Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
10/04/2024, 02:55
240410-dektcsff5x 1010/04/2024, 02:54
240410-dd6z7scc89 1010/04/2024, 02:54
240410-dd6pfacc88 1010/04/2024, 02:54
240410-dd53xacc87 1009/09/2023, 16:01
230909-tgqqdscd3z 7Analysis
-
max time kernel
593s -
max time network
601s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/04/2024, 02:54
Behavioral task
behavioral1
Sample
dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe
Resource
win10v2004-20240226-en
General
-
Target
dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe
-
Size
203KB
-
MD5
661cdb95fe5810f365ddb936ea8f3432
-
SHA1
6210c0691ee20e61dc9a9da1a371d561cd850774
-
SHA256
dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236a
-
SHA512
aa25009dfbddfb300c14ab65c9eeb68aa785a54d40fa28a684275b9f506cc6fd337842cf42c54bcff79018241c9a0ac606ad4ebf614a2a355aed7e6dbe70c41d
-
SSDEEP
6144:8N0J0dLFzW/wKWsBGKqkv07bKXZSgsBuQdwLhXC1:8NDpzGAsgL+ZSwQdwLhXC1
Malware Config
Signatures
-
Detect Gurcu Stealer V3 payload 2 IoCs
resource yara_rule behavioral4/memory/3284-0-0x00000201D0850000-0x00000201D0888000-memory.dmp family_gurcu_v3 behavioral4/files/0x000500000002a72a-8.dat family_gurcu_v3 -
Detect ZGRat V1 2 IoCs
resource yara_rule behavioral4/memory/3284-0-0x00000201D0850000-0x00000201D0888000-memory.dmp family_zgrat_v1 behavioral4/files/0x000500000002a72a-8.dat family_zgrat_v1 -
Executes dropped EXE 22 IoCs
pid Process 4968 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 4700 tor.exe 5012 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 4860 tor.exe 3096 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 4032 tor.exe 3516 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 2020 tor.exe 5016 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 948 tor.exe 3280 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 3204 tor.exe 2604 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 3284 tor.exe 248 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 1512 tor.exe 2936 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 3772 tor.exe 4984 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 1924 tor.exe 3012 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 3092 tor.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe Key opened \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe Key opened \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe Key opened \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe Key opened \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe Key opened \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3788 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3956 PING.EXE -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 4968 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 4968 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 5012 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 4968 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 3096 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 3516 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 5016 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 3280 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 2604 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 248 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 2936 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 4984 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 3012 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 3284 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe Token: SeDebugPrivilege 4968 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe Token: SeDebugPrivilege 5012 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe Token: SeDebugPrivilege 3096 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe Token: SeDebugPrivilege 3516 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe Token: SeDebugPrivilege 5016 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe Token: SeDebugPrivilege 3280 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe Token: SeDebugPrivilege 2604 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe Token: SeDebugPrivilege 248 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe Token: SeDebugPrivilege 2936 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe Token: SeDebugPrivilege 4984 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe Token: SeDebugPrivilege 3012 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4968 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 3284 wrote to memory of 3252 3284 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 76 PID 3284 wrote to memory of 3252 3284 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 76 PID 3252 wrote to memory of 3508 3252 cmd.exe 78 PID 3252 wrote to memory of 3508 3252 cmd.exe 78 PID 3252 wrote to memory of 3956 3252 cmd.exe 79 PID 3252 wrote to memory of 3956 3252 cmd.exe 79 PID 3252 wrote to memory of 3788 3252 cmd.exe 80 PID 3252 wrote to memory of 3788 3252 cmd.exe 80 PID 3252 wrote to memory of 4968 3252 cmd.exe 81 PID 3252 wrote to memory of 4968 3252 cmd.exe 81 PID 4968 wrote to memory of 4656 4968 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 83 PID 4968 wrote to memory of 4656 4968 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 83 PID 4968 wrote to memory of 4700 4968 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 85 PID 4968 wrote to memory of 4700 4968 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 85 PID 5012 wrote to memory of 4860 5012 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 88 PID 5012 wrote to memory of 4860 5012 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 88 PID 3096 wrote to memory of 4032 3096 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 97 PID 3096 wrote to memory of 4032 3096 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 97 PID 3516 wrote to memory of 2020 3516 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 103 PID 3516 wrote to memory of 2020 3516 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 103 PID 5016 wrote to memory of 948 5016 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 108 PID 5016 wrote to memory of 948 5016 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 108 PID 3280 wrote to memory of 3204 3280 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 113 PID 3280 wrote to memory of 3204 3280 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 113 PID 2604 wrote to memory of 3284 2604 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 117 PID 2604 wrote to memory of 3284 2604 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 117 PID 248 wrote to memory of 1512 248 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 122 PID 248 wrote to memory of 1512 248 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 122 PID 2936 wrote to memory of 3772 2936 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 128 PID 2936 wrote to memory of 3772 2936 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 128 PID 4984 wrote to memory of 1924 4984 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 132 PID 4984 wrote to memory of 1924 4984 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 132 PID 3012 wrote to memory of 3092 3012 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 137 PID 3012 wrote to memory of 3092 3012 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe 137 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe" &&START "" "C:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:3508
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:3956
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:3788
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe"C:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\System32\tar.exe"C:\Windows\System32\tar.exe" -xvzf "C:\Users\Admin\AppData\Local\Temp\tmp630F.tmp" -C "C:\Users\Admin\AppData\Local\9krryil1hy"4⤵PID:4656
-
-
C:\Users\Admin\AppData\Local\9krryil1hy\tor\tor.exe"C:\Users\Admin\AppData\Local\9krryil1hy\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\9krryil1hy\torrc.txt"4⤵
- Executes dropped EXE
PID:4700
-
-
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exeC:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe1⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:5012 -
C:\Users\Admin\AppData\Local\9krryil1hy\tor\tor.exe"C:\Users\Admin\AppData\Local\9krryil1hy\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\9krryil1hy\torrc.txt"2⤵
- Executes dropped EXE
PID:4860
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exeC:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\9krryil1hy\tor\tor.exe"C:\Users\Admin\AppData\Local\9krryil1hy\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\9krryil1hy\torrc.txt"2⤵
- Executes dropped EXE
PID:4032
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exeC:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\9krryil1hy\tor\tor.exe"C:\Users\Admin\AppData\Local\9krryil1hy\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\9krryil1hy\torrc.txt"2⤵
- Executes dropped EXE
PID:2020
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exeC:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\9krryil1hy\tor\tor.exe"C:\Users\Admin\AppData\Local\9krryil1hy\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\9krryil1hy\torrc.txt"2⤵
- Executes dropped EXE
PID:948
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exeC:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\9krryil1hy\tor\tor.exe"C:\Users\Admin\AppData\Local\9krryil1hy\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\9krryil1hy\torrc.txt"2⤵
- Executes dropped EXE
PID:3204
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exeC:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\9krryil1hy\tor\tor.exe"C:\Users\Admin\AppData\Local\9krryil1hy\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\9krryil1hy\torrc.txt"2⤵
- Executes dropped EXE
PID:3284
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exeC:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:248 -
C:\Users\Admin\AppData\Local\9krryil1hy\tor\tor.exe"C:\Users\Admin\AppData\Local\9krryil1hy\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\9krryil1hy\torrc.txt"2⤵
- Executes dropped EXE
PID:1512
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exeC:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\9krryil1hy\tor\tor.exe"C:\Users\Admin\AppData\Local\9krryil1hy\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\9krryil1hy\torrc.txt"2⤵
- Executes dropped EXE
PID:3772
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exeC:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\9krryil1hy\tor\tor.exe"C:\Users\Admin\AppData\Local\9krryil1hy\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\9krryil1hy\torrc.txt"2⤵
- Executes dropped EXE
PID:1924
-
-
C:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exeC:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\9krryil1hy\tor\tor.exe"C:\Users\Admin\AppData\Local\9krryil1hy\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\9krryil1hy\torrc.txt"2⤵
- Executes dropped EXE
PID:3092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD58155dd4a16697830a63d507d2666b2a9
SHA1e07a54b15c905cd1d9d41db3ccde3bade36bcdb4
SHA2566b4f443629c32b632d8ad7bcb17d84da1e4eaec556dccdf98c5e9051cb404fed
SHA5120cb6c3fa12cbe7f8e63c5c73c0665fc2593109801ba318c582c4bd1c14dfd27fff3252c22b9078040e743ec788ad9534856c72ca5e38d992d9cb5aeacf819e6f
-
Filesize
9.8MB
MD5e45ff26f09e4a0829f2c1e23c311cb87
SHA174f547b823ee4ae8602a6022c3391435f4251475
SHA2566c5cabcf52c1b5faba752b23bb9b59ecdaac4e9a479f0589d236bc9dad1830b0
SHA5124036bc2a68914adfc142523b99cb394c845bf9ae814ecdc1d31896e9b26460ffd8ff9fd41fdda59e585b01f71d23ccf4823f21723f0c4342e956bdb15e7c4c37
-
Filesize
64B
MD5a3b08ad2665e2e83686e92144b7721f6
SHA1769505abfc9eb1d78ec3de69bbcd5bbbc1dc59d7
SHA256505be87f582f8ca1b3d814868f4e8189673f5a8417cd2e81ca5970765698e096
SHA5126a654e8f45f9c8904de0ef9b63b80a5145752b4d51bfff01fe2b33f10cadfdb610f641421b9103bee36235cdb5f14c24c05dec967d284e63abbc9bba69a52f01
-
Filesize
4B
MD5adf7ee2dcf142b0e11888e72b43fcb75
SHA10f40fc31d9210a24343e9b4d130beec07ea69211
SHA256c223f7635964b0b61bbf64729e3c54688e0eba892358e6dd610385bfd6df6eec
SHA5120194df8bf26357763f1d0672014eea653fdd05051cf6534091b0ea73555ba99f30765631914fde95787a3518f10bf65fdecc13733ef4ae30a661f29eee238feb
-
Filesize
7.4MB
MD588590909765350c0d70c6c34b1f31dd2
SHA1129b27c3926e53e5df6d44cc6adf39c3a8d9ebf7
SHA25646fe244b548265c78ab961e8f787bc8bf21edbcaaf175fa3b8be3137c6845a82
SHA512a8af08d9169a31a1c3419d4e6e8fbe608c800d323840563b5a560d3e09e78a492201f07cc0d3864efbff8ad81e59885fc43a6b749e0a3377aa8555df258af192
-
Filesize
218B
MD55120b3634dd9e3fddf290c9f521f18e1
SHA1d95a0713936ea10a4e08cff21dd9cc90fa52f368
SHA256425a9bedf0cba3e3eab96ab634dea79636936fee8c89361f0a16e211822b6b21
SHA5123ef4ce85a37dee72bf21bb38a7d6da44a184924bc6bcb8015c8bac2ccfc20a9a2644c521e0ee4ef3797c0ba03172eab760c723f4a65ddf91effcbc70e70378ce
-
C:\Users\Admin\AppData\Local\EsetSecurity\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe
Filesize203KB
MD5661cdb95fe5810f365ddb936ea8f3432
SHA16210c0691ee20e61dc9a9da1a371d561cd850774
SHA256dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236a
SHA512aa25009dfbddfb300c14ab65c9eeb68aa785a54d40fa28a684275b9f506cc6fd337842cf42c54bcff79018241c9a0ac606ad4ebf614a2a355aed7e6dbe70c41d
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\dba803bf0917907fad2aa9163b78a20ba8ba2b9a79cf105dede3a5acd821236aexe_JC.exe.log
Filesize847B
MD5486ebddc86ea8b3e965d390d22283a23
SHA1eaffc047f067084867e8575c576a9ec60e094ba8
SHA25650a57273ecb794e53b0622eb841341e2643c11f53fa47356e6e754ab2268171d
SHA5120a50ba02250b38355a6f4fb94e40c61258a74031d9aea7cdf675f3e068f39ec0748ecf292aaf2f94b1963b9d66516ee79aa6c552617048e248774af0ff07189d
-
Filesize
218B
MD55007e7bba67f0afd22d284cf733269ea
SHA19760c7faf862e9f58ae2fcb6abff9c4049ac8027
SHA2564b697afbe3d9eac26b51f9afda6034887bc4edaa99fc4bdbde6ea8d1d3c77fd9
SHA512740fa42774e14ee741e1e71ccf8fbeaa15a1fd216e4e164c47dd531c1ff09727a8338b83563be6874b050b77bdcd7f4ea7f11361b91615d2046679c83b61dc88
-
Filesize
271B
MD54f04660aa6a2af7f624219dc7a22b93c
SHA19b3865f94aa7a4112fbe2e9691621b16f7873fa6
SHA25645dac4896582012248ac151804ab3f4902c32242350c4eadc236aa41fa667857
SHA512d63f962e9e649ed71f7c15d0a69f400b61f076c7e8b46915d83a0f6d728ebc2eb73d0aa34d0ce3c30ef7976d61d5f3d80b977ce707a4a2f3e67559c1526d3d9a
-
Filesize
324B
MD553c2e4ec54dd5a215bff609bfc8ee4df
SHA13d4f57169045052a287c07b71f1a119143d3ae10
SHA2561f28c919eadf0c563b7a86fc8c92069b519ebfe71f0fcea01ecbe94761b95def
SHA51246026a8096ba408ecfb5a95f6005a95171661f50179cbf6be162a6561cba0df32ca6c1a583c17a44c5996b60cd30dd7b61872cc1c8dd97fb007a7ef79a0e5c0e
-
Filesize
377B
MD594059504829a014da05ff31cf2809e2a
SHA10c45ba38561dd89dfc049c32920d807011ded616
SHA25662391d0ad81f8aad1f64d6ea4326466cff71c76cede8bd09119dfb81a901c2a9
SHA5128060afb87a4557adc52918fbda86fa7be1128fcc5699fcfb905e9a9328c7cafd0211ed53a03e3e89082034f0f5ea8de3b4143bef886daa87d46a4e237bda35f5
-
Filesize
483B
MD58011addc7884336bac5611627791f66b
SHA12280237f6e83b9d0ff98044812c2c1ea13613100
SHA256ebf942b7c2d7d16bfa0babd567be46c96db1305ca47f32c177c3de12e17d2e5a
SHA512cb0ab5ed9290581f9ff4225a44f0ddcadac73574a47de633f9f9d40792b6dd24d19af489f0a470897491297839ba4ea5730d01b8cd37a92ba122e05cc6e6f714
-
Filesize
536B
MD507cb7a895e218fd936194f868151611d
SHA1a569cbd6e37ee06dfcb1290c465823aa1c35d57b
SHA256c0653799c8cc01410c0582f8c823ce7876167688ef93f5500973c7f741b9df01
SHA5121e6432e42daadba29a796b158502d85523907b7d4280bbf171574cc733cf925b0f21e6463f73f51cae9344196e4d555282646e7eb29da16a6a8d10bea0bc316d
-
Filesize
589B
MD51f3dc11be45ba24c51efee201236befa
SHA1c14b6a347a05fd747d483eb27a7792ed41217fe0
SHA256bf30a1b3f29875424e58b0c5bbd1955413ffc5cf7cc8c7cce4e483fd1aa62410
SHA512294080031084ffb86949b5b53e5d1109d8fb67e9f5a63333a23c2116114815d772ce72887fcea64c9c1afe5332c0d036eac7f1f295996b8df4524d2a32938db4
-
Filesize
165B
MD5df107c0ea3b05c4e9dbd49af16d57259
SHA15bceafe71da8563969dc91be6a267f6c7ab26f4d
SHA256b834a8e222bf56318f37496d001baf3b756887cd2a0e8e9b67a304313ab7c728
SHA512a3ae6c32d87c0bc8fd4a6543cc43a414dd826eab8ce72183f2caa4add93c5bd397ea20113b67ef3d4e4aab1e09757b7619aaec61b9dc4710ab3ab2a9dcde7cdd
-
Filesize
13.3MB
MD589d2d5811c1aff539bb355f15f3ddad0
SHA15bb3577c25b6d323d927200c48cd184a3e27c873
SHA256b630008f6d3887793d48b87091e56691e292894dd4fa100dc4a418a2f29dcc12
SHA51239e576124c54143520c5435a2ef9b24506131e13403489c0692f09b89135015d611c4988d4772f8a1e6557fa68b4667d467334461009cee8c2227dfc3e295289