Resubmissions
10-04-2024 02:29
240410-cy22baca54 1010-04-2024 02:29
240410-cy2esafc8z 1010-04-2024 02:29
240410-cy1s9aca52 1010-04-2024 02:29
240410-cy1hgsfc8x 1014-10-2023 01:29
231014-bwm9pshg4t 10Analysis
-
max time kernel
597s -
max time network
606s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-04-2024 02:29
Behavioral task
behavioral1
Sample
D5f0a5d17c7420fe49da676.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
D5f0a5d17c7420fe49da676.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
D5f0a5d17c7420fe49da676.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
D5f0a5d17c7420fe49da676.exe
Resource
win11-20240221-en
General
-
Target
D5f0a5d17c7420fe49da676.exe
-
Size
250KB
-
MD5
24a8408510d9b173b9dc078574261d28
-
SHA1
2ecfc788687aadbd9cc42ea311210f7cde5fa064
-
SHA256
67474d56996cadf242c087aeac455357bd33e79545538eeade15ae259fb3e869
-
SHA512
de51ce9f9df68a688e7a8092aa70210ba07a9d7738ea731e2e8a7e724b3fc73cd77e83f63d675f6a1def373b437af533e1fdc688ddf1bfb94477277a8e74a5a9
-
SSDEEP
6144:PY6+lYxyWoekN4B2We2TxT8jWHgf8YJkVHC++VeQPBZnq0LZYSwFxQx9tjQ9bMXq:PxpmWHgf8Y6/Qp1nLiDKhFX
Malware Config
Signatures
-
Detect Gurcu Stealer V3 payload 2 IoCs
resource yara_rule behavioral4/memory/1944-0-0x0000023851030000-0x0000023851074000-memory.dmp family_gurcu_v3 behavioral4/files/0x000500000002a779-8.dat family_gurcu_v3 -
Executes dropped EXE 22 IoCs
pid Process 4940 D5f0a5d17c7420fe49da676.exe 3716 tor.exe 2040 D5f0a5d17c7420fe49da676.exe 3684 tor.exe 1944 D5f0a5d17c7420fe49da676.exe 244 tor.exe 4716 D5f0a5d17c7420fe49da676.exe 2800 tor.exe 2916 D5f0a5d17c7420fe49da676.exe 2500 tor.exe 1844 D5f0a5d17c7420fe49da676.exe 2076 tor.exe 3484 D5f0a5d17c7420fe49da676.exe 1080 tor.exe 2492 D5f0a5d17c7420fe49da676.exe 1940 tor.exe 2268 D5f0a5d17c7420fe49da676.exe 1096 tor.exe 4884 D5f0a5d17c7420fe49da676.exe 5008 tor.exe 1444 D5f0a5d17c7420fe49da676.exe 920 tor.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 33 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1476 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2716 PING.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4940 D5f0a5d17c7420fe49da676.exe 4940 D5f0a5d17c7420fe49da676.exe 2040 D5f0a5d17c7420fe49da676.exe 1944 D5f0a5d17c7420fe49da676.exe 4716 D5f0a5d17c7420fe49da676.exe 2916 D5f0a5d17c7420fe49da676.exe 1844 D5f0a5d17c7420fe49da676.exe 3484 D5f0a5d17c7420fe49da676.exe 2492 D5f0a5d17c7420fe49da676.exe 2268 D5f0a5d17c7420fe49da676.exe 4884 D5f0a5d17c7420fe49da676.exe 1444 D5f0a5d17c7420fe49da676.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 1944 D5f0a5d17c7420fe49da676.exe Token: SeDebugPrivilege 4940 D5f0a5d17c7420fe49da676.exe Token: SeDebugPrivilege 2040 D5f0a5d17c7420fe49da676.exe Token: SeDebugPrivilege 1944 D5f0a5d17c7420fe49da676.exe Token: SeDebugPrivilege 4716 D5f0a5d17c7420fe49da676.exe Token: SeDebugPrivilege 2916 D5f0a5d17c7420fe49da676.exe Token: SeDebugPrivilege 1844 D5f0a5d17c7420fe49da676.exe Token: SeDebugPrivilege 3484 D5f0a5d17c7420fe49da676.exe Token: SeDebugPrivilege 2492 D5f0a5d17c7420fe49da676.exe Token: SeDebugPrivilege 2268 D5f0a5d17c7420fe49da676.exe Token: SeDebugPrivilege 4884 D5f0a5d17c7420fe49da676.exe Token: SeDebugPrivilege 1444 D5f0a5d17c7420fe49da676.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1632 1944 D5f0a5d17c7420fe49da676.exe 81 PID 1944 wrote to memory of 1632 1944 D5f0a5d17c7420fe49da676.exe 81 PID 1632 wrote to memory of 3412 1632 cmd.exe 83 PID 1632 wrote to memory of 3412 1632 cmd.exe 83 PID 1632 wrote to memory of 2716 1632 cmd.exe 84 PID 1632 wrote to memory of 2716 1632 cmd.exe 84 PID 1632 wrote to memory of 1476 1632 cmd.exe 85 PID 1632 wrote to memory of 1476 1632 cmd.exe 85 PID 1632 wrote to memory of 4940 1632 cmd.exe 86 PID 1632 wrote to memory of 4940 1632 cmd.exe 86 PID 4940 wrote to memory of 2924 4940 D5f0a5d17c7420fe49da676.exe 87 PID 4940 wrote to memory of 2924 4940 D5f0a5d17c7420fe49da676.exe 87 PID 4940 wrote to memory of 3716 4940 D5f0a5d17c7420fe49da676.exe 89 PID 4940 wrote to memory of 3716 4940 D5f0a5d17c7420fe49da676.exe 89 PID 2040 wrote to memory of 3684 2040 D5f0a5d17c7420fe49da676.exe 92 PID 2040 wrote to memory of 3684 2040 D5f0a5d17c7420fe49da676.exe 92 PID 1944 wrote to memory of 244 1944 D5f0a5d17c7420fe49da676.exe 98 PID 1944 wrote to memory of 244 1944 D5f0a5d17c7420fe49da676.exe 98 PID 4716 wrote to memory of 2800 4716 D5f0a5d17c7420fe49da676.exe 103 PID 4716 wrote to memory of 2800 4716 D5f0a5d17c7420fe49da676.exe 103 PID 2916 wrote to memory of 2500 2916 D5f0a5d17c7420fe49da676.exe 108 PID 2916 wrote to memory of 2500 2916 D5f0a5d17c7420fe49da676.exe 108 PID 1844 wrote to memory of 2076 1844 D5f0a5d17c7420fe49da676.exe 113 PID 1844 wrote to memory of 2076 1844 D5f0a5d17c7420fe49da676.exe 113 PID 3484 wrote to memory of 1080 3484 D5f0a5d17c7420fe49da676.exe 118 PID 3484 wrote to memory of 1080 3484 D5f0a5d17c7420fe49da676.exe 118 PID 2492 wrote to memory of 1940 2492 D5f0a5d17c7420fe49da676.exe 123 PID 2492 wrote to memory of 1940 2492 D5f0a5d17c7420fe49da676.exe 123 PID 2268 wrote to memory of 1096 2268 D5f0a5d17c7420fe49da676.exe 128 PID 2268 wrote to memory of 1096 2268 D5f0a5d17c7420fe49da676.exe 128 PID 4884 wrote to memory of 5008 4884 D5f0a5d17c7420fe49da676.exe 133 PID 4884 wrote to memory of 5008 4884 D5f0a5d17c7420fe49da676.exe 133 PID 1444 wrote to memory of 920 1444 D5f0a5d17c7420fe49da676.exe 138 PID 1444 wrote to memory of 920 1444 D5f0a5d17c7420fe49da676.exe 138 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3852399462-405385529-394778097-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 D5f0a5d17c7420fe49da676.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\D5f0a5d17c7420fe49da676.exe"C:\Users\Admin\AppData\Local\Temp\D5f0a5d17c7420fe49da676.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "D5f0a5d17c7420fe49da676" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\D5f0a5d17c7420fe49da676.exe" &&START "" "C:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:3412
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2716
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "D5f0a5d17c7420fe49da676" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1476
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exe"C:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\System32\tar.exe"C:\Windows\System32\tar.exe" -xvzf "C:\Users\Admin\AppData\Local\Temp\tmpDBF8.tmp" -C "C:\Users\Admin\AppData\Local\6rfb5r0uff"4⤵PID:2924
-
-
C:\Users\Admin\AppData\Local\6rfb5r0uff\tor\tor.exe"C:\Users\Admin\AppData\Local\6rfb5r0uff\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\6rfb5r0uff\torrc.txt"4⤵
- Executes dropped EXE
PID:3716
-
-
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exeC:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exe1⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\6rfb5r0uff\tor\tor.exe"C:\Users\Admin\AppData\Local\6rfb5r0uff\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\6rfb5r0uff\torrc.txt"2⤵
- Executes dropped EXE
PID:3684
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exeC:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exe1⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\6rfb5r0uff\tor\tor.exe"C:\Users\Admin\AppData\Local\6rfb5r0uff\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\6rfb5r0uff\torrc.txt"2⤵
- Executes dropped EXE
PID:244
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exeC:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exe1⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\6rfb5r0uff\tor\tor.exe"C:\Users\Admin\AppData\Local\6rfb5r0uff\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\6rfb5r0uff\torrc.txt"2⤵
- Executes dropped EXE
PID:2800
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exeC:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exe1⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\6rfb5r0uff\tor\tor.exe"C:\Users\Admin\AppData\Local\6rfb5r0uff\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\6rfb5r0uff\torrc.txt"2⤵
- Executes dropped EXE
PID:2500
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exeC:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exe1⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\6rfb5r0uff\tor\tor.exe"C:\Users\Admin\AppData\Local\6rfb5r0uff\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\6rfb5r0uff\torrc.txt"2⤵
- Executes dropped EXE
PID:2076
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exeC:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exe1⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\6rfb5r0uff\tor\tor.exe"C:\Users\Admin\AppData\Local\6rfb5r0uff\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\6rfb5r0uff\torrc.txt"2⤵
- Executes dropped EXE
PID:1080
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exeC:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exe1⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\6rfb5r0uff\tor\tor.exe"C:\Users\Admin\AppData\Local\6rfb5r0uff\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\6rfb5r0uff\torrc.txt"2⤵
- Executes dropped EXE
PID:1940
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exeC:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exe1⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\6rfb5r0uff\tor\tor.exe"C:\Users\Admin\AppData\Local\6rfb5r0uff\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\6rfb5r0uff\torrc.txt"2⤵
- Executes dropped EXE
PID:1096
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exeC:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exe1⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\6rfb5r0uff\tor\tor.exe"C:\Users\Admin\AppData\Local\6rfb5r0uff\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\6rfb5r0uff\torrc.txt"2⤵
- Executes dropped EXE
PID:5008
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exeC:\Users\Admin\AppData\Local\EsetSecurity\D5f0a5d17c7420fe49da676.exe1⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1444 -
C:\Users\Admin\AppData\Local\6rfb5r0uff\tor\tor.exe"C:\Users\Admin\AppData\Local\6rfb5r0uff\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\6rfb5r0uff\torrc.txt"2⤵
- Executes dropped EXE
PID:920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5a27e7c5a4eb197d5f06ccb85ce3254d2
SHA126548f416e9d4400d62e6e423b0e71c5be65f503
SHA256b7b8f22e85454219f49351ff099c710fb55399482a807305a1e141bf4dda9bec
SHA5126d5fa34049f8a2cac7a6e0aec48fc1f1528711bfde4484e795cf8ffc3b2536bb9843bf8e91471b21ec3a402b88610da1ea8879898fcc567dca4f456d96b82bd6
-
Filesize
2.7MB
MD5a0db8a87f7b723266c8b04255da46b06
SHA14df00ea56d22d88f3d2e005ef66bad5b3ef92ebf
SHA25660b43cdce0f807f7891521f396f53def34a7d98986dbde0faa2a197189c587f3
SHA51241b8fc467d11af7ca6a42c7e94d1b8295ab3ae5d6d186b4f378e6e079440520e8324b695da1134beb2bc1697d2491edcc70c1b75ab6fc66b9c1cb2ecbcdb4a7d
-
Filesize
7.2MB
MD5701c6dd3f36bd875e591c05ab041acb1
SHA1831ffd3d92c84fbe6c5f155fae9a7ae85580e2a4
SHA2565c3939773a0c805ed01c6f2f62f6565b00f4ca6bacc0ef552ff08c0bb407a51a
SHA512304456289213af6cfdac24988d3719cd6f0eb6579e0bf708cb803ffc914e00f8ea4dd43961b56e6bc778bc799ce8138dcbe1760e10a6b246cf5f1960c0c6b11c
-
Filesize
64B
MD54c76827d74093ed5eaae36aa1794503f
SHA1ba8128c765b46c64b65eb021af3ef59c123048e2
SHA256fad9db443da85496e1316d91aa5420aed7acc2bd4afcae4346c0e2f5ebfc8441
SHA512699ec84f7b2b0d2ac0e99cf1e8fd83d6b92f18abfda30f9fb3174bf2acd8339b1c5f3eddda11b37404f49a30f5b90351202d3feab51b15b61f7b5806f2ebd987
-
Filesize
4B
MD515c00b5250ddedaabc203b67f8b034fd
SHA1061d1f16dce2807d49a9ffdbb6c7e1df77163f66
SHA256fb6a65a234fbbd604fff0aa54a3604ff44cfa683de13046d86a6fa2c7757067e
SHA5123767c9a57ea88848f4dfa3960ee9af7d8da6dad1c92851e373c0a04722736edc5638f54c2e9df47187348a8a11a651f445aa8942f340759497d949c586e082a7
-
Filesize
7.4MB
MD588590909765350c0d70c6c34b1f31dd2
SHA1129b27c3926e53e5df6d44cc6adf39c3a8d9ebf7
SHA25646fe244b548265c78ab961e8f787bc8bf21edbcaaf175fa3b8be3137c6845a82
SHA512a8af08d9169a31a1c3419d4e6e8fbe608c800d323840563b5a560d3e09e78a492201f07cc0d3864efbff8ad81e59885fc43a6b749e0a3377aa8555df258af192
-
Filesize
218B
MD5bcc1a3e0bc2390d8f0e75f7c9fbd9b39
SHA131699886a7f4c5c8193726bb7833597124471c5a
SHA2568b2f970e131d8d4e8d622d72e4257f620083b4b4672039903505cf6730b9b132
SHA512b2b464bd50507a42e48b2f7f6956c79197dd2ac29092a0715876f855ca5074c7288b52d1535f39c5a5ff38e8e53957a213860c451adacd6678b3de2811fcc101
-
Filesize
250KB
MD524a8408510d9b173b9dc078574261d28
SHA12ecfc788687aadbd9cc42ea311210f7cde5fa064
SHA25667474d56996cadf242c087aeac455357bd33e79545538eeade15ae259fb3e869
SHA512de51ce9f9df68a688e7a8092aa70210ba07a9d7738ea731e2e8a7e724b3fc73cd77e83f63d675f6a1def373b437af533e1fdc688ddf1bfb94477277a8e74a5a9
-
Filesize
1KB
MD5081b644082c51f2ff0f00087877003b5
SHA12eeb0a8a592e5327873f5a6704031c1ff6d0bd31
SHA256cc427c714517dd0a3c96354869ce1bb300bf4935006fc628ceb28e2f040197ac
SHA51295621587e55a5f5111aea05cadbaf56429adde2de0c41c9de8e74c03d31116edf72b63d76f65af45e4b14b68fe214926425581f77113d332eb91b0b6a5598eff
-
Filesize
354B
MD54f507af751ae42ea1a8992b5a913a4c6
SHA1df0bdd8bfbc22317d4e266917008d01a81306836
SHA256e659c34bb2dfa60e086f3e860273c50811f2538abb47429313a3eea15132d9c3
SHA5126d037151bb5bd2e2a68d29aa1ab7843430b082ce2d25846beef6c728c5190f75ae752998b865cbec61fe6439828b6b09eb81622c8eaad1140d7b3118c685dabe
-
Filesize
472B
MD5b5c488c9154387d8f17b4f61213e7fc4
SHA1f0e4ebce62de6171fed2d5023b68852493d4e3ac
SHA256c736978ba5416a6824a574088452ade8f1608665b8313c860a7e42f1a8ee52e5
SHA5121d76a864d30ace72974010c13f8130c1d2d4d79015c5d0312b23df11b9b2f367bda5563ff83d76e7c092cc3143c3a7c7a03137ed2623808ac3b321b2a1a41a32
-
Filesize
590B
MD59b30f77b24a56507b0708e3dabb68cf9
SHA1b833a2e17df2abb80bb39fab670159060e96b591
SHA256cbb47c848358b44d1102911f5ca3b23c10d0d04b10e2a37ccd92307e1be5e492
SHA512e92cb4eb47c834f0dcfa8d1150a3382fa0c33674adfe13cb90e615e3b4a6faa4d6cf47d77767d0608f5e390c7307bb238c40b9e2ef795efcbe083024e78e900d
-
Filesize
708B
MD5bfc8f136c6611b7819c0d84ad02f9a0b
SHA16b445808e2d94e81d011461f5ee1b64e13292f1d
SHA2560723eefee0178bc841273c090d60c62c8ca9aca33a5ddd057e62b89a0847f3dd
SHA51216f4d93fc4fa6c0ca99c779439704ac5a9009a6b29ca001c8f4da8db9f5f233be3f5dc3106ac4a2a1cdc4dc5f9e592060facc436fc8bde3525051a22ea7e6b62
-
Filesize
826B
MD51b7636ad0156d0272ed1e758833b68af
SHA1a34258dc569dd6349cf38adc08d2ea965f95b2d2
SHA256fce002099a6f4c7d80c677e8e962e3993b9fa787200fcf29c0c15537f4c4455b
SHA512b70f244f266c2c17697f4d80f84a7f89d0baa5ef06f7ad21470546da994d48c0f6b6e305e54fd9e43f44f24505e0c15a582c7113282add5d15de29bcbe76c854
-
Filesize
944B
MD5e6248f2308dce3abf39b35887a5f9b41
SHA14e0b28c182aed0bdd9a6430dcc5aa2f74ddc1168
SHA256f4fa53d61ce2b30090294982a10b4d1eba24c9a2d29ce09c7de3a231f0044639
SHA5123dc180bd74670716c25299bf217206665264fc523cc186863e9f4f694869c9d6f909f62b62693c656e82d10eac6f96d7ccd863c11d5767d8a0f05f3e715a1738
-
Filesize
1KB
MD5c1e388bdf4aed47da5f421476d39f7b6
SHA114626ab4ef8d63cb168e33ab5c0e530284c53941
SHA256cf02f9b4f0eade20fdd38e6a56d5f90415152b6f5881f0baceb0d4ba3fa72683
SHA5125b0080c6013b43ea43e411fba17bba7e015ddfcbcfb726fd77de5da36b3f377ed01af07d9464896537653939ccf4238d56639f74da5d469fe6243bb20a262bc4
-
Filesize
1KB
MD5115db09cad6440a9a887a9cb3e7d2068
SHA1c30420d0d985cdb265e643247b1ef1ae9c9b15c1
SHA256a4e482c0f500b4bb69fe7432029a081135fe3f2973ca1c7bbe5f322bdfa61761
SHA5126f6240a8e8447039d1e7b19e7bd7f6c06d6c7e00485bdd3b173a1e78598602d326299081d5fbbb59b0a9b7ac948e209eb597308f65cbc94eb00adc85e7c0aaf0
-
Filesize
118B
MD5507c4172db0c763f914e42b0c86d2694
SHA130c0bfab54808ffda9753364e73bd0f20e0ab437
SHA2565e3c38b7b96f70af3d8f37a9d480482318b3955e1808a4250d877c0eebe3a9c0
SHA512652310fec6cbed486e13104f004f8ecde012c86d250d1f37f2e1c4ecebd7d6c2b39c8a904f02e54cfc0516481e7787df6a2240ea4a7559cf683a6eb2babee192
-
Filesize
13.3MB
MD589d2d5811c1aff539bb355f15f3ddad0
SHA15bb3577c25b6d323d927200c48cd184a3e27c873
SHA256b630008f6d3887793d48b87091e56691e292894dd4fa100dc4a418a2f29dcc12
SHA51239e576124c54143520c5435a2ef9b24506131e13403489c0692f09b89135015d611c4988d4772f8a1e6557fa68b4667d467334461009cee8c2227dfc3e295289