Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-04-2024 18:54
Static task
static1
Behavioral task
behavioral1
Sample
conan.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
conan.exe
Resource
win10v2004-20240226-en
General
-
Target
conan.exe
-
Size
822KB
-
MD5
f29bb9918f3803046c2bab24c20b458d
-
SHA1
c162f42333a6a7ef23ea9fc17e470daece374b6c
-
SHA256
b84760ded0544c86d23849130082b99c3000b1e4ca5da0690fcdfbf2771b7993
-
SHA512
e9f27f3be82a4b32ad155067b5e7c8652ec2031321eec64574152f2ddb01ff20dc9f44ee75ff7c363b103e3d8a7952c013416f360527e969963a11dea023a164
-
SSDEEP
24576:OYHymN8tZiUqGvCBSYcjOaTKsB5Oih4un0:OYRNyZiUqwCgYWHhn
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ u8frcVVDI6sXvEJHPjLj.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ PbdS7oLPWBmLc719hHgb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2d3afcbba3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amert.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 185 4476 rundll32.exe 169 5376 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2d3afcbba3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion PbdS7oLPWBmLc719hHgb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion u8frcVVDI6sXvEJHPjLj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion u8frcVVDI6sXvEJHPjLj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PbdS7oLPWBmLc719hHgb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2d3afcbba3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation conan.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation u8frcVVDI6sXvEJHPjLj.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation explorha.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeMS131.lnk conan.exe -
Executes dropped EXE 9 IoCs
pid Process 4224 u8frcVVDI6sXvEJHPjLj.exe 2244 o4crizxIYyBXjlrNHB8A.exe 4456 explorha.exe 32 PbdS7oLPWBmLc719hHgb.exe 2244 2d3afcbba3.exe 4440 go.exe 2020 amert.exe 5228 explorha.exe 5260 explorgu.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Wine u8frcVVDI6sXvEJHPjLj.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Wine amert.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Wine explorgu.exe -
Loads dropped DLL 3 IoCs
pid Process 760 rundll32.exe 4476 rundll32.exe 5376 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000200000001e6f9-172.dat themida behavioral2/memory/32-207-0x0000000000370000-0x0000000000B0E000-memory.dmp themida behavioral2/memory/32-208-0x0000000000370000-0x0000000000B0E000-memory.dmp themida behavioral2/memory/32-209-0x0000000000370000-0x0000000000B0E000-memory.dmp themida behavioral2/memory/32-218-0x0000000000370000-0x0000000000B0E000-memory.dmp themida behavioral2/memory/32-219-0x0000000000370000-0x0000000000B0E000-memory.dmp themida behavioral2/memory/32-220-0x0000000000370000-0x0000000000B0E000-memory.dmp themida behavioral2/memory/32-221-0x0000000000370000-0x0000000000B0E000-memory.dmp themida behavioral2/memory/32-222-0x0000000000370000-0x0000000000B0E000-memory.dmp themida behavioral2/memory/32-224-0x0000000000370000-0x0000000000B0E000-memory.dmp themida behavioral2/memory/2244-234-0x00000000000F0000-0x000000000088E000-memory.dmp themida behavioral2/memory/2244-235-0x00000000000F0000-0x000000000088E000-memory.dmp themida behavioral2/memory/2244-236-0x00000000000F0000-0x000000000088E000-memory.dmp themida behavioral2/memory/2244-237-0x00000000000F0000-0x000000000088E000-memory.dmp themida behavioral2/memory/2244-238-0x00000000000F0000-0x000000000088E000-memory.dmp themida behavioral2/memory/2244-239-0x00000000000F0000-0x000000000088E000-memory.dmp themida behavioral2/memory/2244-240-0x00000000000F0000-0x000000000088E000-memory.dmp themida behavioral2/memory/2244-241-0x00000000000F0000-0x000000000088E000-memory.dmp themida behavioral2/memory/2244-242-0x00000000000F0000-0x000000000088E000-memory.dmp themida behavioral2/memory/32-250-0x0000000000370000-0x0000000000B0E000-memory.dmp themida behavioral2/memory/2244-283-0x00000000000F0000-0x000000000088E000-memory.dmp themida -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 conan.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 conan.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 conan.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RageMP131 = "C:\\Users\\Admin\\AppData\\Local\\RageMP131\\RageMP131.exe" conan.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeUpdaterV131_708f86c7449baa8ed309c374f21ce511 = "C:\\Users\\Admin\\AppData\\Local\\AdobeUpdaterV131_708f86c7449baa8ed309c374f21ce511\\AdobeUpdaterV131.exe" conan.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeUpdaterV131_d5c0b6b49b90787cd18a3dc2db430415 = "C:\\Users\\Admin\\AppData\\Local\\AdobeUpdaterV131_d5c0b6b49b90787cd18a3dc2db430415\\AdobeUpdaterV131.exe" conan.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeUpdaterV131_346889e96494e8fd7895d6ab35be317c = "C:\\Users\\Admin\\AppData\\Local\\AdobeUpdaterV131_346889e96494e8fd7895d6ab35be317c\\AdobeUpdaterV131.exe" conan.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\go.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000044001\\go.exe" explorha.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PbdS7oLPWBmLc719hHgb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2d3afcbba3.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 45 ipinfo.io 46 ipinfo.io -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000700000002326c-125.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 4224 u8frcVVDI6sXvEJHPjLj.exe 4456 explorha.exe 2020 amert.exe 5260 explorgu.exe 5228 explorha.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\explorgu.job amert.exe File created C:\Windows\Tasks\explorha.job u8frcVVDI6sXvEJHPjLj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3580 460 WerFault.exe 90 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 conan.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString conan.exe -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4896 schtasks.exe 1236 schtasks.exe 3344 schtasks.exe 2488 schtasks.exe 2472 schtasks.exe 5096 schtasks.exe 956 schtasks.exe 1008 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3808065738-1666277613-1125846146-1000\{A78E9027-BBE1-42B7-BD4A-674EE82DB382} msedge.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 460 conan.exe 460 conan.exe 460 conan.exe 460 conan.exe 460 conan.exe 460 conan.exe 460 conan.exe 460 conan.exe 460 conan.exe 460 conan.exe 460 conan.exe 460 conan.exe 460 conan.exe 460 conan.exe 4224 u8frcVVDI6sXvEJHPjLj.exe 4224 u8frcVVDI6sXvEJHPjLj.exe 4456 explorha.exe 4456 explorha.exe 4476 rundll32.exe 4476 rundll32.exe 4476 rundll32.exe 4476 rundll32.exe 4476 rundll32.exe 4476 rundll32.exe 4476 rundll32.exe 4476 rundll32.exe 4476 rundll32.exe 4476 rundll32.exe 412 powershell.exe 412 powershell.exe 412 powershell.exe 2020 amert.exe 2020 amert.exe 5260 explorgu.exe 5260 explorgu.exe 5228 explorha.exe 5228 explorha.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 412 powershell.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 2244 o4crizxIYyBXjlrNHB8A.exe 2244 o4crizxIYyBXjlrNHB8A.exe 2244 o4crizxIYyBXjlrNHB8A.exe 2244 o4crizxIYyBXjlrNHB8A.exe 4224 u8frcVVDI6sXvEJHPjLj.exe 2244 o4crizxIYyBXjlrNHB8A.exe 2244 o4crizxIYyBXjlrNHB8A.exe 2244 o4crizxIYyBXjlrNHB8A.exe 2244 o4crizxIYyBXjlrNHB8A.exe 4440 go.exe 4440 go.exe 4440 go.exe 4440 go.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2244 o4crizxIYyBXjlrNHB8A.exe 2244 o4crizxIYyBXjlrNHB8A.exe 2244 o4crizxIYyBXjlrNHB8A.exe 2244 o4crizxIYyBXjlrNHB8A.exe 2244 o4crizxIYyBXjlrNHB8A.exe 2244 o4crizxIYyBXjlrNHB8A.exe 2244 o4crizxIYyBXjlrNHB8A.exe 2244 o4crizxIYyBXjlrNHB8A.exe 4440 go.exe 4440 go.exe 4440 go.exe 4440 go.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 460 wrote to memory of 1236 460 conan.exe 102 PID 460 wrote to memory of 1236 460 conan.exe 102 PID 460 wrote to memory of 1236 460 conan.exe 102 PID 460 wrote to memory of 3344 460 conan.exe 104 PID 460 wrote to memory of 3344 460 conan.exe 104 PID 460 wrote to memory of 3344 460 conan.exe 104 PID 460 wrote to memory of 2488 460 conan.exe 108 PID 460 wrote to memory of 2488 460 conan.exe 108 PID 460 wrote to memory of 2488 460 conan.exe 108 PID 460 wrote to memory of 2472 460 conan.exe 110 PID 460 wrote to memory of 2472 460 conan.exe 110 PID 460 wrote to memory of 2472 460 conan.exe 110 PID 460 wrote to memory of 4224 460 conan.exe 112 PID 460 wrote to memory of 4224 460 conan.exe 112 PID 460 wrote to memory of 4224 460 conan.exe 112 PID 460 wrote to memory of 5096 460 conan.exe 113 PID 460 wrote to memory of 5096 460 conan.exe 113 PID 460 wrote to memory of 5096 460 conan.exe 113 PID 460 wrote to memory of 956 460 conan.exe 115 PID 460 wrote to memory of 956 460 conan.exe 115 PID 460 wrote to memory of 956 460 conan.exe 115 PID 460 wrote to memory of 2244 460 conan.exe 137 PID 460 wrote to memory of 2244 460 conan.exe 137 PID 460 wrote to memory of 2244 460 conan.exe 137 PID 2244 wrote to memory of 2188 2244 o4crizxIYyBXjlrNHB8A.exe 118 PID 2244 wrote to memory of 2188 2244 o4crizxIYyBXjlrNHB8A.exe 118 PID 4224 wrote to memory of 4456 4224 u8frcVVDI6sXvEJHPjLj.exe 120 PID 4224 wrote to memory of 4456 4224 u8frcVVDI6sXvEJHPjLj.exe 120 PID 4224 wrote to memory of 4456 4224 u8frcVVDI6sXvEJHPjLj.exe 120 PID 2244 wrote to memory of 2588 2244 o4crizxIYyBXjlrNHB8A.exe 121 PID 2244 wrote to memory of 2588 2244 o4crizxIYyBXjlrNHB8A.exe 121 PID 2244 wrote to memory of 5116 2244 o4crizxIYyBXjlrNHB8A.exe 126 PID 2244 wrote to memory of 5116 2244 o4crizxIYyBXjlrNHB8A.exe 126 PID 460 wrote to memory of 1008 460 conan.exe 129 PID 460 wrote to memory of 1008 460 conan.exe 129 PID 460 wrote to memory of 1008 460 conan.exe 129 PID 460 wrote to memory of 4896 460 conan.exe 134 PID 460 wrote to memory of 4896 460 conan.exe 134 PID 460 wrote to memory of 4896 460 conan.exe 134 PID 460 wrote to memory of 32 460 conan.exe 136 PID 460 wrote to memory of 32 460 conan.exe 136 PID 460 wrote to memory of 32 460 conan.exe 136 PID 4456 wrote to memory of 2244 4456 explorha.exe 137 PID 4456 wrote to memory of 2244 4456 explorha.exe 137 PID 4456 wrote to memory of 2244 4456 explorha.exe 137 PID 4456 wrote to memory of 760 4456 explorha.exe 141 PID 4456 wrote to memory of 760 4456 explorha.exe 141 PID 4456 wrote to memory of 760 4456 explorha.exe 141 PID 760 wrote to memory of 4476 760 rundll32.exe 142 PID 760 wrote to memory of 4476 760 rundll32.exe 142 PID 4476 wrote to memory of 1984 4476 rundll32.exe 143 PID 4476 wrote to memory of 1984 4476 rundll32.exe 143 PID 4456 wrote to memory of 4104 4456 explorha.exe 145 PID 4456 wrote to memory of 4104 4456 explorha.exe 145 PID 4456 wrote to memory of 4104 4456 explorha.exe 145 PID 4456 wrote to memory of 4440 4456 explorha.exe 146 PID 4456 wrote to memory of 4440 4456 explorha.exe 146 PID 4456 wrote to memory of 4440 4456 explorha.exe 146 PID 4440 wrote to memory of 3276 4440 go.exe 147 PID 4440 wrote to memory of 3276 4440 go.exe 147 PID 4440 wrote to memory of 4248 4440 go.exe 148 PID 4440 wrote to memory of 4248 4440 go.exe 148 PID 4440 wrote to memory of 2368 4440 go.exe 149 PID 4440 wrote to memory of 2368 4440 go.exe 149 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 conan.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 conan.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\conan.exe"C:\Users\Admin\AppData\Local\Temp\conan.exe"1⤵
- Checks computer location settings
- Drops startup file
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:460 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:1236
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:3344
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_708f86c7449baa8ed309c374f21ce511\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_708f86c7449baa8ed309c374f21ce511 HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:2488
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_708f86c7449baa8ed309c374f21ce511\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_708f86c7449baa8ed309c374f21ce511 LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\heidi_43104FVULoT\u8frcVVDI6sXvEJHPjLj.exe"C:\Users\Admin\AppData\Local\Temp\heidi_43104FVULoT\u8frcVVDI6sXvEJHPjLj.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\1000042001\2d3afcbba3.exe"C:\Users\Admin\AppData\Local\Temp\1000042001\2d3afcbba3.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2244
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\system32\netsh.exenetsh wlan show profiles6⤵PID:1984
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\808065738166_Desktop.zip' -CompressionLevel Optimal6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:412
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"4⤵PID:4104
-
-
C:\Users\Admin\AppData\Local\Temp\1000044001\go.exe"C:\Users\Admin\AppData\Local\Temp\1000044001\go.exe"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account5⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video5⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/5⤵PID:2368
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000046001\amert.exe"C:\Users\Admin\AppData\Local\Temp\1000046001\amert.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5376
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_d5c0b6b49b90787cd18a3dc2db430415\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_d5c0b6b49b90787cd18a3dc2db430415 HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:5096
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_d5c0b6b49b90787cd18a3dc2db430415\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_d5c0b6b49b90787cd18a3dc2db430415 LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:956
-
-
C:\Users\Admin\AppData\Local\Temp\heidi_43104FVULoT\o4crizxIYyBXjlrNHB8A.exe"C:\Users\Admin\AppData\Local\Temp\heidi_43104FVULoT\o4crizxIYyBXjlrNHB8A.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account3⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video3⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/3⤵PID:5116
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_346889e96494e8fd7895d6ab35be317c\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_346889e96494e8fd7895d6ab35be317c HR" /sc HOURLY /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:1008
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_346889e96494e8fd7895d6ab35be317c\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_346889e96494e8fd7895d6ab35be317c LG" /sc ONLOGON /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:4896
-
-
C:\Users\Admin\AppData\Local\Temp\heidi_43104FVULoT\PbdS7oLPWBmLc719hHgb.exe"C:\Users\Admin\AppData\Local\Temp\heidi_43104FVULoT\PbdS7oLPWBmLc719hHgb.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:32
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 21402⤵
- Program crash
PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=3528 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:31⤵PID:396
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3484 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:81⤵PID:3152
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --mojo-platform-channel-handle=4948 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:11⤵PID:4904
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=4104 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:11⤵PID:1600
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=4716 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:11⤵PID:4048
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5236 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:81⤵PID:4040
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --mojo-platform-channel-handle=5876 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:11⤵PID:2880
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --mojo-platform-channel-handle=5868 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:11⤵PID:652
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6212 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:81⤵PID:4584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --mojo-platform-channel-handle=6444 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:81⤵PID:4080
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=6476 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:81⤵
- Modifies registry class
PID:3952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 460 -ip 4601⤵PID:760
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=3928 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:81⤵PID:6088
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5228
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5260
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Credential Access
Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
1KB
MD5506d1a7fccc0aed5e8dc484dedbc0a7f
SHA172bcef89ae37148bcd852c1edf048f49b6adc9f8
SHA256b3630f62c2368d1507753843961ef8d99e35653dfec3ffe880ebc6675e35f891
SHA512c25c608bcea7524b46a78a083615b4c4adaa6b00749a861f2f6eefa52d3a35208c3959c1f5450bbd623da1c421e068802a838526189003c8c33ed59ed9b19816
-
Filesize
1KB
MD590d19b07c550fee6492ad371959969a6
SHA1cbbd585e64da78cfcc4cf5ba90e65b822f4c8946
SHA256d8f7bac3505c354a33e9f2ee57a8941d4d484c3f69a990663edabaf58d25119d
SHA512780e5b3f80618b6d3f516d11cc8242188018de0f6e4e3b1a9d1e675e0813aa3a99a46262132b403ff222d2d95e363dde5e228990f0b21bdf26745fd81cb8ea52
-
Filesize
1KB
MD50c8bb4019b0990b8448d47d501dcbea9
SHA16d26b7253a15ec3c994658bb1ecdc9b3975668d1
SHA25624a3b86ff25a8cbe3e3374514c84ee14710a63f3b1adc3da1275b87239eee70f
SHA512b8c90042cd465be5c8c6c727003242c99ae1ff8daed30a26bfdada8a661f13fc2054c54b9150be84d672231e04287b15532dd1970e6af7e6a80d7f3eaf094e3f
-
Filesize
1.8MB
MD5f8aa76a01927e5132934ae1b3ae2f106
SHA19f9c80772c65bdb4711d512a417bab4466d71422
SHA2569f553169a2f5d323ee83f17e294bcc6820cc09e5ac0ef9f6d1be64bb2c9b8955
SHA512718368af954efae9ff33ee1a102cd2ea16228135b1877932a8fdef11312f7616d324034f157efb331fbe669dbcb6f1d733c6004d90669f863727d3f19526e1cb
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
220KB
MD5c6af9c47246bdb595a5f136e97106ba5
SHA154da023d802239a01bbcc0eea16d5106201d01bf
SHA256780249f61eaef2e46d77d552367b27941e2cc23a7e9971717a2bb5c051fc956c
SHA5126d6b0d8b12aebc7e51a18ac7b18a27c3e30105a635afb63a3eb5d455671bb07d2e3f251d581960cf39e1a13c971a6353d2c8451f90b5707aaf409eaea6dbbf6f
-
Filesize
3.0MB
MD5fb00b486ac92ab8f06d4bc0805894d6a
SHA1d4817503ec6d9761aae25f55632e6f38274b61af
SHA256036443dacd073db8584a80bbe323986b3c5646e562c608e5111e9debfdb6f591
SHA5121bd4d2579ff84e4f3e480814e261ae552dd0a82dce793bfaa001c2b389f963be1b074795c3503d92b061a52944bdfc87da236d65f5531ceab596a27122b92660
-
Filesize
92KB
MD54c2e2189b87f507edc2e72d7d55583a0
SHA11f06e340f76d41ea0d1e8560acd380a901b2a5bd
SHA25699a5f8dea08b5cf512ed888b3e533cc77c08dc644078793dc870abd8828c1bca
SHA5128b6b49e55afe8a697aaf71d975fab9e906143339827f75a57876a540d0d7b9e3cbbcdd8b5435d6198900a73895cc52d2082e66ee8cec342e72f2e427dde71600
-
Filesize
894KB
MD52f8912af892c160c1c24c9f38a60c1ab
SHA1d2deae508e262444a8f15c29ebcc7ebbe08a3fdb
SHA25659ff8e0aa665fbbf749c7548906a655cb1869bb58a3b7546efa5b416d19e6308
SHA5120395383bde98d358b0a7f2224f903dff026ce0c6d90feb49ac0e6993ef692143b0eb25da84d9cdc9e7b373a7b75a6dbaef14746eda1bff165d59f07ca51a16bb
-
Filesize
1.8MB
MD5bb0d35bfac57b5b690047522b25d81d0
SHA1cc42b04151bbc1aa4761065b54a41b3868e4e5d2
SHA2567f16c16543c6366d21bd00d3afbc14145389e889c3f35fda6099162fdc6033c6
SHA5124d06d3bbd3d2fa540c05bca2042016aa875e64fa39bfa456346abca790eaf3a3789b632c5de9d3570a692fa88d25f68c8c6e35543f6aeed33934962e74cd2c59
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444