Malware Analysis Report

2025-01-22 15:01

Sample ID 241211-w6y46stnhs
Target fffffffffff.exe
SHA256 4e1729bc6da9b09dd3914f71694f75c06074bf6dc64b985a0099760dc00fcd33
Tags
rat drhdrhdrhdrh orcus discovery spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

4e1729bc6da9b09dd3914f71694f75c06074bf6dc64b985a0099760dc00fcd33

Threat Level: Known bad

The file fffffffffff.exe was found to be: Known bad.

Malicious Activity Summary

rat drhdrhdrhdrh orcus discovery spyware stealer

Orcus family

Orcus

Checks computer location settings

Executes dropped EXE

Loads dropped DLL

Drops file in System32 directory

System Location Discovery: System Language Discovery

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious use of SendNotifyMessage

Suspicious use of FindShellTrayWindow

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-12-11 18:32

Signatures

Orcus family

orcus

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-11 18:32

Reported

2024-12-12 08:08

Platform

win7-20241010-en

Max time kernel

1189s

Max time network

1204s

Command Line

"C:\Users\Admin\AppData\Local\Temp\fffffffffff.exe"

Signatures

Orcus

rat spyware stealer orcus

Orcus family

orcus

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsInput.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\fffffffffff.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\fffffffffff.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\WindowsInput.exe C:\Users\Admin\AppData\Local\Temp\fffffffffff.exe N/A
File opened for modification C:\Windows\SysWOW64\WindowsInput.InstallLog C:\Windows\SysWOW64\WindowsInput.exe N/A
File created C:\Windows\SysWOW64\WindowsInput.InstallState C:\Windows\SysWOW64\WindowsInput.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\fffffffffff.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\fffffffffff.exe

"C:\Users\Admin\AppData\Local\Temp\fffffffffff.exe"

C:\Windows\SysWOW64\WindowsInput.exe

"C:\Windows\SysWOW64\WindowsInput.exe" --install

C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"

Network

Country Destination Domain Proto
N/A 127.0.0.1:7000 tcp
US 8.8.8.8:53 email-hitting.gl.at.ply.gg udp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 8.8.8.8:53 email-hitting.gl.at.ply.gg udp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 8.8.8.8:53 email-hitting.gl.at.ply.gg udp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 8.8.8.8:53 email-hitting.gl.at.ply.gg udp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp

Files

memory/2128-0-0x000000007449E000-0x000000007449F000-memory.dmp

memory/2128-1-0x0000000001070000-0x0000000001148000-memory.dmp

memory/2128-2-0x0000000074490000-0x0000000074B7E000-memory.dmp

memory/2128-3-0x0000000000480000-0x000000000048A000-memory.dmp

memory/2128-4-0x0000000000650000-0x000000000069C000-memory.dmp

memory/2128-5-0x0000000000A60000-0x0000000000A6C000-memory.dmp

\Windows\SysWOW64\WindowsInput.exe

MD5 e854a4636afc652b320e12e50ba4080e
SHA1 8a4ac6ecc22ee5f3a8ec846d38b41ff18c641fdc
SHA256 94b9c78c6fa2bf61fba20a08ad4563f7dd2f5668c28eff227965ce0a2032d5d5
SHA512 30aabd5079b6ed0948eb70fd18e9166096e4ba5d1d47fc35b7270f931d19bbe6cd929b6010f70297bf5272dc5a79e2523721354d211c4080d68ad8d17e316118

memory/2340-12-0x000007FEF581E000-0x000007FEF581F000-memory.dmp

C:\Windows\SysWOW64\WindowsInput.InstallLog

MD5 e469dda91ae810a1f94c96060f3f8a65
SHA1 0b4b3b0f6f937016b1e045ce5313ee2a65a38630
SHA256 d42fee8db8eb0e047ca53ad59b1c9bc69fe04993be36fec502e3532371908842
SHA512 2eb4037361c03e195c642a53f55a3182a6df19903db503060e366f2394750e64ae04fdaace61ef5a6dba649defc88322d78edd2928bc53ebd1ce11d68cc88dac

memory/2340-22-0x000007FEF5560000-0x000007FEF5EFD000-memory.dmp

memory/2340-23-0x000007FEF5560000-0x000007FEF5EFD000-memory.dmp

C:\Windows\SysWOW64\WindowsInput.InstallLog

MD5 c2291863df7c2d3038ce3c22fa276506
SHA1 7b7d2bc07a6c35523807342c747c9b6a19f3184e
SHA256 14504199bede3f46129969dbd2b7680f2e5b7fcd73a3e427ce1bb6217a6d13da
SHA512 00bf40174a67e3e663d18a887c5b461a1e5ead0b27f0a139d87969158c58f4ca72cfa5a731dda239356192ca4cb5ac6ae2b0e37401d534e686cabacd3cbee8fa

memory/2340-39-0x000007FEF5560000-0x000007FEF5EFD000-memory.dmp

memory/2128-42-0x0000000005050000-0x000000000509E000-memory.dmp

\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe

MD5 bf3709975587af1ae764262fd2ce2f48
SHA1 de63b6c5b11653e8d777f8cbbf6018972413d44a
SHA256 4e1729bc6da9b09dd3914f71694f75c06074bf6dc64b985a0099760dc00fcd33
SHA512 19d3ed22232c5f907b951935ff465bea24317421c47934032cb010f250eb8bdebfd6907a26b844716c4da1599d37c54e8275ce67f13810c9b064c962b84e4d94

memory/2660-50-0x0000000000C20000-0x0000000000CF8000-memory.dmp

memory/2128-49-0x0000000074490000-0x0000000074B7E000-memory.dmp

memory/2660-51-0x0000000000AA0000-0x0000000000AB0000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-12-11 18:32

Reported

2024-12-12 08:10

Platform

win10v2004-20241007-en

Max time kernel

1199s

Max time network

1196s

Command Line

"C:\Users\Admin\AppData\Local\Temp\fffffffffff.exe"

Signatures

Orcus

rat spyware stealer orcus

Orcus family

orcus

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\fffffffffff.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsInput.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\WindowsInput.exe C:\Users\Admin\AppData\Local\Temp\fffffffffff.exe N/A
File opened for modification C:\Windows\SysWOW64\WindowsInput.InstallLog C:\Windows\SysWOW64\WindowsInput.exe N/A
File created C:\Windows\SysWOW64\WindowsInput.InstallState C:\Windows\SysWOW64\WindowsInput.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\fffffffffff.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\fffffffffff.exe

"C:\Users\Admin\AppData\Local\Temp\fffffffffff.exe"

C:\Windows\SysWOW64\WindowsInput.exe

"C:\Windows\SysWOW64\WindowsInput.exe" --install

C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
N/A 127.0.0.1:7000 tcp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 email-hitting.gl.at.ply.gg udp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
N/A 127.0.0.1:7000 tcp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
US 8.8.8.8:53 27.173.189.20.in-addr.arpa udp
N/A 127.0.0.1:7000 tcp
US 8.8.8.8:53 email-hitting.gl.at.ply.gg udp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 8.8.8.8:53 email-hitting.gl.at.ply.gg udp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 8.8.8.8:53 email-hitting.gl.at.ply.gg udp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 8.8.8.8:53 email-hitting.gl.at.ply.gg udp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp
US 147.185.221.22:63341 email-hitting.gl.at.ply.gg tcp
N/A 127.0.0.1:7000 tcp

Files

memory/4720-0-0x0000000074EFE000-0x0000000074EFF000-memory.dmp

memory/4720-1-0x0000000000DA0000-0x0000000000E78000-memory.dmp

memory/4720-2-0x0000000001600000-0x000000000160A000-memory.dmp

memory/4720-3-0x0000000074EF0000-0x00000000756A0000-memory.dmp

memory/4720-4-0x0000000005F00000-0x00000000064A4000-memory.dmp

memory/4720-5-0x0000000005BF0000-0x0000000005C82000-memory.dmp

memory/4720-6-0x0000000005B50000-0x0000000005B9C000-memory.dmp

memory/4720-7-0x0000000005C90000-0x0000000005CB2000-memory.dmp

memory/4720-8-0x0000000005BB0000-0x0000000005BBC000-memory.dmp

C:\Windows\SysWOW64\WindowsInput.exe

MD5 e854a4636afc652b320e12e50ba4080e
SHA1 8a4ac6ecc22ee5f3a8ec846d38b41ff18c641fdc
SHA256 94b9c78c6fa2bf61fba20a08ad4563f7dd2f5668c28eff227965ce0a2032d5d5
SHA512 30aabd5079b6ed0948eb70fd18e9166096e4ba5d1d47fc35b7270f931d19bbe6cd929b6010f70297bf5272dc5a79e2523721354d211c4080d68ad8d17e316118

memory/4084-20-0x00007FFFD2485000-0x00007FFFD2486000-memory.dmp

memory/4084-22-0x0000000001910000-0x0000000001930000-memory.dmp

memory/4084-21-0x00000000018D0000-0x00000000018E8000-memory.dmp

memory/4084-23-0x00007FFFD21D0000-0x00007FFFD2B71000-memory.dmp

memory/4084-24-0x00007FFFD21D0000-0x00007FFFD2B71000-memory.dmp

memory/4084-27-0x000000001C100000-0x000000001C124000-memory.dmp

C:\Windows\SysWOW64\WindowsInput.InstallLog

MD5 e469dda91ae810a1f94c96060f3f8a65
SHA1 0b4b3b0f6f937016b1e045ce5313ee2a65a38630
SHA256 d42fee8db8eb0e047ca53ad59b1c9bc69fe04993be36fec502e3532371908842
SHA512 2eb4037361c03e195c642a53f55a3182a6df19903db503060e366f2394750e64ae04fdaace61ef5a6dba649defc88322d78edd2928bc53ebd1ce11d68cc88dac

memory/4084-35-0x000000001CA60000-0x000000001CF2E000-memory.dmp

memory/4084-36-0x000000001CFD0000-0x000000001D06C000-memory.dmp

C:\Windows\SysWOW64\WindowsInput.InstallLog

MD5 c2291863df7c2d3038ce3c22fa276506
SHA1 7b7d2bc07a6c35523807342c747c9b6a19f3184e
SHA256 14504199bede3f46129969dbd2b7680f2e5b7fcd73a3e427ce1bb6217a6d13da
SHA512 00bf40174a67e3e663d18a887c5b461a1e5ead0b27f0a139d87969158c58f4ca72cfa5a731dda239356192ca4cb5ac6ae2b0e37401d534e686cabacd3cbee8fa

memory/4084-53-0x00007FFFD21D0000-0x00007FFFD2B71000-memory.dmp

memory/4720-56-0x00000000069F0000-0x0000000006A3E000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Speech\AudioDriver.exe

MD5 bf3709975587af1ae764262fd2ce2f48
SHA1 de63b6c5b11653e8d777f8cbbf6018972413d44a
SHA256 4e1729bc6da9b09dd3914f71694f75c06074bf6dc64b985a0099760dc00fcd33
SHA512 19d3ed22232c5f907b951935ff465bea24317421c47934032cb010f250eb8bdebfd6907a26b844716c4da1599d37c54e8275ce67f13810c9b064c962b84e4d94

memory/3804-68-0x0000000074EFE000-0x0000000074EFF000-memory.dmp

memory/4720-69-0x0000000074EF0000-0x00000000756A0000-memory.dmp

memory/3804-70-0x0000000074EF0000-0x00000000756A0000-memory.dmp

memory/3804-71-0x0000000005FE0000-0x00000000061A2000-memory.dmp

memory/3804-72-0x0000000005F20000-0x0000000005F30000-memory.dmp

memory/3804-73-0x0000000006450000-0x000000000645A000-memory.dmp

memory/3804-74-0x0000000074EF0000-0x00000000756A0000-memory.dmp