Analysis
-
max time kernel
87s -
max time network
306s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 22:31
Static task
static1
Behavioral task
behavioral1
Sample
39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exe
Resource
win10-20240404-en
General
-
Target
39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exe
-
Size
2.9MB
-
MD5
991ad8f508243cc6706d30d800cd5016
-
SHA1
8bde1d4bb724e947826ff19c90e5685f31eb5fef
-
SHA256
39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96
-
SHA512
e76ddd0777a17fd1d28f860301602f03b729beb067adcfded6503ee9a4f3898dc064caf3c8b80e0e803be67685667005d2a9816e1eaf40ac25584a711f5ac3a5
-
SSDEEP
24576:bpGE2viqfRCgCfZIXcsUbODj6tmIvZaJaTtkCqwMrcUVnF+cD4I6cG8f1WWCwFGp:TQiwCDZkpNIRdc/l4I6IWFwFI/+Wdh
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
amadey
4.17
http://193.233.132.167
-
install_dir
4d0ab15804
-
install_file
chrosha.exe
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
Processes:
explorha.exe39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exeexplorha.exeamert.exe8928082c73.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amert.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8928082c73.exe -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 33 2808 rundll32.exe 38 2176 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
amert.exeexplorha.exe39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exeexplorha.exe8928082c73.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8928082c73.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8928082c73.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe -
Executes dropped EXE 5 IoCs
Processes:
explorha.exeamert.exe2c2fa65e23.exe8928082c73.exeexplorha.exepid process 2600 explorha.exe 2788 amert.exe 2808 2c2fa65e23.exe 1040 8928082c73.exe 2860 explorha.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exeexplorha.exeamert.exe8928082c73.exeexplorha.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Wine 39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exe Key opened \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Wine amert.exe Key opened \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Wine 8928082c73.exe Key opened \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Wine explorha.exe -
Loads dropped DLL 19 IoCs
Processes:
39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exeexplorha.exerundll32.exerundll32.exerundll32.exepid process 1468 39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exe 1468 39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exe 2600 explorha.exe 2600 explorha.exe 2600 explorha.exe 2600 explorha.exe 2600 explorha.exe 2808 rundll32.exe 2808 rundll32.exe 2808 rundll32.exe 2808 rundll32.exe 1768 rundll32.exe 1768 rundll32.exe 1768 rundll32.exe 1768 rundll32.exe 2176 rundll32.exe 2176 rundll32.exe 2176 rundll32.exe 2176 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorha.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Run\2c2fa65e23.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000055001\\2c2fa65e23.exe" explorha.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Run\8928082c73.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000056001\\8928082c73.exe" explorha.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000055001\2c2fa65e23.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exeexplorha.exeamert.exe8928082c73.exeexplorha.exepid process 1468 39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exe 2600 explorha.exe 2788 amert.exe 1040 8928082c73.exe 2860 explorha.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
explorha.exedescription pid process target process PID 2600 set thread context of 2860 2600 explorha.exe explorha.exe -
Drops file in Windows directory 2 IoCs
Processes:
39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exeamert.exedescription ioc process File created C:\Windows\Tasks\explorha.job 39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exe File created C:\Windows\Tasks\chrosha.job amert.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exeexplorha.exeamert.exe8928082c73.exechrome.exeexplorha.exerundll32.exepowershell.exepid process 1468 39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exe 2600 explorha.exe 2788 amert.exe 1040 8928082c73.exe 2108 chrome.exe 2108 chrome.exe 2860 explorha.exe 2176 rundll32.exe 2176 rundll32.exe 2176 rundll32.exe 2176 rundll32.exe 2176 rundll32.exe 1268 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exepowershell.exedescription pid process Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeDebugPrivilege 1268 powershell.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
Processes:
39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exeamert.exe2c2fa65e23.exechrome.exepid process 1468 39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exe 2788 amert.exe 2808 2c2fa65e23.exe 2808 2c2fa65e23.exe 2808 2c2fa65e23.exe 2808 2c2fa65e23.exe 2808 2c2fa65e23.exe 2808 2c2fa65e23.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe -
Suspicious use of SendNotifyMessage 38 IoCs
Processes:
2c2fa65e23.exechrome.exepid process 2808 2c2fa65e23.exe 2808 2c2fa65e23.exe 2808 2c2fa65e23.exe 2808 2c2fa65e23.exe 2808 2c2fa65e23.exe 2808 2c2fa65e23.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exeexplorha.exe2c2fa65e23.exechrome.exedescription pid process target process PID 1468 wrote to memory of 2600 1468 39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exe explorha.exe PID 1468 wrote to memory of 2600 1468 39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exe explorha.exe PID 1468 wrote to memory of 2600 1468 39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exe explorha.exe PID 1468 wrote to memory of 2600 1468 39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exe explorha.exe PID 2600 wrote to memory of 2788 2600 explorha.exe amert.exe PID 2600 wrote to memory of 2788 2600 explorha.exe amert.exe PID 2600 wrote to memory of 2788 2600 explorha.exe amert.exe PID 2600 wrote to memory of 2788 2600 explorha.exe amert.exe PID 2600 wrote to memory of 2808 2600 explorha.exe 2c2fa65e23.exe PID 2600 wrote to memory of 2808 2600 explorha.exe 2c2fa65e23.exe PID 2600 wrote to memory of 2808 2600 explorha.exe 2c2fa65e23.exe PID 2600 wrote to memory of 2808 2600 explorha.exe 2c2fa65e23.exe PID 2808 wrote to memory of 2108 2808 2c2fa65e23.exe chrome.exe PID 2808 wrote to memory of 2108 2808 2c2fa65e23.exe chrome.exe PID 2808 wrote to memory of 2108 2808 2c2fa65e23.exe chrome.exe PID 2808 wrote to memory of 2108 2808 2c2fa65e23.exe chrome.exe PID 2108 wrote to memory of 2112 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 2112 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 2112 2108 chrome.exe chrome.exe PID 2600 wrote to memory of 1040 2600 explorha.exe 8928082c73.exe PID 2600 wrote to memory of 1040 2600 explorha.exe 8928082c73.exe PID 2600 wrote to memory of 1040 2600 explorha.exe 8928082c73.exe PID 2600 wrote to memory of 1040 2600 explorha.exe 8928082c73.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1632 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1708 2108 chrome.exe chrome.exe PID 2108 wrote to memory of 1708 2108 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exe"C:\Users\Admin\AppData\Local\Temp\39fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\1000054001\amert.exe"C:\Users\Admin\AppData\Local\Temp\1000054001\amert.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2788
-
-
C:\Users\Admin\AppData\Local\Temp\1000055001\2c2fa65e23.exe"C:\Users\Admin\AppData\Local\Temp\1000055001\2c2fa65e23.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7429758,0x7fef7429768,0x7fef74297785⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1224 --field-trial-handle=1268,i,738557061128668116,11772546424431696343,131072 /prefetch:25⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1568 --field-trial-handle=1268,i,738557061128668116,11772546424431696343,131072 /prefetch:85⤵PID:1708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1612 --field-trial-handle=1268,i,738557061128668116,11772546424431696343,131072 /prefetch:85⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2084 --field-trial-handle=1268,i,738557061128668116,11772546424431696343,131072 /prefetch:15⤵PID:2532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2180 --field-trial-handle=1268,i,738557061128668116,11772546424431696343,131072 /prefetch:15⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2988 --field-trial-handle=1268,i,738557061128668116,11772546424431696343,131072 /prefetch:15⤵PID:744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1912 --field-trial-handle=1268,i,738557061128668116,11772546424431696343,131072 /prefetch:25⤵PID:2644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2928 --field-trial-handle=1268,i,738557061128668116,11772546424431696343,131072 /prefetch:85⤵PID:2076
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000056001\8928082c73.exe"C:\Users\Admin\AppData\Local\Temp\1000056001\8928082c73.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1040
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Loads dropped DLL
PID:1768 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2176 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:2012
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\461186416230_Desktop.zip' -CompressionLevel Optimal5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2808
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1692
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\50085aaa-e7b1-4d8a-aa02-e6c2b1178993.tmp
Filesize5KB
MD5f4208cd088324a0753615a0674c6b703
SHA1ffe6948574477078fd2fb674387246e88359695b
SHA256dfcf1e1ae3f0858c0a66255e5d0a1b9f128d2bcd4564d44d14cef1f230e7a14c
SHA51290aeeec626a8e5fd6715ff412301e55211e39b70ce9113cb16ce160b4e57bc54c6481a0b80ca359b1117cfc5f645ba765abe57e649e91ed410893034608cea0d
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
1KB
MD5377eed09d3ea1fdd3f9d18a5668c9622
SHA1aec7679a8b615d454792ad07f747d287fa6df1e4
SHA2563e798d9b4289a0bb10739526e446580719edd2826ae171ce1803711d4d9deb95
SHA5122afc921b57dcfde8bc435bc0802eb8f8fbf7eeb4580026c0048091299fa6c7443cf24e6290799b1c3041e76ff2028e13e299defe6390d90f8a242758e0b84f9b
-
Filesize
2KB
MD50c897eb4af2da87a2116c66497331836
SHA12e7233c7e69d382feec21a1bcee5c51363600a99
SHA256da91373f334fe799f0c7651ef9b9a4438e3ba55262a4e8fa2aa04c91bbfd7b20
SHA5123e67f4cf84b8f86e6033fe72b790409da8b65d9bcf5616048500dc150e3075f6050a322c067b28d34d6232ad78182d9ffe19d644999de1e04964f6afa25a5f37
-
Filesize
5KB
MD5fa22feee600690a03a9b96f48e8048b9
SHA143ea8976da90c301c03566b2702c5033e4a5f5e1
SHA25697da1e7d6afa703e229e3211dd48c71e1b5e40c4d70eb507eadf6656c29285cb
SHA51219c3047ff0285307b81dcc31fb19ac3204a38746dc06e782be973e75e6ba6ac45d7c04a80fe99e3431f2e368bd0d1343c23fc1e87f40a8688b10046a42400618
-
Filesize
265KB
MD54dc8326a7b55e526b0f9752455d6fcd4
SHA135e2c784f9876d3adfc8ee93ac92c69f0c804aee
SHA25689a0ecfbed0ae3bf1edbd44603629aae7e5838829f4cd62852babc886a1872a3
SHA512cc4440e7c2ba259a7eabe5f7106ef8d91a198dbd92aa0e8ec3896e8cd8f64d10472b3062974543ee60abb8a509f6170a3edcaf1b929f427ab7d256dcfb26f107
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1.8MB
MD51ed78f44a2cad6e08da27edbc701b4bc
SHA1e7a8bc103762db81429b13497c065ac16cac4b85
SHA25620bd5a075cfee256a6cc19803fb9964834590840ada1212f7eca0a9d990e8359
SHA5123882675eadbc45a7b534c0efc671551926bbc333275e03e8a4b23fdfc958af231094b65855fceccf6ec7c63ead1ad1a21bf3853e95eb05adca093a7820c22244
-
Filesize
1.1MB
MD576c779d2a6e42c6dbcff43e67bb38ca3
SHA1558f8e6b714efaeaba794e7d2b7821936a4da077
SHA256e820be731929c621a94de7bd83e0da4796c103632961bda20ffbd568279e6f43
SHA512516d91d0e635f3468d135bf51f507fe3d81c1fb72c8baccc08a0e7c05c6dcaefd2816ca937cb2f8ca0ab8f4c8e78a2917b22dc10c289221e8450cfba34bebf3e
-
Filesize
2.2MB
MD53709ad0a7007bcae942b905a07bd6bba
SHA19d25192c841f3b2fb1b9bbb0dfdcec6cdaaca3a7
SHA2562248caa741ec4d757c597091f2bab56f694181ef5a677bdab47d990e4c7f695a
SHA512d41cbc49ded02909e0eae68da22988c36993bde9db4025f64d45007d2c47ed07a7cdc1a2b28ae1cb7ecb8d4c5169cb4084650adaddb656caf33b4e0ad85239fc
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
2.9MB
MD5991ad8f508243cc6706d30d800cd5016
SHA18bde1d4bb724e947826ff19c90e5685f31eb5fef
SHA25639fcb4bc84140884e41e12a83482eb84c8ac3515a06d658f0f6e39b153315c96
SHA512e76ddd0777a17fd1d28f860301602f03b729beb067adcfded6503ee9a4f3898dc064caf3c8b80e0e803be67685667005d2a9816e1eaf40ac25584a711f5ac3a5