Analysis
-
max time kernel
111s -
max time network
262s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a.exe
Resource
win10-20240404-en
General
-
Target
1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a.exe
-
Size
2.8MB
-
MD5
d2bf840dc942875d4c7b0514e276b3a8
-
SHA1
6f24363af15cf0c681ae0d0798537abde40eaf5a
-
SHA256
1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a
-
SHA512
e6632291603f16f44a6f9bc4b380c9c6a042db37c5671b292b12f44bf482a5261fa8cd32d40275086ad463f6981caf5dbc27b894b715cda61e7650a3ad661138
-
SSDEEP
49152:bEfP5+ZCHEINQvII48Cbi++G+scRJSR3EJ3M6pBVP3+:G5gCkIQvII48C2D3sKJ0EJjpB9O
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
amadey
4.17
http://193.233.132.167
-
install_dir
4d0ab15804
-
install_file
chrosha.exe
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
Extracted
risepro
147.45.47.93:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amert.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aa41c87a8f.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 38 2348 rundll32.exe 40 2416 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aa41c87a8f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aa41c87a8f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a.exe -
Executes dropped EXE 4 IoCs
pid Process 1960 explorha.exe 2844 amert.exe 1740 06ea315373.exe 1044 aa41c87a8f.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Wine 1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a.exe Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Wine amert.exe Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Wine aa41c87a8f.exe -
Loads dropped DLL 19 IoCs
pid Process 1512 1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a.exe 1512 1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a.exe 1960 explorha.exe 1960 explorha.exe 1960 explorha.exe 1960 explorha.exe 1960 explorha.exe 2712 rundll32.exe 2712 rundll32.exe 2712 rundll32.exe 2712 rundll32.exe 2348 rundll32.exe 2348 rundll32.exe 2348 rundll32.exe 2348 rundll32.exe 2416 rundll32.exe 2416 rundll32.exe 2416 rundll32.exe 2416 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\06ea315373.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000055001\\06ea315373.exe" explorha.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\aa41c87a8f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000056001\\aa41c87a8f.exe" explorha.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0006000000016d0e-84.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1512 1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a.exe 1960 explorha.exe 2844 amert.exe 1044 aa41c87a8f.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\explorha.job 1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a.exe File created C:\Windows\Tasks\chrosha.job amert.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1512 1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a.exe 1960 explorha.exe 2844 amert.exe 596 chrome.exe 596 chrome.exe 1044 aa41c87a8f.exe 2348 rundll32.exe 2348 rundll32.exe 2348 rundll32.exe 2348 rundll32.exe 2348 rundll32.exe 1516 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeDebugPrivilege 1516 powershell.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe Token: SeShutdownPrivilege 596 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1512 1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a.exe 1740 06ea315373.exe 2844 amert.exe 1740 06ea315373.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 1740 06ea315373.exe 1740 06ea315373.exe 596 chrome.exe 596 chrome.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1740 06ea315373.exe 1740 06ea315373.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 596 chrome.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe 1740 06ea315373.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1512 wrote to memory of 1960 1512 1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a.exe 28 PID 1512 wrote to memory of 1960 1512 1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a.exe 28 PID 1512 wrote to memory of 1960 1512 1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a.exe 28 PID 1512 wrote to memory of 1960 1512 1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a.exe 28 PID 1960 wrote to memory of 2844 1960 explorha.exe 29 PID 1960 wrote to memory of 2844 1960 explorha.exe 29 PID 1960 wrote to memory of 2844 1960 explorha.exe 29 PID 1960 wrote to memory of 2844 1960 explorha.exe 29 PID 1960 wrote to memory of 1740 1960 explorha.exe 31 PID 1960 wrote to memory of 1740 1960 explorha.exe 31 PID 1960 wrote to memory of 1740 1960 explorha.exe 31 PID 1960 wrote to memory of 1740 1960 explorha.exe 31 PID 1740 wrote to memory of 596 1740 06ea315373.exe 32 PID 1740 wrote to memory of 596 1740 06ea315373.exe 32 PID 1740 wrote to memory of 596 1740 06ea315373.exe 32 PID 1740 wrote to memory of 596 1740 06ea315373.exe 32 PID 596 wrote to memory of 784 596 chrome.exe 33 PID 596 wrote to memory of 784 596 chrome.exe 33 PID 596 wrote to memory of 784 596 chrome.exe 33 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 1708 596 chrome.exe 35 PID 596 wrote to memory of 2164 596 chrome.exe 36 PID 596 wrote to memory of 2164 596 chrome.exe 36 PID 596 wrote to memory of 2164 596 chrome.exe 36 PID 596 wrote to memory of 788 596 chrome.exe 37 PID 596 wrote to memory of 788 596 chrome.exe 37 PID 596 wrote to memory of 788 596 chrome.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a.exe"C:\Users\Admin\AppData\Local\Temp\1eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\1000054001\amert.exe"C:\Users\Admin\AppData\Local\Temp\1000054001\amert.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2844
-
-
C:\Users\Admin\AppData\Local\Temp\1000055001\06ea315373.exe"C:\Users\Admin\AppData\Local\Temp\1000055001\06ea315373.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7049758,0x7fef7049768,0x7fef70497785⤵PID:784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1116 --field-trial-handle=1180,i,1779779190571769153,8922681536387524666,131072 /prefetch:25⤵PID:1708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1180,i,1779779190571769153,8922681536387524666,131072 /prefetch:85⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1180,i,1779779190571769153,8922681536387524666,131072 /prefetch:85⤵PID:788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2236 --field-trial-handle=1180,i,1779779190571769153,8922681536387524666,131072 /prefetch:15⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2244 --field-trial-handle=1180,i,1779779190571769153,8922681536387524666,131072 /prefetch:15⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3240 --field-trial-handle=1180,i,1779779190571769153,8922681536387524666,131072 /prefetch:15⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1376 --field-trial-handle=1180,i,1779779190571769153,8922681536387524666,131072 /prefetch:25⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3404 --field-trial-handle=1180,i,1779779190571769153,8922681536387524666,131072 /prefetch:85⤵PID:1732
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000056001\aa41c87a8f.exe"C:\Users\Admin\AppData\Local\Temp\1000056001\aa41c87a8f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1044
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"3⤵PID:2064
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Loads dropped DLL
PID:2712 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:2584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\248906074286_Desktop.zip' -CompressionLevel Optimal5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2416
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2536
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5ab25583d08d74b9d41cfa6bb104943dc
SHA122b62d0d3994d9af9ece034363e280a72687920e
SHA2563421635479c3e21caf324ac90f743a2aaf6b73b5cc7470cc06972e1b09a6839b
SHA51267c9f82a5dc8355564ad73156b1646edb8cdee5cf9d652886f6a1890c3eb5be693afc3887879be5debc5753f345329e8c2559a9258e60b182ed83b299aa66f37
-
Filesize
1KB
MD5604d1f2115c48ba3af58aaeadaccd56c
SHA1e7792c4cab6b98c505cb435cb37485984ce992c0
SHA256853928701a4b5daecb158f4d74b9033c888f4a526bbf77226123ae463eaaf4cf
SHA5128730b49e57de8d8e040586a5c58802ef9e4473fc9e131b56ace26f608ef524e92c65186a9d85ba618e7e3c98a61b0d6ecebd0489695a393b7d7fc857a09b0ad9
-
Filesize
6KB
MD5a9bb4f40af4f30c6775ee00bfe772e48
SHA1eebaf19f415b8040463d098ba99bc124b2287b7b
SHA256a0b38397870732e0ef260b841b584c98b51b2ae655933b3e495f5a21c012b017
SHA5127eced0205ccf66dcfbc3bb6c4ee45dfa87ca383440b5c5e2d68b55d98b507016873020bad52865299742d1d4b7a4c09520979d4f58a11918183a657efe35474f
-
Filesize
6KB
MD59b540f0bd7823c5ea90be0e07852af67
SHA19e677806e4c0cd7bfe77a4f9f1ebea4ec66d1cf9
SHA256f876b6023024f7e68c5c6c2568b026f7acb2824ae5eb1a49f4449ee42c90bf29
SHA512627cf7dadb2887e3288672e525eefdc2f96d02c1c9f99530bd2f7c6e8ff68d4099871b92b8d6de491604cb12cc387050356e1de8b67ed1337014a4a6808b8629
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
1.8MB
MD51ed78f44a2cad6e08da27edbc701b4bc
SHA1e7a8bc103762db81429b13497c065ac16cac4b85
SHA25620bd5a075cfee256a6cc19803fb9964834590840ada1212f7eca0a9d990e8359
SHA5123882675eadbc45a7b534c0efc671551926bbc333275e03e8a4b23fdfc958af231094b65855fceccf6ec7c63ead1ad1a21bf3853e95eb05adca093a7820c22244
-
Filesize
1.1MB
MD576c779d2a6e42c6dbcff43e67bb38ca3
SHA1558f8e6b714efaeaba794e7d2b7821936a4da077
SHA256e820be731929c621a94de7bd83e0da4796c103632961bda20ffbd568279e6f43
SHA512516d91d0e635f3468d135bf51f507fe3d81c1fb72c8baccc08a0e7c05c6dcaefd2816ca937cb2f8ca0ab8f4c8e78a2917b22dc10c289221e8450cfba34bebf3e
-
Filesize
2.2MB
MD53709ad0a7007bcae942b905a07bd6bba
SHA19d25192c841f3b2fb1b9bbb0dfdcec6cdaaca3a7
SHA2562248caa741ec4d757c597091f2bab56f694181ef5a677bdab47d990e4c7f695a
SHA512d41cbc49ded02909e0eae68da22988c36993bde9db4025f64d45007d2c47ed07a7cdc1a2b28ae1cb7ecb8d4c5169cb4084650adaddb656caf33b4e0ad85239fc
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
Filesize
2.8MB
MD5d2bf840dc942875d4c7b0514e276b3a8
SHA16f24363af15cf0c681ae0d0798537abde40eaf5a
SHA2561eb1a6bb332a6ca4f404595730ade0716763761e39abff464231a51d978f384a
SHA512e6632291603f16f44a6f9bc4b380c9c6a042db37c5671b292b12f44bf482a5261fa8cd32d40275086ad463f6981caf5dbc27b894b715cda61e7650a3ad661138