Resubmissions
10/04/2024, 02:53
240410-ddcrcsff3z 710/04/2024, 02:53
240410-ddb5tscc79 710/04/2024, 02:53
240410-ddbt3aff3w 710/04/2024, 02:53
240410-ddbjasff3v 714/10/2023, 10:48
231014-mwhvrsce7y 7Analysis
-
max time kernel
1793s -
max time network
1797s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/04/2024, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
q9cee706b7cbe32e33ace42b3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
q9cee706b7cbe32e33ace42b3.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
q9cee706b7cbe32e33ace42b3.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
q9cee706b7cbe32e33ace42b3.exe
Resource
win11-20240221-en
General
-
Target
q9cee706b7cbe32e33ace42b3.exe
-
Size
285KB
-
MD5
ecabf4d6692cd5ec991817f3b4a3170a
-
SHA1
7aa0c00f7d624ea1fc99496f28ba7787fd38e680
-
SHA256
756478606cced2d82be4625672faf105fdc9ab901757740a619b70b0bf102331
-
SHA512
23e213b010f3073d14ec918d80b3e519a3d59133b1d3798f4567337e6c689d500bb2ea10fb394de03d2e57b8a377402132f77466dd33410136241d8d1ded92ca
-
SSDEEP
3072:ix9JdT0pDj9yVfAK97GCkCYv+dRO7ZrLciXpDG/CdVWh6nt0lhLMgE/wV2p7vvSo:lSAY7GxZ8/ZQgEwV/ydcuCDY9bbzR38
Malware Config
Signatures
-
Executes dropped EXE 62 IoCs
pid Process 2040 q9cee706b7cbe32e33ace42b3.exe 4292 tor.exe 4644 q9cee706b7cbe32e33ace42b3.exe 3156 tor.exe 1148 q9cee706b7cbe32e33ace42b3.exe 668 tor.exe 3524 q9cee706b7cbe32e33ace42b3.exe 2400 tor.exe 1728 q9cee706b7cbe32e33ace42b3.exe 2592 tor.exe 4404 q9cee706b7cbe32e33ace42b3.exe 3864 tor.exe 332 q9cee706b7cbe32e33ace42b3.exe 2336 tor.exe 5012 q9cee706b7cbe32e33ace42b3.exe 3744 tor.exe 5004 q9cee706b7cbe32e33ace42b3.exe 4832 tor.exe 808 q9cee706b7cbe32e33ace42b3.exe 4864 tor.exe 1976 q9cee706b7cbe32e33ace42b3.exe 332 tor.exe 3524 q9cee706b7cbe32e33ace42b3.exe 1640 tor.exe 3132 q9cee706b7cbe32e33ace42b3.exe 5108 tor.exe 1612 q9cee706b7cbe32e33ace42b3.exe 2364 tor.exe 2000 q9cee706b7cbe32e33ace42b3.exe 3312 tor.exe 1036 q9cee706b7cbe32e33ace42b3.exe 2464 tor.exe 4760 q9cee706b7cbe32e33ace42b3.exe 936 tor.exe 3992 q9cee706b7cbe32e33ace42b3.exe 3600 tor.exe 408 q9cee706b7cbe32e33ace42b3.exe 1584 tor.exe 1152 q9cee706b7cbe32e33ace42b3.exe 4400 tor.exe 5020 q9cee706b7cbe32e33ace42b3.exe 2692 tor.exe 1608 q9cee706b7cbe32e33ace42b3.exe 772 tor.exe 236 q9cee706b7cbe32e33ace42b3.exe 2468 tor.exe 4444 q9cee706b7cbe32e33ace42b3.exe 1872 tor.exe 5016 q9cee706b7cbe32e33ace42b3.exe 3312 tor.exe 5096 q9cee706b7cbe32e33ace42b3.exe 2252 tor.exe 4064 q9cee706b7cbe32e33ace42b3.exe 1536 tor.exe 328 q9cee706b7cbe32e33ace42b3.exe 1908 tor.exe 2720 q9cee706b7cbe32e33ace42b3.exe 3728 tor.exe 2228 q9cee706b7cbe32e33ace42b3.exe 4528 tor.exe 4608 q9cee706b7cbe32e33ace42b3.exe 3280 tor.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2930051783-2551506282-3430162621-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 q9cee706b7cbe32e33ace42b3.exe Key opened \REGISTRY\USER\S-1-5-21-2930051783-2551506282-3430162621-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 q9cee706b7cbe32e33ace42b3.exe Key opened \REGISTRY\USER\S-1-5-21-2930051783-2551506282-3430162621-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 q9cee706b7cbe32e33ace42b3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 332 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4992 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2040 q9cee706b7cbe32e33ace42b3.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeDebugPrivilege 4608 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 2040 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 4644 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 1148 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 3524 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 1728 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 4404 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 332 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 5012 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 5004 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 808 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 1976 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 3524 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 3132 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 1612 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 2000 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 1036 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 4760 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 3992 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 408 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 1152 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 5020 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 1608 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 236 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 4444 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 5016 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 5096 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 4064 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 328 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 2720 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 2228 q9cee706b7cbe32e33ace42b3.exe Token: SeDebugPrivilege 4608 q9cee706b7cbe32e33ace42b3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4608 wrote to memory of 3024 4608 q9cee706b7cbe32e33ace42b3.exe 76 PID 4608 wrote to memory of 3024 4608 q9cee706b7cbe32e33ace42b3.exe 76 PID 3024 wrote to memory of 2320 3024 cmd.exe 78 PID 3024 wrote to memory of 2320 3024 cmd.exe 78 PID 3024 wrote to memory of 4992 3024 cmd.exe 79 PID 3024 wrote to memory of 4992 3024 cmd.exe 79 PID 3024 wrote to memory of 332 3024 cmd.exe 80 PID 3024 wrote to memory of 332 3024 cmd.exe 80 PID 3024 wrote to memory of 2040 3024 cmd.exe 81 PID 3024 wrote to memory of 2040 3024 cmd.exe 81 PID 2040 wrote to memory of 2400 2040 q9cee706b7cbe32e33ace42b3.exe 83 PID 2040 wrote to memory of 2400 2040 q9cee706b7cbe32e33ace42b3.exe 83 PID 2040 wrote to memory of 4292 2040 q9cee706b7cbe32e33ace42b3.exe 85 PID 2040 wrote to memory of 4292 2040 q9cee706b7cbe32e33ace42b3.exe 85 PID 4644 wrote to memory of 3156 4644 q9cee706b7cbe32e33ace42b3.exe 88 PID 4644 wrote to memory of 3156 4644 q9cee706b7cbe32e33ace42b3.exe 88 PID 1148 wrote to memory of 668 1148 q9cee706b7cbe32e33ace42b3.exe 94 PID 1148 wrote to memory of 668 1148 q9cee706b7cbe32e33ace42b3.exe 94 PID 3524 wrote to memory of 2400 3524 q9cee706b7cbe32e33ace42b3.exe 99 PID 3524 wrote to memory of 2400 3524 q9cee706b7cbe32e33ace42b3.exe 99 PID 1728 wrote to memory of 2592 1728 q9cee706b7cbe32e33ace42b3.exe 104 PID 1728 wrote to memory of 2592 1728 q9cee706b7cbe32e33ace42b3.exe 104 PID 4404 wrote to memory of 3864 4404 q9cee706b7cbe32e33ace42b3.exe 109 PID 4404 wrote to memory of 3864 4404 q9cee706b7cbe32e33ace42b3.exe 109 PID 332 wrote to memory of 2336 332 q9cee706b7cbe32e33ace42b3.exe 114 PID 332 wrote to memory of 2336 332 q9cee706b7cbe32e33ace42b3.exe 114 PID 5012 wrote to memory of 3744 5012 q9cee706b7cbe32e33ace42b3.exe 119 PID 5012 wrote to memory of 3744 5012 q9cee706b7cbe32e33ace42b3.exe 119 PID 5004 wrote to memory of 4832 5004 q9cee706b7cbe32e33ace42b3.exe 124 PID 5004 wrote to memory of 4832 5004 q9cee706b7cbe32e33ace42b3.exe 124 PID 808 wrote to memory of 4864 808 q9cee706b7cbe32e33ace42b3.exe 129 PID 808 wrote to memory of 4864 808 q9cee706b7cbe32e33ace42b3.exe 129 PID 1976 wrote to memory of 332 1976 q9cee706b7cbe32e33ace42b3.exe 134 PID 1976 wrote to memory of 332 1976 q9cee706b7cbe32e33ace42b3.exe 134 PID 3524 wrote to memory of 1640 3524 q9cee706b7cbe32e33ace42b3.exe 139 PID 3524 wrote to memory of 1640 3524 q9cee706b7cbe32e33ace42b3.exe 139 PID 3132 wrote to memory of 5108 3132 q9cee706b7cbe32e33ace42b3.exe 144 PID 3132 wrote to memory of 5108 3132 q9cee706b7cbe32e33ace42b3.exe 144 PID 1612 wrote to memory of 2364 1612 q9cee706b7cbe32e33ace42b3.exe 149 PID 1612 wrote to memory of 2364 1612 q9cee706b7cbe32e33ace42b3.exe 149 PID 2000 wrote to memory of 3312 2000 q9cee706b7cbe32e33ace42b3.exe 154 PID 2000 wrote to memory of 3312 2000 q9cee706b7cbe32e33ace42b3.exe 154 PID 1036 wrote to memory of 2464 1036 q9cee706b7cbe32e33ace42b3.exe 159 PID 1036 wrote to memory of 2464 1036 q9cee706b7cbe32e33ace42b3.exe 159 PID 4760 wrote to memory of 936 4760 q9cee706b7cbe32e33ace42b3.exe 164 PID 4760 wrote to memory of 936 4760 q9cee706b7cbe32e33ace42b3.exe 164 PID 3992 wrote to memory of 3600 3992 q9cee706b7cbe32e33ace42b3.exe 169 PID 3992 wrote to memory of 3600 3992 q9cee706b7cbe32e33ace42b3.exe 169 PID 408 wrote to memory of 1584 408 q9cee706b7cbe32e33ace42b3.exe 174 PID 408 wrote to memory of 1584 408 q9cee706b7cbe32e33ace42b3.exe 174 PID 1152 wrote to memory of 4400 1152 q9cee706b7cbe32e33ace42b3.exe 179 PID 1152 wrote to memory of 4400 1152 q9cee706b7cbe32e33ace42b3.exe 179 PID 5020 wrote to memory of 2692 5020 q9cee706b7cbe32e33ace42b3.exe 184 PID 5020 wrote to memory of 2692 5020 q9cee706b7cbe32e33ace42b3.exe 184 PID 1608 wrote to memory of 772 1608 q9cee706b7cbe32e33ace42b3.exe 189 PID 1608 wrote to memory of 772 1608 q9cee706b7cbe32e33ace42b3.exe 189 PID 236 wrote to memory of 2468 236 q9cee706b7cbe32e33ace42b3.exe 194 PID 236 wrote to memory of 2468 236 q9cee706b7cbe32e33ace42b3.exe 194 PID 4444 wrote to memory of 1872 4444 q9cee706b7cbe32e33ace42b3.exe 199 PID 4444 wrote to memory of 1872 4444 q9cee706b7cbe32e33ace42b3.exe 199 PID 5016 wrote to memory of 3312 5016 q9cee706b7cbe32e33ace42b3.exe 204 PID 5016 wrote to memory of 3312 5016 q9cee706b7cbe32e33ace42b3.exe 204 PID 5096 wrote to memory of 2252 5096 q9cee706b7cbe32e33ace42b3.exe 209 PID 5096 wrote to memory of 2252 5096 q9cee706b7cbe32e33ace42b3.exe 209 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2930051783-2551506282-3430162621-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 q9cee706b7cbe32e33ace42b3.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2930051783-2551506282-3430162621-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 q9cee706b7cbe32e33ace42b3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\q9cee706b7cbe32e33ace42b3.exe"C:\Users\Admin\AppData\Local\Temp\q9cee706b7cbe32e33ace42b3.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "q9cee706b7cbe32e33ace42b3" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\q9cee706b7cbe32e33ace42b3.exe" &&START "" "C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2320
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:4992
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "q9cee706b7cbe32e33ace42b3" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:332
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe"C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2040 -
C:\Windows\System32\tar.exe"C:\Windows\System32\tar.exe" -xvzf "C:\Users\Admin\AppData\Local\Temp\tmp4C1C.tmp" -C "C:\Users\Admin\AppData\Local\uq3099dqiz"4⤵PID:2400
-
-
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"4⤵
- Executes dropped EXE
PID:4292
-
-
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:3156
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:668
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:2400
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:2592
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:3864
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:2336
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:3744
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:4832
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:4864
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:332
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:1640
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:5108
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:2364
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:3312
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:2464
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:936
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:3600
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:1584
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:4400
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:2692
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:772
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:2468
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:1872
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:3312
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:2252
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4064 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:1536
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:328 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:1908
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2720 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:3728
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2228 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:4528
-
-
C:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exeC:\Users\Admin\AppData\Local\Nvidia\q9cee706b7cbe32e33ace42b3.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4608 -
C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe"C:\Users\Admin\AppData\Local\uq3099dqiz\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\uq3099dqiz\torrc.txt"2⤵
- Executes dropped EXE
PID:3280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
847B
MD5486ebddc86ea8b3e965d390d22283a23
SHA1eaffc047f067084867e8575c576a9ec60e094ba8
SHA25650a57273ecb794e53b0622eb841341e2643c11f53fa47356e6e754ab2268171d
SHA5120a50ba02250b38355a6f4fb94e40c61258a74031d9aea7cdf675f3e068f39ec0748ecf292aaf2f94b1963b9d66516ee79aa6c552617048e248774af0ff07189d
-
Filesize
285KB
MD5ecabf4d6692cd5ec991817f3b4a3170a
SHA17aa0c00f7d624ea1fc99496f28ba7787fd38e680
SHA256756478606cced2d82be4625672faf105fdc9ab901757740a619b70b0bf102331
SHA51223e213b010f3073d14ec918d80b3e519a3d59133b1d3798f4567337e6c689d500bb2ea10fb394de03d2e57b8a377402132f77466dd33410136241d8d1ded92ca
-
Filesize
13.3MB
MD589d2d5811c1aff539bb355f15f3ddad0
SHA15bb3577c25b6d323d927200c48cd184a3e27c873
SHA256b630008f6d3887793d48b87091e56691e292894dd4fa100dc4a418a2f29dcc12
SHA51239e576124c54143520c5435a2ef9b24506131e13403489c0692f09b89135015d611c4988d4772f8a1e6557fa68b4667d467334461009cee8c2227dfc3e295289
-
Filesize
2.7MB
MD5a0db8a87f7b723266c8b04255da46b06
SHA14df00ea56d22d88f3d2e005ef66bad5b3ef92ebf
SHA25660b43cdce0f807f7891521f396f53def34a7d98986dbde0faa2a197189c587f3
SHA51241b8fc467d11af7ca6a42c7e94d1b8295ab3ae5d6d186b4f378e6e079440520e8324b695da1134beb2bc1697d2491edcc70c1b75ab6fc66b9c1cb2ecbcdb4a7d
-
Filesize
8.0MB
MD5c35b1397ab404ad1935a283fb61df561
SHA16e5b6d48f43db678f21c35edddefb2e9db90cb0b
SHA256ead590e992313e61cd8ff23f573e5c55c85d783d40e967d244250cf7097b33fa
SHA512eab7b478024f4fc670ffcd574f6d2e7ad5493c5eb52513b53980cad58f9fb3b2b35b7b4a0e300a115e315e351770aa216a556eaef534fffde2ff5be483556efc
-
Filesize
64B
MD51d9f147502df15a125ba8e720ceb2500
SHA12e688622cd9680ac42026b14b5bb284ca45c19c1
SHA256c1f2e5d4f5874c915f493b40f5d17f7067a2155a0d1d75cb6af61c664a909dc4
SHA5126a16f9c81af4eabcd81069b8c0a3f51b6437706508178293eb2b8288aefbbc46194f127211bf0485345b96133c459009337d79584735ac43964ec080d9bf42a2
-
Filesize
4B
MD5665d5cbb82b5785d9f344c46417c6c36
SHA14c449511d1b4ed24c5fcbd19f94651a4e719ba4d
SHA256c09a11d9c224480e982f9a9b1fe6a422d685e68d0375d4c56eaec674052015fe
SHA5121524890e2e66fa774ce35bfc6960e657476de41e091d88404b5301340ec5bd2cc9fa9ddec15ebeba8382adef291ae8c38986585067016004b0be65d6dd2c7159
-
Filesize
7.4MB
MD588590909765350c0d70c6c34b1f31dd2
SHA1129b27c3926e53e5df6d44cc6adf39c3a8d9ebf7
SHA25646fe244b548265c78ab961e8f787bc8bf21edbcaaf175fa3b8be3137c6845a82
SHA512a8af08d9169a31a1c3419d4e6e8fbe608c800d323840563b5a560d3e09e78a492201f07cc0d3864efbff8ad81e59885fc43a6b749e0a3377aa8555df258af192
-
Filesize
218B
MD58e5f497c2400583a54c820e1a86115ec
SHA1fe8bff6ae5e92a6101bf8d1fb3abe3657f649b8d
SHA2561c692738e40719084385086a48359ac126a3ed4410abdc087f5d72cda5a88682
SHA512aa2c79734a1706541f2bb0f21427bd86bbc7869ae0bd5794377695e0320fb629e9e15313ebaa24e3e317e3f125fe134cf7979b495f112c9533b2b17a92aa349d