Analysis
-
max time kernel
48s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 21:38
Static task
static1
Behavioral task
behavioral1
Sample
a0de5117f2db3409eeb42464b5c2e811.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a0de5117f2db3409eeb42464b5c2e811.exe
Resource
win10v2004-20240412-en
General
-
Target
a0de5117f2db3409eeb42464b5c2e811.exe
-
Size
3.0MB
-
MD5
a0de5117f2db3409eeb42464b5c2e811
-
SHA1
20300a63f6c8ccce917110e53bd8d4f1a49407fc
-
SHA256
3ed276242a69770fe215a6cb9941f57e24eb2289635c65c54353fe62ea015e8e
-
SHA512
88c3d52902dd3ed6acb8a525f944b481e8a4c3a7726ab8220e5c9b5981a6ee41f790c5f35323e902b63e9c2c924723ae301819130506906d32b54c334d46e5d3
-
SSDEEP
49152:hrS87rJwyCOjzzXkKkuVVofoPEiNOlpRV1or6/mM4:hrv7CdOjzz0KkuYfoPbNWnLor6+M
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
amadey
4.17
http://193.233.132.167
-
install_dir
4d0ab15804
-
install_file
chrosha.exe
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
Extracted
risepro
147.45.47.93:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
Processes:
a0de5117f2db3409eeb42464b5c2e811.exeexplorha.exeamert.exe17c3a63b92.exeexplorha.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a0de5117f2db3409eeb42464b5c2e811.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amert.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 17c3a63b92.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 38 2276 rundll32.exe 40 1708 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorha.exeexplorha.exea0de5117f2db3409eeb42464b5c2e811.exeamert.exe17c3a63b92.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a0de5117f2db3409eeb42464b5c2e811.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 17c3a63b92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 17c3a63b92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a0de5117f2db3409eeb42464b5c2e811.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amert.exe -
Executes dropped EXE 5 IoCs
Processes:
explorha.exeamert.exe01b278f81c.exe17c3a63b92.exeexplorha.exepid process 2568 explorha.exe 1240 amert.exe 1212 01b278f81c.exe 2860 17c3a63b92.exe 1020 explorha.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
a0de5117f2db3409eeb42464b5c2e811.exeexplorha.exeamert.exe17c3a63b92.exeexplorha.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Wine a0de5117f2db3409eeb42464b5c2e811.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Wine amert.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Wine 17c3a63b92.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Wine explorha.exe -
Loads dropped DLL 18 IoCs
Processes:
a0de5117f2db3409eeb42464b5c2e811.exeexplorha.exerundll32.exerundll32.exerundll32.exepid process 2320 a0de5117f2db3409eeb42464b5c2e811.exe 2568 explorha.exe 2568 explorha.exe 2844 rundll32.exe 2844 rundll32.exe 2844 rundll32.exe 2844 rundll32.exe 2276 rundll32.exe 2276 rundll32.exe 2276 rundll32.exe 2276 rundll32.exe 2568 explorha.exe 2568 explorha.exe 2568 explorha.exe 1708 rundll32.exe 1708 rundll32.exe 1708 rundll32.exe 1708 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorha.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\01b278f81c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000055001\\01b278f81c.exe" explorha.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\17c3a63b92.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000056001\\17c3a63b92.exe" explorha.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000055001\01b278f81c.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
a0de5117f2db3409eeb42464b5c2e811.exeexplorha.exeamert.exe17c3a63b92.exeexplorha.exepid process 2320 a0de5117f2db3409eeb42464b5c2e811.exe 2568 explorha.exe 1240 amert.exe 2860 17c3a63b92.exe 1020 explorha.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
explorha.exedescription pid process target process PID 2568 set thread context of 1020 2568 explorha.exe explorha.exe -
Drops file in Windows directory 2 IoCs
Processes:
a0de5117f2db3409eeb42464b5c2e811.exeamert.exedescription ioc process File created C:\Windows\Tasks\explorha.job a0de5117f2db3409eeb42464b5c2e811.exe File created C:\Windows\Tasks\chrosha.job amert.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
a0de5117f2db3409eeb42464b5c2e811.exeexplorha.exeamert.exechrome.exe17c3a63b92.exerundll32.exepowershell.exeexplorha.exepid process 2320 a0de5117f2db3409eeb42464b5c2e811.exe 2568 explorha.exe 1240 amert.exe 336 chrome.exe 336 chrome.exe 2860 17c3a63b92.exe 2276 rundll32.exe 2276 rundll32.exe 2276 rundll32.exe 2276 rundll32.exe 2276 rundll32.exe 2444 powershell.exe 1020 explorha.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exepowershell.exedescription pid process Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeDebugPrivilege 2444 powershell.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe Token: SeShutdownPrivilege 336 chrome.exe -
Suspicious use of FindShellTrayWindow 48 IoCs
Processes:
a0de5117f2db3409eeb42464b5c2e811.exe01b278f81c.exeamert.exechrome.exepid process 2320 a0de5117f2db3409eeb42464b5c2e811.exe 1212 01b278f81c.exe 1212 01b278f81c.exe 1240 amert.exe 1212 01b278f81c.exe 1212 01b278f81c.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 1212 01b278f81c.exe 336 chrome.exe 336 chrome.exe 1212 01b278f81c.exe 1212 01b278f81c.exe 1212 01b278f81c.exe 1212 01b278f81c.exe 1212 01b278f81c.exe -
Suspicious use of SendNotifyMessage 42 IoCs
Processes:
01b278f81c.exechrome.exepid process 1212 01b278f81c.exe 1212 01b278f81c.exe 1212 01b278f81c.exe 1212 01b278f81c.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 1212 01b278f81c.exe 1212 01b278f81c.exe 1212 01b278f81c.exe 1212 01b278f81c.exe 1212 01b278f81c.exe 1212 01b278f81c.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a0de5117f2db3409eeb42464b5c2e811.exeexplorha.exe01b278f81c.exechrome.exedescription pid process target process PID 2320 wrote to memory of 2568 2320 a0de5117f2db3409eeb42464b5c2e811.exe explorha.exe PID 2320 wrote to memory of 2568 2320 a0de5117f2db3409eeb42464b5c2e811.exe explorha.exe PID 2320 wrote to memory of 2568 2320 a0de5117f2db3409eeb42464b5c2e811.exe explorha.exe PID 2320 wrote to memory of 2568 2320 a0de5117f2db3409eeb42464b5c2e811.exe explorha.exe PID 2568 wrote to memory of 1240 2568 explorha.exe amert.exe PID 2568 wrote to memory of 1240 2568 explorha.exe amert.exe PID 2568 wrote to memory of 1240 2568 explorha.exe amert.exe PID 2568 wrote to memory of 1240 2568 explorha.exe amert.exe PID 2568 wrote to memory of 1212 2568 explorha.exe 01b278f81c.exe PID 2568 wrote to memory of 1212 2568 explorha.exe 01b278f81c.exe PID 2568 wrote to memory of 1212 2568 explorha.exe 01b278f81c.exe PID 2568 wrote to memory of 1212 2568 explorha.exe 01b278f81c.exe PID 1212 wrote to memory of 336 1212 01b278f81c.exe chrome.exe PID 1212 wrote to memory of 336 1212 01b278f81c.exe chrome.exe PID 1212 wrote to memory of 336 1212 01b278f81c.exe chrome.exe PID 1212 wrote to memory of 336 1212 01b278f81c.exe chrome.exe PID 336 wrote to memory of 592 336 chrome.exe chrome.exe PID 336 wrote to memory of 592 336 chrome.exe chrome.exe PID 336 wrote to memory of 592 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 836 336 chrome.exe chrome.exe PID 336 wrote to memory of 1140 336 chrome.exe chrome.exe PID 336 wrote to memory of 1140 336 chrome.exe chrome.exe PID 336 wrote to memory of 1140 336 chrome.exe chrome.exe PID 336 wrote to memory of 1624 336 chrome.exe chrome.exe PID 336 wrote to memory of 1624 336 chrome.exe chrome.exe PID 336 wrote to memory of 1624 336 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0de5117f2db3409eeb42464b5c2e811.exe"C:\Users\Admin\AppData\Local\Temp\a0de5117f2db3409eeb42464b5c2e811.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\1000054001\amert.exe"C:\Users\Admin\AppData\Local\Temp\1000054001\amert.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1240
-
-
C:\Users\Admin\AppData\Local\Temp\1000055001\01b278f81c.exe"C:\Users\Admin\AppData\Local\Temp\1000055001\01b278f81c.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef8069758,0x7fef8069768,0x7fef80697785⤵PID:592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1176 --field-trial-handle=1396,i,17455393265226636704,14990147609184727816,131072 /prefetch:25⤵PID:836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1540 --field-trial-handle=1396,i,17455393265226636704,14990147609184727816,131072 /prefetch:85⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1396,i,17455393265226636704,14990147609184727816,131072 /prefetch:85⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2164 --field-trial-handle=1396,i,17455393265226636704,14990147609184727816,131072 /prefetch:15⤵PID:2788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2172 --field-trial-handle=1396,i,17455393265226636704,14990147609184727816,131072 /prefetch:15⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2880 --field-trial-handle=1396,i,17455393265226636704,14990147609184727816,131072 /prefetch:25⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2264 --field-trial-handle=1396,i,17455393265226636704,14990147609184727816,131072 /prefetch:15⤵PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3624 --field-trial-handle=1396,i,17455393265226636704,14990147609184727816,131072 /prefetch:85⤵PID:2216
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Loads dropped DLL
PID:2844 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2276 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\309405411416_Desktop.zip' -CompressionLevel Optimal5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000056001\17c3a63b92.exe"C:\Users\Admin\AppData\Local\Temp\1000056001\17c3a63b92.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1708
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2144
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\1c028992-1d27-47c3-8d7c-aff14a2a6e3e.tmp
Filesize5KB
MD5b2b68874940211c8c228d981017b1396
SHA127e741f0b6c6960556a815032090bfd35a523fe9
SHA256ca17aceac4af08498711f72eeed604b593a5a080c38044d044a3dfc19b670b45
SHA512832129268931351aecf76e0f174a55da71db0a5bde26a007e062e87c4a4cf8df742b04eae4ba4fbbee16902a40774b1122ea1ba156ce021b6c013874daa9a3fe
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
987B
MD5556f1ec62fec23ce694736003486a0ca
SHA1f858aa5d17417102dfc8cee2e83c9c8efe8681d1
SHA256a0d20fd35cb70fdcb94b81b7646d2e85476fe40bd6b6254ad90fcc4a3049500b
SHA5121964f42e159bc20d915f1f66e332a2c9443f1dea0097fbe7f172ddd2081f2f85d252a329e89896bcfa2ed9f57ec11a35d110a3fdeb75432757cee3e6cb68b7c7
-
Filesize
1KB
MD5082a26aa6feff7770332324277cf6394
SHA1e219c4e1a7365f3b92de0ece84186180503713af
SHA2566c3bcbeb6191678e98161aaaad0704cb63265cb7d08131225759d90b3f027d57
SHA5122e04f6a83f3f41e52563c34c4236757a7984602038b41c70b3c7c9800ab8d16bf2890f28a9e2ff3fb9c8a878699cd59dbf19ecc9256768119d1551c2dffa33a2
-
Filesize
987B
MD5fda66824b4a4c85b5e5301b5d53a7b6e
SHA19ab68f303fbb8ef1b5888206e5e7fb934ddfac1f
SHA2563a566996192b2fdf1dd467356b43bf13892604fb3c8a6b374f06c91e7d066ebc
SHA512e964785a548fa5c33434d2c18d95197d06c8f41be6768f9549b2657805e444ef020f927418acef6b06fe35bb8f9dfb9d3fb07358d3cd805c59386dd92dbe7ddf
-
Filesize
5KB
MD59210c68fc775318d5336f82295c466ad
SHA1d1352bab1a46936c6816e97b8a692aa48bd19cb1
SHA2561e8b82ed3353f9bc3e57d3fd7c21f2ec6082330bf8a9af22b6235d54c62413d6
SHA5126a243ccc3fe02e5ecb0a1194f4b062506c0a6b86b4ef16117de0707fb1eccc40480614e300e96928d51ebcdec5dda5ae0f8571878ee7ed063a2f8537bf9a4915
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
1.8MB
MD51ed78f44a2cad6e08da27edbc701b4bc
SHA1e7a8bc103762db81429b13497c065ac16cac4b85
SHA25620bd5a075cfee256a6cc19803fb9964834590840ada1212f7eca0a9d990e8359
SHA5123882675eadbc45a7b534c0efc671551926bbc333275e03e8a4b23fdfc958af231094b65855fceccf6ec7c63ead1ad1a21bf3853e95eb05adca093a7820c22244
-
Filesize
1.1MB
MD576c779d2a6e42c6dbcff43e67bb38ca3
SHA1558f8e6b714efaeaba794e7d2b7821936a4da077
SHA256e820be731929c621a94de7bd83e0da4796c103632961bda20ffbd568279e6f43
SHA512516d91d0e635f3468d135bf51f507fe3d81c1fb72c8baccc08a0e7c05c6dcaefd2816ca937cb2f8ca0ab8f4c8e78a2917b22dc10c289221e8450cfba34bebf3e
-
Filesize
2.2MB
MD53709ad0a7007bcae942b905a07bd6bba
SHA19d25192c841f3b2fb1b9bbb0dfdcec6cdaaca3a7
SHA2562248caa741ec4d757c597091f2bab56f694181ef5a677bdab47d990e4c7f695a
SHA512d41cbc49ded02909e0eae68da22988c36993bde9db4025f64d45007d2c47ed07a7cdc1a2b28ae1cb7ecb8d4c5169cb4084650adaddb656caf33b4e0ad85239fc
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
3.0MB
MD5a0de5117f2db3409eeb42464b5c2e811
SHA120300a63f6c8ccce917110e53bd8d4f1a49407fc
SHA2563ed276242a69770fe215a6cb9941f57e24eb2289635c65c54353fe62ea015e8e
SHA51288c3d52902dd3ed6acb8a525f944b481e8a4c3a7726ab8220e5c9b5981a6ee41f790c5f35323e902b63e9c2c924723ae301819130506906d32b54c334d46e5d3