Analysis
-
max time kernel
29s -
max time network
271s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 22:27
Static task
static1
Behavioral task
behavioral1
Sample
256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exe
Resource
win7-20240221-en
General
-
Target
256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exe
-
Size
2.9MB
-
MD5
fb9013139f2568146f3db1a376908f08
-
SHA1
9dba582a4dd436e70444f4607858f215bb3e5f0f
-
SHA256
256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26
-
SHA512
ada9b0d18737cf64162eb8decd29dc98b10a3aff52e21a19785c24d3d6616a4c2431a45131024d1108da9334cafe8ebcf2b127a74e50c4a3b37c33bd59ddc433
-
SSDEEP
24576:zaEid4Bn1gYPGT64NVjrSE8RzHifChWJmp2eE1vg9CLeFHR2vZI6x6YjkfEDMDHu:zMdm1TGTrxUr4LNIHywkWsaLtrU
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
amadey
4.17
http://193.233.132.167
-
install_dir
4d0ab15804
-
install_file
chrosha.exe
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
Processes:
explorha.exeamert.exebdc8b54c22.exe256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amert.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bdc8b54c22.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exe -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 38 2208 rundll32.exe 44 1028 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exeexplorha.exeamert.exebdc8b54c22.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bdc8b54c22.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bdc8b54c22.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exe -
Executes dropped EXE 4 IoCs
Processes:
explorha.exeamert.exec8659f243c.exebdc8b54c22.exepid process 2460 explorha.exe 696 amert.exe 1688 c8659f243c.exe 1072 bdc8b54c22.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exeexplorha.exeamert.exebdc8b54c22.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Wine 256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exe Key opened \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Wine amert.exe Key opened \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Wine bdc8b54c22.exe -
Loads dropped DLL 19 IoCs
Processes:
256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exeexplorha.exerundll32.exerundll32.exerundll32.exepid process 2948 256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exe 2948 256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exe 2460 explorha.exe 2460 explorha.exe 2864 rundll32.exe 2864 rundll32.exe 2864 rundll32.exe 2864 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2460 explorha.exe 2460 explorha.exe 2460 explorha.exe 1028 rundll32.exe 1028 rundll32.exe 1028 rundll32.exe 1028 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorha.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\bdc8b54c22.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000056001\\bdc8b54c22.exe" explorha.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\c8659f243c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000055001\\c8659f243c.exe" explorha.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000055001\c8659f243c.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exeexplorha.exeamert.exebdc8b54c22.exepid process 2948 256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exe 2460 explorha.exe 696 amert.exe 1072 bdc8b54c22.exe -
Drops file in Windows directory 2 IoCs
Processes:
256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exeamert.exedescription ioc process File created C:\Windows\Tasks\explorha.job 256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exe File created C:\Windows\Tasks\chrosha.job amert.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exeexplorha.exeamert.exechrome.exerundll32.exepowershell.exebdc8b54c22.exepid process 2948 256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exe 2460 explorha.exe 696 amert.exe 2076 chrome.exe 2076 chrome.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2968 powershell.exe 1072 bdc8b54c22.exe -
Suspicious use of AdjustPrivilegeToken 39 IoCs
Processes:
chrome.exepowershell.exedescription pid process Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeDebugPrivilege 2968 powershell.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exeamert.exec8659f243c.exechrome.exepid process 2948 256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exe 696 amert.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 2076 chrome.exe 2076 chrome.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe -
Suspicious use of SendNotifyMessage 59 IoCs
Processes:
c8659f243c.exechrome.exepid process 1688 c8659f243c.exe 1688 c8659f243c.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe 1688 c8659f243c.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exeexplorha.exec8659f243c.exechrome.exedescription pid process target process PID 2948 wrote to memory of 2460 2948 256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exe explorha.exe PID 2948 wrote to memory of 2460 2948 256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exe explorha.exe PID 2948 wrote to memory of 2460 2948 256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exe explorha.exe PID 2948 wrote to memory of 2460 2948 256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exe explorha.exe PID 2460 wrote to memory of 696 2460 explorha.exe amert.exe PID 2460 wrote to memory of 696 2460 explorha.exe amert.exe PID 2460 wrote to memory of 696 2460 explorha.exe amert.exe PID 2460 wrote to memory of 696 2460 explorha.exe amert.exe PID 2460 wrote to memory of 1688 2460 explorha.exe c8659f243c.exe PID 2460 wrote to memory of 1688 2460 explorha.exe c8659f243c.exe PID 2460 wrote to memory of 1688 2460 explorha.exe c8659f243c.exe PID 2460 wrote to memory of 1688 2460 explorha.exe c8659f243c.exe PID 1688 wrote to memory of 2076 1688 c8659f243c.exe chrome.exe PID 1688 wrote to memory of 2076 1688 c8659f243c.exe chrome.exe PID 1688 wrote to memory of 2076 1688 c8659f243c.exe chrome.exe PID 1688 wrote to memory of 2076 1688 c8659f243c.exe chrome.exe PID 2076 wrote to memory of 2140 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2140 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2140 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 2996 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 3044 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 3044 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 3044 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 348 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 348 2076 chrome.exe chrome.exe PID 2076 wrote to memory of 348 2076 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exe"C:\Users\Admin\AppData\Local\Temp\256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\1000054001\amert.exe"C:\Users\Admin\AppData\Local\Temp\1000054001\amert.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:696
-
-
C:\Users\Admin\AppData\Local\Temp\1000055001\c8659f243c.exe"C:\Users\Admin\AppData\Local\Temp\1000055001\c8659f243c.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef67d9758,0x7fef67d9768,0x7fef67d97785⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1380,i,7036380138868648504,12065403412080323436,131072 /prefetch:25⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1444 --field-trial-handle=1380,i,7036380138868648504,12065403412080323436,131072 /prefetch:85⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1380,i,7036380138868648504,12065403412080323436,131072 /prefetch:85⤵PID:348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2168 --field-trial-handle=1380,i,7036380138868648504,12065403412080323436,131072 /prefetch:15⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2176 --field-trial-handle=1380,i,7036380138868648504,12065403412080323436,131072 /prefetch:15⤵PID:960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3240 --field-trial-handle=1380,i,7036380138868648504,12065403412080323436,131072 /prefetch:15⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3376 --field-trial-handle=1380,i,7036380138868648504,12065403412080323436,131072 /prefetch:25⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2764 --field-trial-handle=1380,i,7036380138868648504,12065403412080323436,131072 /prefetch:85⤵PID:2148
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Loads dropped DLL
PID:2864 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2208 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:2196
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\452737119395_Desktop.zip' -CompressionLevel Optimal5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000056001\bdc8b54c22.exe"C:\Users\Admin\AppData\Local\Temp\1000056001\bdc8b54c22.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1072
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"3⤵PID:960
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1028
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:496
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
987B
MD58e7aa1fc6d4d99c5f568e511eeb43ab3
SHA1fd6bef865d2e210105be3cf118161d52ee1d0642
SHA256beb7ff4cdeafe70c2103e469cf29ac14d05425464577222df6ffde3b97132833
SHA512b26582dbe88144096f57a659adec9aab45d4e17e889e24fa4d83cd1eef7aec8737b3e6c461780041680c9429a328d00f7552b5e3c8cc2fa35a4616cf75e2d807
-
Filesize
1KB
MD547f6277932a14d090a8c36384c3aad9e
SHA1b408db04a6849bf13a9c3b4c5a72038d4f96f877
SHA256c7f5df83e3ae0bd1092fea484e4c37eec1088baf185275fc121750cf0e5ddf5f
SHA5129c19c75a924e757f46a36a19d79e33cc3b7c1a6ff6c92db60da7834b240a09b803084a2904662feea0eeeaf1c30fac44967179d6595b808d09602d5ffb70ca59
-
Filesize
6KB
MD59dde600b5d8c9ec5cfe8056aac4e8296
SHA126bc8cbcca0dbb02b5b2b0e4ad33bcdaf0ca829b
SHA25692a89d748392b540fca91786840754120d06313b4f8dbc2f0b5ca0ead1676186
SHA512d4ee78f3c25e76cdf6867ba326634d1d1c02798bdcf8b042b519e0debe85e32b654ff08573dabfab105a598a7001dc3442762bf66e51f2263c31bcbb3b911383
-
Filesize
6KB
MD526bd6589ba907b8cb2ff6e1d83ceba85
SHA1e790c3cacbdb517d3d184a01ec4ca508fb8b7c4f
SHA256f7478b375375014c41922ef831c473f724e33ad2b404a60ef7f87bbe79d46749
SHA512690976834ddde86bbf0f7f743e2b95a1f0243964e26a0c62f9beac97dbdfb20ad4e25a3ea7fd90f5057596b7eb4975f28ac50efef04f18c52a795606afaaa604
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
2.9MB
MD5fb9013139f2568146f3db1a376908f08
SHA19dba582a4dd436e70444f4607858f215bb3e5f0f
SHA256256e281c960de9e841950d5160195d5d2aa4e90570199905a2878bc813ebbc26
SHA512ada9b0d18737cf64162eb8decd29dc98b10a3aff52e21a19785c24d3d6616a4c2431a45131024d1108da9334cafe8ebcf2b127a74e50c4a3b37c33bd59ddc433
-
Filesize
1.8MB
MD51ed78f44a2cad6e08da27edbc701b4bc
SHA1e7a8bc103762db81429b13497c065ac16cac4b85
SHA25620bd5a075cfee256a6cc19803fb9964834590840ada1212f7eca0a9d990e8359
SHA5123882675eadbc45a7b534c0efc671551926bbc333275e03e8a4b23fdfc958af231094b65855fceccf6ec7c63ead1ad1a21bf3853e95eb05adca093a7820c22244
-
Filesize
1.1MB
MD576c779d2a6e42c6dbcff43e67bb38ca3
SHA1558f8e6b714efaeaba794e7d2b7821936a4da077
SHA256e820be731929c621a94de7bd83e0da4796c103632961bda20ffbd568279e6f43
SHA512516d91d0e635f3468d135bf51f507fe3d81c1fb72c8baccc08a0e7c05c6dcaefd2816ca937cb2f8ca0ab8f4c8e78a2917b22dc10c289221e8450cfba34bebf3e
-
Filesize
2.2MB
MD53709ad0a7007bcae942b905a07bd6bba
SHA19d25192c841f3b2fb1b9bbb0dfdcec6cdaaca3a7
SHA2562248caa741ec4d757c597091f2bab56f694181ef5a677bdab47d990e4c7f695a
SHA512d41cbc49ded02909e0eae68da22988c36993bde9db4025f64d45007d2c47ed07a7cdc1a2b28ae1cb7ecb8d4c5169cb4084650adaddb656caf33b4e0ad85239fc
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e