Resubmissions
10-04-2024 02:25
240410-cwlljsbh99 1010-04-2024 02:25
240410-cwlasafc5v 1010-04-2024 02:25
240410-cwkn9afc5t 1010-04-2024 02:25
240410-cwkdgsfc5s 1014-10-2023 04:25
231014-e12vfagc2y 10Analysis
-
max time kernel
1198s -
max time network
1202s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2024 02:25
Behavioral task
behavioral1
Sample
Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe
Resource
win11-20240221-en
General
-
Target
Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe
-
Size
289KB
-
MD5
88cfc2ccc0575567122d1d233f9eb1c3
-
SHA1
4be67d0d801197f88c14d62f4495f17e89fc471f
-
SHA256
41505242cdbf259aada52b773daeec33d239e4aefd685ba9e406d2cf2f9871a4
-
SHA512
a2dd9ab7a2fe2a6d596c78394f65956f3e8973940229b305e2d763be69ff9f27b1450b5e08ca57cd0886a873fb663daad20ca94d9262a6c80a582dfc5f2e42b7
-
SSDEEP
6144:uHClm6SWPoK5Z0EwVSmRPQp+L5v9bbSUpi:uHCnZxb8hLLSUpi
Malware Config
Extracted
gurcu
https://api.telegram.org/bot6176004110:AAFKA5be4dMwA848HWxzYIzrzzOGIHMOJGc/sendMessage?chat_id=615133582
Signatures
-
Checks computer location settings 2 TTPs 22 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe -
Executes dropped EXE 42 IoCs
pid Process 4668 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 4056 tor.exe 4200 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 220 tor.exe 3784 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 3216 tor.exe 4680 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 1396 tor.exe 4312 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 1720 tor.exe 1056 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 876 tor.exe 2112 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 1692 tor.exe 2132 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 468 tor.exe 1860 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 1780 tor.exe 4824 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 876 tor.exe 2112 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 2092 tor.exe 1396 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 1936 tor.exe 4960 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 3492 tor.exe 4652 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 4852 tor.exe 2808 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 3624 tor.exe 4508 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 1096 tor.exe 2844 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 2920 tor.exe 2076 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 2536 tor.exe 180 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 2660 tor.exe 3752 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 2148 tor.exe 1668 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 2232 tor.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key opened \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key opened \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key opened \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key opened \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key opened \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key opened \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key opened \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Key opened \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 56 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1056 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2180 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4668 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 4948 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 4668 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 4200 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 3784 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 4680 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 4312 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 1056 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 2112 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 2132 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 1860 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 4824 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeManageVolumePrivilege 2176 svchost.exe Token: SeDebugPrivilege 2112 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 1396 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 4960 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 4652 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 2808 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 4508 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 2844 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 2076 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 180 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 3752 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe Token: SeDebugPrivilege 1668 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 4948 wrote to memory of 4756 4948 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 86 PID 4948 wrote to memory of 4756 4948 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 86 PID 4756 wrote to memory of 620 4756 cmd.exe 88 PID 4756 wrote to memory of 620 4756 cmd.exe 88 PID 4756 wrote to memory of 2180 4756 cmd.exe 89 PID 4756 wrote to memory of 2180 4756 cmd.exe 89 PID 4756 wrote to memory of 1056 4756 cmd.exe 94 PID 4756 wrote to memory of 1056 4756 cmd.exe 94 PID 4756 wrote to memory of 4668 4756 cmd.exe 95 PID 4756 wrote to memory of 4668 4756 cmd.exe 95 PID 4668 wrote to memory of 4660 4668 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 100 PID 4668 wrote to memory of 4660 4668 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 100 PID 4668 wrote to memory of 4056 4668 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 102 PID 4668 wrote to memory of 4056 4668 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 102 PID 4200 wrote to memory of 220 4200 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 108 PID 4200 wrote to memory of 220 4200 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 108 PID 3784 wrote to memory of 3216 3784 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 115 PID 3784 wrote to memory of 3216 3784 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 115 PID 4680 wrote to memory of 1396 4680 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 120 PID 4680 wrote to memory of 1396 4680 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 120 PID 4312 wrote to memory of 1720 4312 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 125 PID 4312 wrote to memory of 1720 4312 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 125 PID 1056 wrote to memory of 876 1056 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 130 PID 1056 wrote to memory of 876 1056 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 130 PID 2112 wrote to memory of 1692 2112 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 135 PID 2112 wrote to memory of 1692 2112 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 135 PID 2132 wrote to memory of 468 2132 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 140 PID 2132 wrote to memory of 468 2132 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 140 PID 1860 wrote to memory of 1780 1860 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 145 PID 1860 wrote to memory of 1780 1860 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 145 PID 4824 wrote to memory of 876 4824 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 157 PID 4824 wrote to memory of 876 4824 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 157 PID 2112 wrote to memory of 2092 2112 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 169 PID 2112 wrote to memory of 2092 2112 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 169 PID 1396 wrote to memory of 1936 1396 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 176 PID 1396 wrote to memory of 1936 1396 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 176 PID 4960 wrote to memory of 3492 4960 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 181 PID 4960 wrote to memory of 3492 4960 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 181 PID 4652 wrote to memory of 4852 4652 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 186 PID 4652 wrote to memory of 4852 4652 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 186 PID 2808 wrote to memory of 3624 2808 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 191 PID 2808 wrote to memory of 3624 2808 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 191 PID 4508 wrote to memory of 1096 4508 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 196 PID 4508 wrote to memory of 1096 4508 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 196 PID 2844 wrote to memory of 2920 2844 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 201 PID 2844 wrote to memory of 2920 2844 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 201 PID 2076 wrote to memory of 2536 2076 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 206 PID 2076 wrote to memory of 2536 2076 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 206 PID 180 wrote to memory of 2660 180 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 211 PID 180 wrote to memory of 2660 180 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 211 PID 3752 wrote to memory of 2148 3752 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 216 PID 3752 wrote to memory of 2148 3752 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 216 PID 1668 wrote to memory of 2232 1668 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 221 PID 1668 wrote to memory of 2232 1668 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe 221 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe"C:\Users\Admin\AppData\Local\Temp\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "Xd2c386a3a6edfe99de10f6ce6b3659c4809a" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe" &&START "" "C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:620
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2180
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "Xd2c386a3a6edfe99de10f6ce6b3659c4809a" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1056
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe"C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\System32\tar.exe"C:\Windows\System32\tar.exe" -xvzf "C:\Users\Admin\AppData\Local\Temp\tmp687E.tmp" -C "C:\Users\Admin\AppData\Local\xdh16uwiax"4⤵PID:4660
-
-
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"4⤵
- Executes dropped EXE
PID:4056
-
-
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:220
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:3216
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:4680 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:1396
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:1720
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:876
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:1692
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:468
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:1780
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:876
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2244
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:2092
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:1936
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:3492
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:4852
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:3624
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:1096
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:2920
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:2536
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:180 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:2660
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:2148
-
-
C:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exeC:\Users\Admin\AppData\Local\Nvidia\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe"C:\Users\Admin\AppData\Local\xdh16uwiax\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\xdh16uwiax\torrc.txt"2⤵
- Executes dropped EXE
PID:2232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Xd2c386a3a6edfe99de10f6ce6b3659c4809a.exe.log
Filesize847B
MD53308a84a40841fab7dfec198b3c31af7
SHA14e7ab6336c0538be5dd7da529c0265b3b6523083
SHA256169bc31a8d1666535977ca170d246a463e6531bb21faab6c48cb4269d9d60b2e
SHA51297521d5fb94efdc836ea2723098a1f26a7589a76af51358eee17292d29c9325baf53ad6b4496c5ca3e208d1c9b9ad6797a370e2ae378072fc68f5d6e8b73b198
-
Filesize
289KB
MD588cfc2ccc0575567122d1d233f9eb1c3
SHA14be67d0d801197f88c14d62f4495f17e89fc471f
SHA25641505242cdbf259aada52b773daeec33d239e4aefd685ba9e406d2cf2f9871a4
SHA512a2dd9ab7a2fe2a6d596c78394f65956f3e8973940229b305e2d763be69ff9f27b1450b5e08ca57cd0886a873fb663daad20ca94d9262a6c80a582dfc5f2e42b7
-
Filesize
13.3MB
MD589d2d5811c1aff539bb355f15f3ddad0
SHA15bb3577c25b6d323d927200c48cd184a3e27c873
SHA256b630008f6d3887793d48b87091e56691e292894dd4fa100dc4a418a2f29dcc12
SHA51239e576124c54143520c5435a2ef9b24506131e13403489c0692f09b89135015d611c4988d4772f8a1e6557fa68b4667d467334461009cee8c2227dfc3e295289
-
Filesize
2.7MB
MD5a0db8a87f7b723266c8b04255da46b06
SHA14df00ea56d22d88f3d2e005ef66bad5b3ef92ebf
SHA25660b43cdce0f807f7891521f396f53def34a7d98986dbde0faa2a197189c587f3
SHA51241b8fc467d11af7ca6a42c7e94d1b8295ab3ae5d6d186b4f378e6e079440520e8324b695da1134beb2bc1697d2491edcc70c1b75ab6fc66b9c1cb2ecbcdb4a7d
-
Filesize
12.5MB
MD51921bb69fd746b314a61c8dd42b6a490
SHA1b1bf93210447f509b238c67ed5302fd8e42f2735
SHA2560999688498efec4c0cecc399abc24058dc4371b7a4045dec09330173005a7f09
SHA5129e89a0fef09a3f32ea396d025fcc4003d567a66aab91fda1edcd82601f9d20704292f17ec7cd4d86825f465e0d68758777e5aed76a5e95fc8ae9442d90eb18c4
-
Filesize
64B
MD530461f47cb560738daa945031d4025fb
SHA1f26614bbec57b1b597b720126813f37fa826f6cf
SHA2563e0e7392213e61f19bbd4b0c45e9ea615cbcb34160268979ce42597ca01ac0bd
SHA51229e386205bb4069777dfe42e6f75885d39a4abfeca50cecb2d965e893dabca0f1e0d0ede929ae08d3d78807e3e4cca042caa9fc17bfd5425dc639f46108a80b4
-
Filesize
4B
MD5f8037f94e53f17a2cc301033ca86d278
SHA1c477daaf6618c98efb953d559c9efa6c015f58a6
SHA2565b23e77bcbfd48044a8bd56f7689fc325f309690072fe25a5dfe11af0062a130
SHA512633d2e8f4a275ad7aec9282c5ca4e2122d4396fb1868f21147a2864da90661ca3cad33b421cdc6acba20584c401540416fbb3a7cfd52d07d399af191bdc24941
-
Filesize
7.4MB
MD588590909765350c0d70c6c34b1f31dd2
SHA1129b27c3926e53e5df6d44cc6adf39c3a8d9ebf7
SHA25646fe244b548265c78ab961e8f787bc8bf21edbcaaf175fa3b8be3137c6845a82
SHA512a8af08d9169a31a1c3419d4e6e8fbe608c800d323840563b5a560d3e09e78a492201f07cc0d3864efbff8ad81e59885fc43a6b749e0a3377aa8555df258af192
-
Filesize
218B
MD51ad8b1c407f4a62d1b82db1bf61640ab
SHA18ed511fff4742b4a99f8a668fd66580fa35e4d42
SHA25649f95974c7ef34f5a2e12f822b96d4e407b9f3def610cb946115f9bb329066f7
SHA512ff2afcb7eeb9c5b953dc7031a3a89a24a271c5ebe97a0ee211eeebe4a370e4d4e1e1683903a363804458aebecfb898c5794a1223cffc3a1b863493204c173efc