Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
10/04/2024, 02:58
240410-dgn9kacd46 1010/04/2024, 02:58
240410-dgnm2aff7x 1010/04/2024, 02:58
240410-dgnb9sff7w 1010/04/2024, 02:58
240410-dgm2haff7v 1023/08/2023, 14:58
230823-sb7laaed41 10Analysis
-
max time kernel
1195s -
max time network
1204s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/04/2024, 02:58
Behavioral task
behavioral1
Sample
loader.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
loader.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
loader.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
loader.exe
Resource
win11-20240221-en
General
-
Target
loader.exe
-
Size
401KB
-
MD5
69e3cdc923b668aec4cb405c040565c6
-
SHA1
6a675ebf6f241e543f7bb50ccc8ead462a427880
-
SHA256
8d647fd3ebb00c9d853eb728ff7cba75b7a089d30f84090e3bc1dc460bdd47f3
-
SHA512
5580919f6710fc210f079875eae22a87c85e854b57f59d10fc22680460f370154d7d223a66c9797387e4675a7954ba6f051a34571499481927980eb9ebf07cdb
-
SSDEEP
6144:+CGmWI/2hvRn6Ie646G0D1eBlxy9bAmI6:+KWI/8B6Q9b5eBlxnmI6
Malware Config
Extracted
gurcu
https://api.telegram.org/bot6193093056:AAHzyNGUGS9aUG6CCx6ENLoXpCFLzEQywIQ/sendMessage?chat_id=1098292643
Signatures
-
Executes dropped EXE 42 IoCs
pid Process 240 loader.exe 2852 tor.exe 4420 loader.exe 2900 tor.exe 3200 loader.exe 4208 tor.exe 3012 loader.exe 1140 tor.exe 2056 loader.exe 8 tor.exe 4604 loader.exe 4532 tor.exe 4472 loader.exe 4044 tor.exe 4584 loader.exe 1908 tor.exe 1380 loader.exe 4912 tor.exe 3392 loader.exe 1488 tor.exe 3676 loader.exe 1468 tor.exe 1384 loader.exe 952 tor.exe 2016 loader.exe 4764 tor.exe 4820 loader.exe 4784 tor.exe 4448 loader.exe 1848 tor.exe 2204 loader.exe 1384 tor.exe 2904 loader.exe 3028 tor.exe 1144 loader.exe 4792 tor.exe 4832 loader.exe 1164 tor.exe 2592 loader.exe 2080 tor.exe 580 loader.exe 1672 tor.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-647252928-2816094679-1307623958-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 loader.exe Key opened \REGISTRY\USER\S-1-5-21-647252928-2816094679-1307623958-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 loader.exe Key opened \REGISTRY\USER\S-1-5-21-647252928-2816094679-1307623958-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 loader.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1448 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 844 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 240 loader.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 3132 loader.exe Token: SeDebugPrivilege 240 loader.exe Token: SeDebugPrivilege 4420 loader.exe Token: SeDebugPrivilege 3200 loader.exe Token: SeDebugPrivilege 3012 loader.exe Token: SeDebugPrivilege 2056 loader.exe Token: SeDebugPrivilege 4604 loader.exe Token: SeDebugPrivilege 4472 loader.exe Token: SeDebugPrivilege 4584 loader.exe Token: SeDebugPrivilege 1380 loader.exe Token: SeDebugPrivilege 3392 loader.exe Token: SeDebugPrivilege 3676 loader.exe Token: SeDebugPrivilege 1384 loader.exe Token: SeDebugPrivilege 2016 loader.exe Token: SeDebugPrivilege 4820 loader.exe Token: SeDebugPrivilege 4448 loader.exe Token: SeDebugPrivilege 2204 loader.exe Token: SeDebugPrivilege 2904 loader.exe Token: SeDebugPrivilege 1144 loader.exe Token: SeDebugPrivilege 4832 loader.exe Token: SeDebugPrivilege 2592 loader.exe Token: SeDebugPrivilege 580 loader.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 3132 wrote to memory of 816 3132 loader.exe 80 PID 3132 wrote to memory of 816 3132 loader.exe 80 PID 816 wrote to memory of 3424 816 cmd.exe 82 PID 816 wrote to memory of 3424 816 cmd.exe 82 PID 816 wrote to memory of 844 816 cmd.exe 83 PID 816 wrote to memory of 844 816 cmd.exe 83 PID 816 wrote to memory of 1448 816 cmd.exe 84 PID 816 wrote to memory of 1448 816 cmd.exe 84 PID 816 wrote to memory of 240 816 cmd.exe 85 PID 816 wrote to memory of 240 816 cmd.exe 85 PID 240 wrote to memory of 1436 240 loader.exe 86 PID 240 wrote to memory of 1436 240 loader.exe 86 PID 240 wrote to memory of 2852 240 loader.exe 88 PID 240 wrote to memory of 2852 240 loader.exe 88 PID 4420 wrote to memory of 2900 4420 loader.exe 92 PID 4420 wrote to memory of 2900 4420 loader.exe 92 PID 3200 wrote to memory of 4208 3200 loader.exe 98 PID 3200 wrote to memory of 4208 3200 loader.exe 98 PID 3012 wrote to memory of 1140 3012 loader.exe 103 PID 3012 wrote to memory of 1140 3012 loader.exe 103 PID 2056 wrote to memory of 8 2056 loader.exe 108 PID 2056 wrote to memory of 8 2056 loader.exe 108 PID 4604 wrote to memory of 4532 4604 loader.exe 113 PID 4604 wrote to memory of 4532 4604 loader.exe 113 PID 4472 wrote to memory of 4044 4472 loader.exe 118 PID 4472 wrote to memory of 4044 4472 loader.exe 118 PID 4584 wrote to memory of 1908 4584 loader.exe 123 PID 4584 wrote to memory of 1908 4584 loader.exe 123 PID 1380 wrote to memory of 4912 1380 loader.exe 128 PID 1380 wrote to memory of 4912 1380 loader.exe 128 PID 3392 wrote to memory of 1488 3392 loader.exe 133 PID 3392 wrote to memory of 1488 3392 loader.exe 133 PID 3676 wrote to memory of 1468 3676 loader.exe 138 PID 3676 wrote to memory of 1468 3676 loader.exe 138 PID 1384 wrote to memory of 952 1384 loader.exe 143 PID 1384 wrote to memory of 952 1384 loader.exe 143 PID 2016 wrote to memory of 4764 2016 loader.exe 148 PID 2016 wrote to memory of 4764 2016 loader.exe 148 PID 4820 wrote to memory of 4784 4820 loader.exe 153 PID 4820 wrote to memory of 4784 4820 loader.exe 153 PID 4448 wrote to memory of 1848 4448 loader.exe 158 PID 4448 wrote to memory of 1848 4448 loader.exe 158 PID 2204 wrote to memory of 1384 2204 loader.exe 163 PID 2204 wrote to memory of 1384 2204 loader.exe 163 PID 2904 wrote to memory of 3028 2904 loader.exe 168 PID 2904 wrote to memory of 3028 2904 loader.exe 168 PID 1144 wrote to memory of 4792 1144 loader.exe 173 PID 1144 wrote to memory of 4792 1144 loader.exe 173 PID 4832 wrote to memory of 1164 4832 loader.exe 178 PID 4832 wrote to memory of 1164 4832 loader.exe 178 PID 2592 wrote to memory of 2080 2592 loader.exe 183 PID 2592 wrote to memory of 2080 2592 loader.exe 183 PID 580 wrote to memory of 1672 580 loader.exe 188 PID 580 wrote to memory of 1672 580 loader.exe 188 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-647252928-2816094679-1307623958-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 loader.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-647252928-2816094679-1307623958-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 loader.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "loader" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\TeamViewer\loader.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\loader.exe" &&START "" "C:\Users\Admin\AppData\Local\TeamViewer\loader.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:3424
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:844
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "loader" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\TeamViewer\loader.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1448
-
-
C:\Users\Admin\AppData\Local\TeamViewer\loader.exe"C:\Users\Admin\AppData\Local\TeamViewer\loader.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:240 -
C:\Windows\System32\tar.exe"C:\Windows\System32\tar.exe" -xvzf "C:\Users\Admin\AppData\Local\Temp\tmp86E3.tmp" -C "C:\Users\Admin\AppData\Local\jjmzzxbvaf"4⤵PID:1436
-
-
C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe"C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jjmzzxbvaf\torrc.txt"4⤵
- Executes dropped EXE
PID:2852
-
-
-
-
C:\Users\Admin\AppData\Local\TeamViewer\loader.exeC:\Users\Admin\AppData\Local\TeamViewer\loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe"C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jjmzzxbvaf\torrc.txt"2⤵
- Executes dropped EXE
PID:2900
-
-
C:\Users\Admin\AppData\Local\TeamViewer\loader.exeC:\Users\Admin\AppData\Local\TeamViewer\loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe"C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jjmzzxbvaf\torrc.txt"2⤵
- Executes dropped EXE
PID:4208
-
-
C:\Users\Admin\AppData\Local\TeamViewer\loader.exeC:\Users\Admin\AppData\Local\TeamViewer\loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe"C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jjmzzxbvaf\torrc.txt"2⤵
- Executes dropped EXE
PID:1140
-
-
C:\Users\Admin\AppData\Local\TeamViewer\loader.exeC:\Users\Admin\AppData\Local\TeamViewer\loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe"C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jjmzzxbvaf\torrc.txt"2⤵
- Executes dropped EXE
PID:8
-
-
C:\Users\Admin\AppData\Local\TeamViewer\loader.exeC:\Users\Admin\AppData\Local\TeamViewer\loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe"C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jjmzzxbvaf\torrc.txt"2⤵
- Executes dropped EXE
PID:4532
-
-
C:\Users\Admin\AppData\Local\TeamViewer\loader.exeC:\Users\Admin\AppData\Local\TeamViewer\loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe"C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jjmzzxbvaf\torrc.txt"2⤵
- Executes dropped EXE
PID:4044
-
-
C:\Users\Admin\AppData\Local\TeamViewer\loader.exeC:\Users\Admin\AppData\Local\TeamViewer\loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe"C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jjmzzxbvaf\torrc.txt"2⤵
- Executes dropped EXE
PID:1908
-
-
C:\Users\Admin\AppData\Local\TeamViewer\loader.exeC:\Users\Admin\AppData\Local\TeamViewer\loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe"C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jjmzzxbvaf\torrc.txt"2⤵
- Executes dropped EXE
PID:4912
-
-
C:\Users\Admin\AppData\Local\TeamViewer\loader.exeC:\Users\Admin\AppData\Local\TeamViewer\loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe"C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jjmzzxbvaf\torrc.txt"2⤵
- Executes dropped EXE
PID:1488
-
-
C:\Users\Admin\AppData\Local\TeamViewer\loader.exeC:\Users\Admin\AppData\Local\TeamViewer\loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe"C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jjmzzxbvaf\torrc.txt"2⤵
- Executes dropped EXE
PID:1468
-
-
C:\Users\Admin\AppData\Local\TeamViewer\loader.exeC:\Users\Admin\AppData\Local\TeamViewer\loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe"C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jjmzzxbvaf\torrc.txt"2⤵
- Executes dropped EXE
PID:952
-
-
C:\Users\Admin\AppData\Local\TeamViewer\loader.exeC:\Users\Admin\AppData\Local\TeamViewer\loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe"C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jjmzzxbvaf\torrc.txt"2⤵
- Executes dropped EXE
PID:4764
-
-
C:\Users\Admin\AppData\Local\TeamViewer\loader.exeC:\Users\Admin\AppData\Local\TeamViewer\loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe"C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jjmzzxbvaf\torrc.txt"2⤵
- Executes dropped EXE
PID:4784
-
-
C:\Users\Admin\AppData\Local\TeamViewer\loader.exeC:\Users\Admin\AppData\Local\TeamViewer\loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe"C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jjmzzxbvaf\torrc.txt"2⤵
- Executes dropped EXE
PID:1848
-
-
C:\Users\Admin\AppData\Local\TeamViewer\loader.exeC:\Users\Admin\AppData\Local\TeamViewer\loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe"C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jjmzzxbvaf\torrc.txt"2⤵
- Executes dropped EXE
PID:1384
-
-
C:\Users\Admin\AppData\Local\TeamViewer\loader.exeC:\Users\Admin\AppData\Local\TeamViewer\loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe"C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jjmzzxbvaf\torrc.txt"2⤵
- Executes dropped EXE
PID:3028
-
-
C:\Users\Admin\AppData\Local\TeamViewer\loader.exeC:\Users\Admin\AppData\Local\TeamViewer\loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe"C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jjmzzxbvaf\torrc.txt"2⤵
- Executes dropped EXE
PID:4792
-
-
C:\Users\Admin\AppData\Local\TeamViewer\loader.exeC:\Users\Admin\AppData\Local\TeamViewer\loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe"C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jjmzzxbvaf\torrc.txt"2⤵
- Executes dropped EXE
PID:1164
-
-
C:\Users\Admin\AppData\Local\TeamViewer\loader.exeC:\Users\Admin\AppData\Local\TeamViewer\loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe"C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jjmzzxbvaf\torrc.txt"2⤵
- Executes dropped EXE
PID:2080
-
-
C:\Users\Admin\AppData\Local\TeamViewer\loader.exeC:\Users\Admin\AppData\Local\TeamViewer\loader.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe"C:\Users\Admin\AppData\Local\jjmzzxbvaf\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jjmzzxbvaf\torrc.txt"2⤵
- Executes dropped EXE
PID:1672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
847B
MD5486ebddc86ea8b3e965d390d22283a23
SHA1eaffc047f067084867e8575c576a9ec60e094ba8
SHA25650a57273ecb794e53b0622eb841341e2643c11f53fa47356e6e754ab2268171d
SHA5120a50ba02250b38355a6f4fb94e40c61258a74031d9aea7cdf675f3e068f39ec0748ecf292aaf2f94b1963b9d66516ee79aa6c552617048e248774af0ff07189d
-
Filesize
401KB
MD569e3cdc923b668aec4cb405c040565c6
SHA16a675ebf6f241e543f7bb50ccc8ead462a427880
SHA2568d647fd3ebb00c9d853eb728ff7cba75b7a089d30f84090e3bc1dc460bdd47f3
SHA5125580919f6710fc210f079875eae22a87c85e854b57f59d10fc22680460f370154d7d223a66c9797387e4675a7954ba6f051a34571499481927980eb9ebf07cdb
-
Filesize
13.3MB
MD589d2d5811c1aff539bb355f15f3ddad0
SHA15bb3577c25b6d323d927200c48cd184a3e27c873
SHA256b630008f6d3887793d48b87091e56691e292894dd4fa100dc4a418a2f29dcc12
SHA51239e576124c54143520c5435a2ef9b24506131e13403489c0692f09b89135015d611c4988d4772f8a1e6557fa68b4667d467334461009cee8c2227dfc3e295289
-
Filesize
2.6MB
MD58155dd4a16697830a63d507d2666b2a9
SHA1e07a54b15c905cd1d9d41db3ccde3bade36bcdb4
SHA2566b4f443629c32b632d8ad7bcb17d84da1e4eaec556dccdf98c5e9051cb404fed
SHA5120cb6c3fa12cbe7f8e63c5c73c0665fc2593109801ba318c582c4bd1c14dfd27fff3252c22b9078040e743ec788ad9534856c72ca5e38d992d9cb5aeacf819e6f
-
Filesize
6.8MB
MD5a359c410f188cb123254473c5da3c7ae
SHA174551e61b9d98bc2cfba58d10e9dd0b74b33f7b2
SHA2562ef777f2c72efa637dc71992aa7cd020d217b1c723fbfc4289e1037d6ae4e801
SHA512dd0a073a7f395bef847fee844430ac2870c71e54620da36445ba308c0ab310967ff65c9d03ca4483fc90040a274b823ce2e6850de8ef498d017ac9b998ed84b9
-
Filesize
64B
MD563c39098c6dcfd5a527d7335b21646d7
SHA17c6b9f1173d22dcf6a14882eb27f311c867f4e59
SHA256e8ae301d4bbfce6e91603d01e7632bcb91995d3af277a2019f951fa97b4cd833
SHA51222a69f4241e5b9384315279dba65d31c34488c98006480375841eb8d57027d14acc692b2c2aefe05084df648a7ff7b1d705cd28ceccc0d0d3e40b05c50497c97
-
Filesize
4B
MD50e1feae55e360ff05fef58199b3fa521
SHA15958f8e68cd88f8b46609ff5fe0c0b8c484a157f
SHA2562794fbeea945a8eb483fcb05596b295d9cbbb8d03cccb97a3eadfaa119395af7
SHA5126c1e9c2ed8c9bc01a7d45efe3634d48a269210a666a8d7921919491bc0a6fabeaf8b83c1cb012c5a47d485f67055e27d7f82f8a0b77e8fbcc71b5eb1826f295a
-
Filesize
7.4MB
MD588590909765350c0d70c6c34b1f31dd2
SHA1129b27c3926e53e5df6d44cc6adf39c3a8d9ebf7
SHA25646fe244b548265c78ab961e8f787bc8bf21edbcaaf175fa3b8be3137c6845a82
SHA512a8af08d9169a31a1c3419d4e6e8fbe608c800d323840563b5a560d3e09e78a492201f07cc0d3864efbff8ad81e59885fc43a6b749e0a3377aa8555df258af192
-
Filesize
218B
MD54e2f29c25228c1ec85df5942d710d90e
SHA1ed90cfa1d707a54a20b65ea3931b170746b02302
SHA256307fabb91b65d13dfb2ad52e68d15fe1cc79125e7ab216c301cc20cc6ab9de95
SHA5127ca7e2d65233b90abaa70fcce3f6b3a7b0e49801e58d8cb5d5848fb6217c4d2ed63847a17af693d439c591321f044c5268bb5d04453439d180e44a108a23b3a5