55278b5df860ae5a6f08f58e370b5de1f1d5faf5fc8bb2cd7ab030857
-
Filesize
1KB
MD572af265814b7119efb4350c85fbac8de
SHA1e90a849068bf4f1ec6461bd844769741f40a1cb4
SHA2566c2447ac61cefcf947815d1e3fea69da8d8c83490a0fdfe9e92220fa5959f335
SHA512e344f18a7d93b0b5b8d8fcc5449f0d02cdd4d2781e5d1ee06545c9cb51f47da92d49a3df0682ac57b0e6d29ff72dede022d210a60c7be012b89926b7b48a7045
-
Filesize
1KB
MD5f1446a6a767b68304a156bef9d864063
SHA111de9d31400da9e2288364a176bdc65fa81dfccb
SHA256e0ed6663ed0a3426d28a01bbc8fc5c8ff605675d49ecff3f4592f040092dcc97
SHA512e5f2ab57b3a24f85a0b9437757f53ec4669ac85807e7c38eea8b3bd46cc05f23934b47f2cf262acd89e5b1fe9860e6920d2db88b61f2b44ff2ad8a9ec6844c71
-
Filesize
1KB
MD5b227549341996266abedd298b84acfeb
SHA1c92ead157b959d46e0477b18e98b32f177eb5ee3
SHA256e1cc49f916f51770fe5f6ad0de4fa7a4e1a10458f31b13ecc9604a422b08b224
SHA5121bac63337459162692416002d8bee971f6ae9b60907d02adb6e6a22ef11723dc30a3ff3c722eb3c3b120fd167976335da81830f018ca3c4e0f791048d2d95481
-
Filesize
1KB
MD519f33fb2e3318e137f6b85636d023a37
SHA199d21a3da3ea689e5d27600a575484d179bdbdea
SHA256f2a37cd09519878ec8cfdc24dc249a7d832d0b2d1060e515318ea0d7aa1955c1
SHA5122291e74d5287185c7f1ca2b89e957e432ebb1ab3e1b8fcc325728280323f1486fe3ed9454b78f0d7720fcb63a7e6f23decd377f64ad176c4d8b870baa93d1434
-
Filesize
2KB
MD5992d6db1c538ce0f12d85ea2b79f3c6c
SHA190d8bbc023255bf6af562a60bd525190965d4f57
SHA256e1d891604650e92261b927b1fa483f8861c67594444ab844f693bd87c5f83e62
SHA5121b9dcfefeb6d8e9b4c33248318dc8144ac9574b7c5ec5f180d91fde068a64a4df65c883630c0512562270e6f08aa6e2accb1bd408f69aeb2561e4f887fa0d139
-
Filesize
2KB
MD54bdeccca0012ea27b6d5814c1c9fea72
SHA1770acb2ba67119bbacd8848dff1785a5a6a0e0d1
SHA256bd84ebbbad53d18bca61fba69950a43d95017027209f3128dca7dd47d103a927
SHA5122793d5abf0ba1b380d4272a8d39e488e7b4a2ff3573fdce14f062eb23313d9570d0d0cf63d6f00d221e6b215ad326d9eb927dde381671c159afe286701b3541e
-
Filesize
236B
MD5c826d75c003092ed4a9b619279222940
SHA1c438dacec17b990847190d742324c28191eb3072
SHA256a3671a1adae95f0cc697df64b11e6bee263387e9fee825a9553aca84af1e321c
SHA512b0736535912bb3c1d4b527c9cc34c83a3bb4b7bd331865f2b489a5a074cff0e5c77474a2651782157bf478eb64af348d64e8da18210bf2fd58396f8ccf5e6416
-
Filesize
13.3MB
MD589d2d5811c1aff539bb355f15f3ddad0
SHA15bb3577c25b6d323d927200c48cd184a3e27c873
SHA256b630008f6d3887793d48b87091e56691e292894dd4fa100dc4a418a2f29dcc12
SHA51239e576124c54143520c5435a2ef9b24506131e13403489c0692f09b89135015d611c4988d4772f8a1e6557fa68b4667d467334461009cee8c2227dfc3e295289
-
Filesize
2.6MB
MD58155dd4a16697830a63d507d2666b2a9
SHA1e07a54b15c905cd1d9d41db3ccde3bade36bcdb4
SHA2566b4f443629c32b632d8ad7bcb17d84da1e4eaec556dccdf98c5e9051cb404fed
SHA5120cb6c3fa12cbe7f8e63c5c73c0665fc2593109801ba318c582c4bd1c14dfd27fff3252c22b9078040e743ec788ad9534856c72ca5e38d992d9cb5aeacf819e6f
-
Filesize
7.4MB
MD5e79e7db4402c28409ed00fa21360abb9
SHA1de2215c9dfd53dfa388528c53658e8138445dc93
SHA2568d09bee36319cc8bc2efefee6372df3c0c6ded050b214a74eb0c4da518a8785c
SHA51227ce3abb20baa57b3333f115eddde05b58cc6cbcae38584334e4a1e887f83bc3c4aedf1c1741c1ff759d3fae835e9872eded492a07024baf598368bcb02b1bcd
-
Filesize
64B
MD53b5d3e66daa0e3c5f4c1227111bcd266
SHA18d783aeaaefe6b9baceb1e974e50bc84cc62231b
SHA2561e67bb967e3e9252fe7e6bf20500fd19e102ebabd4535c94b6980b37ad1595be
SHA5126bd24e490d1ac538d8cc5c27879d135add6aa3fe07717900f94f4cd75810bae3a86f1f665ff18d938cae0f204858e2e1dc3825838792806d109ea45de03e29f6
-
Filesize
4B
MD551e6d6e679953c6311757004d8cbbba9
SHA1ea9dc5ff81bb2208f87693b33672f46366a66bed
SHA2560d3fa6dd8f23a9a7db9b1e3bcb8e32fe97f51c4f519bcca616ba2e7837efebc9
SHA512b7fa7b9dd539c2a85565d0499f82158a0974a9f9c14505ce0b5e148a4dba3a211fa59fc53d70ccd21900ba81e1b27a6a83c87c82b0587f81fcd8f7123ec22c7e
-
Filesize
7.4MB
MD588590909765350c0d70c6c34b1f31dd2
SHA1129b27c3926e53e5df6d44cc6adf39c3a8d9ebf7
SHA25646fe244b548265c78ab961e8f787bc8bf21edbcaaf175fa3b8be3137c6845a82
SHA512a8af08d9169a31a1c3419d4e6e8fbe608c800d323840563b5a560d3e09e78a492201f07cc0d3864efbff8ad81e59885fc43a6b749e0a3377aa8555df258af192
-
Filesize
218B
MD5d5f4845bb1d0bc4ffef3c1679919c1fb
SHA1bcfc04abb67e0307c8a09ed0e22d327f226a9fd7
SHA256855ea402804ce79bd5ad47a45711d6b6dc42307737993dd7872647aed031f8ad
SHA512d7fc51908324f6da400d988cc5480b135cd0978e5782d98c2c3c10f2e906d8508f9315c88ae9963c1230b1e8bb9de8a549d9b9ea1646294268a64abe0e1e3dc3