Analysis
-
max time kernel
76s -
max time network
296s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 22:37
Static task
static1
Behavioral task
behavioral1
Sample
4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exe
Resource
win10-20240319-en
General
-
Target
4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exe
-
Size
2.9MB
-
MD5
e75b99b92e7f974ad0a7a75970ec4c32
-
SHA1
e3ec60f76d99a1a31d88d7804df5cb9870221c1c
-
SHA256
4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c
-
SHA512
ffe04dafa35946cbe30e97ac99a0d42352e1060aec1b53a22f81ffe65c46e8e8749ee56e24d09321f51b7a163676600689638c81df04e00b14ed09e2d2f1a045
-
SSDEEP
49152:TIi0uQKM44itJo//+7eC9CKkIWrVoBzDJ1y9SlgN9y1o:TQKGitJmmqCTkElDaSlPo
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
amadey
4.17
http://193.233.132.167
-
install_dir
4d0ab15804
-
install_file
chrosha.exe
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
Processes:
4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exeexplorha.exeamert.exe057dc117aa.exeexplorha.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amert.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 057dc117aa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 42 2460 rundll32.exe 46 1916 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
057dc117aa.exeexplorha.exeexplorha.exeamert.exe4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 057dc117aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 057dc117aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe -
Executes dropped EXE 5 IoCs
Processes:
explorha.exeamert.exe06d1e6f6f6.exe057dc117aa.exeexplorha.exepid process 2456 explorha.exe 1972 amert.exe 976 06d1e6f6f6.exe 2576 057dc117aa.exe 1192 explorha.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exeexplorha.exeamert.exe057dc117aa.exeexplorha.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Wine 4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exe Key opened \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Wine amert.exe Key opened \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Wine 057dc117aa.exe Key opened \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Wine explorha.exe -
Loads dropped DLL 18 IoCs
Processes:
4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exeexplorha.exerundll32.exerundll32.exerundll32.exepid process 2924 4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exe 2456 explorha.exe 2456 explorha.exe 2456 explorha.exe 2456 explorha.exe 2456 explorha.exe 2356 rundll32.exe 2356 rundll32.exe 2356 rundll32.exe 2356 rundll32.exe 1916 rundll32.exe 1916 rundll32.exe 1916 rundll32.exe 1916 rundll32.exe 2460 rundll32.exe 2460 rundll32.exe 2460 rundll32.exe 2460 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorha.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\Run\06d1e6f6f6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000055001\\06d1e6f6f6.exe" explorha.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\Run\057dc117aa.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000056001\\057dc117aa.exe" explorha.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000055001\06d1e6f6f6.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exeexplorha.exeamert.exe057dc117aa.exeexplorha.exepid process 2924 4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exe 2456 explorha.exe 1972 amert.exe 2576 057dc117aa.exe 1192 explorha.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
explorha.exedescription pid process target process PID 2456 set thread context of 1192 2456 explorha.exe explorha.exe -
Drops file in Windows directory 2 IoCs
Processes:
4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exeamert.exedescription ioc process File created C:\Windows\Tasks\explorha.job 4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exe File created C:\Windows\Tasks\chrosha.job amert.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exeexplorha.exeamert.exechrome.exe057dc117aa.exeexplorha.exerundll32.exepowershell.exepid process 2924 4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exe 2456 explorha.exe 1972 amert.exe 2832 chrome.exe 2832 chrome.exe 2576 057dc117aa.exe 1192 explorha.exe 1916 rundll32.exe 1916 rundll32.exe 1916 rundll32.exe 1916 rundll32.exe 1916 rundll32.exe 880 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exepowershell.exedescription pid process Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeDebugPrivilege 880 powershell.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exe06d1e6f6f6.exeamert.exechrome.exepid process 2924 4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 1972 amert.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
06d1e6f6f6.exechrome.exepid process 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe 976 06d1e6f6f6.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exeexplorha.exe06d1e6f6f6.exechrome.exedescription pid process target process PID 2924 wrote to memory of 2456 2924 4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exe explorha.exe PID 2924 wrote to memory of 2456 2924 4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exe explorha.exe PID 2924 wrote to memory of 2456 2924 4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exe explorha.exe PID 2924 wrote to memory of 2456 2924 4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exe explorha.exe PID 2456 wrote to memory of 1972 2456 explorha.exe amert.exe PID 2456 wrote to memory of 1972 2456 explorha.exe amert.exe PID 2456 wrote to memory of 1972 2456 explorha.exe amert.exe PID 2456 wrote to memory of 1972 2456 explorha.exe amert.exe PID 2456 wrote to memory of 976 2456 explorha.exe 06d1e6f6f6.exe PID 2456 wrote to memory of 976 2456 explorha.exe 06d1e6f6f6.exe PID 2456 wrote to memory of 976 2456 explorha.exe 06d1e6f6f6.exe PID 2456 wrote to memory of 976 2456 explorha.exe 06d1e6f6f6.exe PID 976 wrote to memory of 2832 976 06d1e6f6f6.exe chrome.exe PID 976 wrote to memory of 2832 976 06d1e6f6f6.exe chrome.exe PID 976 wrote to memory of 2832 976 06d1e6f6f6.exe chrome.exe PID 976 wrote to memory of 2832 976 06d1e6f6f6.exe chrome.exe PID 2832 wrote to memory of 2132 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2132 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2132 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2336 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 544 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 544 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 544 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2188 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2188 2832 chrome.exe chrome.exe PID 2832 wrote to memory of 2188 2832 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exe"C:\Users\Admin\AppData\Local\Temp\4ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\1000054001\amert.exe"C:\Users\Admin\AppData\Local\Temp\1000054001\amert.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\1000055001\06d1e6f6f6.exe"C:\Users\Admin\AppData\Local\Temp\1000055001\06d1e6f6f6.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6cb9758,0x7fef6cb9768,0x7fef6cb97785⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1376,i,1244547826596580286,545138202555287226,131072 /prefetch:25⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1540 --field-trial-handle=1376,i,1244547826596580286,545138202555287226,131072 /prefetch:85⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1376,i,1244547826596580286,545138202555287226,131072 /prefetch:85⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2300 --field-trial-handle=1376,i,1244547826596580286,545138202555287226,131072 /prefetch:15⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2312 --field-trial-handle=1376,i,1244547826596580286,545138202555287226,131072 /prefetch:15⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1172 --field-trial-handle=1376,i,1244547826596580286,545138202555287226,131072 /prefetch:25⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1452 --field-trial-handle=1376,i,1244547826596580286,545138202555287226,131072 /prefetch:15⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3740 --field-trial-handle=1376,i,1244547826596580286,545138202555287226,131072 /prefetch:85⤵PID:2984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000056001\057dc117aa.exe"C:\Users\Admin\AppData\Local\Temp\1000056001\057dc117aa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1192
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Loads dropped DLL
PID:2356 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1916 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:1016
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\658372521424_Desktop.zip' -CompressionLevel Optimal5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:880
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2460
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2120
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\783c972e-5475-4582-9e52-baa6a0cd7157.tmp
Filesize5KB
MD57bbe2e45783257625f64159c146fc743
SHA1cade7d891906e06521a426a0dbed355e23ea1be5
SHA2567ecb41a1b0588a783aa84d167b4b599f0c6aabfd3a3d819a95c970f4ca7b7414
SHA51231a319834fd76d5df1f836e72ad13cc8905319e3f1d16326b38bec799488ef01a7fd5b1b2b8af2e9638826d2cbfb00d8a3d0134ecd1f1219371f702118a55e59
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
987B
MD5f7e138ec0155adae8a61a4fd53ee2c51
SHA138e56fa4f87e35a192f08e4e423df8ab50c32858
SHA25681247ff6f0b530aeeadc9acf81376b9b429cdd2f69f31c76b95c3204875e140d
SHA512f9508f139fd1f8be4fc54f4e33fe5bff32e0c12aaaf91f4297aab1994d6e25b45f47512c85bee1acf3ec70817f4e2faf762d91fc82dd6aebc8db85db0a7cce58
-
Filesize
2KB
MD5a13d7acfb1594c90f5e09cda5fc09053
SHA1330f5d97b6403e9a50525c32bce0a2912f4c92c4
SHA256325eab25efc67fb5f081ab101e2605412efe94e8c24cf1ef5b954f3a9ca2adee
SHA5121630cd3b0d0dcbf6db9c680e5ac4798691dfcc43aea8b5242b3c581fde59df0b132f1f89ad0301c3a0cb8119d09a9626201e23f6d11a9ab027f45900ffaea982
-
Filesize
987B
MD54d9a88beecd5dc585a5f09d021767207
SHA1a3720355e5543a4068bca1c9653e7311cb55d50b
SHA256ba0250502dac57fbbb94f170841d93ca322dcdb4c0869f510b986c059f18bd2c
SHA512654a5d374afa7c2ad15700328a18f4c13d5f4ef5029266c30c2e39f94c27c771f4ae14870b529bc8e07b9b5efc67f5d78f761d4167bbab4d02f9ed6ef7ed9081
-
Filesize
1KB
MD5c6a04263585bcb7edcba42bf7a7fa344
SHA1e22deaa8713cf06d27002d57f914d1d1c1b6a5db
SHA256700248dbc85ac5e62db939ee043b551186a2f4dc601bd24de86b4966bb83bc87
SHA5123d413aabedbbaa4c2dc04258ac20401525c62c8e68864a5ef462dd002555e78602c1d6451db408d279d8ab7d709cd05b48ccb8e0c4ef641dfad2587fd03ae9da
-
Filesize
5KB
MD514e958b99457c91f57d5d0c60b8499e3
SHA1be84754f325880655b99f22f60479a22aa1441f0
SHA256d4f765a68f252a10d5c6d449ddf10c40ac811af691418f682ab378f1d92db6bd
SHA512ff7c15cb836a6c6fac253c7494789b857efd917cdad81dd96af74e15277e9034d41a633bc240e1fdc43abc95fc2503f5dfc57f4d095e0fd488ea9d1ee1436e5a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
265KB
MD5e932d0072b716ed97ddaad8e6c7c7845
SHA19fc5ea1d940a5311ec3f80f57cb0f8b5b619cc95
SHA256e2f1745514d21eac62d6f3905d1c6a12799455c9a876047adc70ddf27db1c33e
SHA5121f2bf5b7a3b8e0493d53fb1fe9936f971a54571b632d48cb9ff4a6fba996e25accc26faf064ea0c337e10d2305efac3635dcaca20c2b81522b1e6f401965c44c
-
Filesize
1.8MB
MD51ed78f44a2cad6e08da27edbc701b4bc
SHA1e7a8bc103762db81429b13497c065ac16cac4b85
SHA25620bd5a075cfee256a6cc19803fb9964834590840ada1212f7eca0a9d990e8359
SHA5123882675eadbc45a7b534c0efc671551926bbc333275e03e8a4b23fdfc958af231094b65855fceccf6ec7c63ead1ad1a21bf3853e95eb05adca093a7820c22244
-
Filesize
1.1MB
MD576c779d2a6e42c6dbcff43e67bb38ca3
SHA1558f8e6b714efaeaba794e7d2b7821936a4da077
SHA256e820be731929c621a94de7bd83e0da4796c103632961bda20ffbd568279e6f43
SHA512516d91d0e635f3468d135bf51f507fe3d81c1fb72c8baccc08a0e7c05c6dcaefd2816ca937cb2f8ca0ab8f4c8e78a2917b22dc10c289221e8450cfba34bebf3e
-
Filesize
2.2MB
MD53709ad0a7007bcae942b905a07bd6bba
SHA19d25192c841f3b2fb1b9bbb0dfdcec6cdaaca3a7
SHA2562248caa741ec4d757c597091f2bab56f694181ef5a677bdab47d990e4c7f695a
SHA512d41cbc49ded02909e0eae68da22988c36993bde9db4025f64d45007d2c47ed07a7cdc1a2b28ae1cb7ecb8d4c5169cb4084650adaddb656caf33b4e0ad85239fc
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
2.9MB
MD5e75b99b92e7f974ad0a7a75970ec4c32
SHA1e3ec60f76d99a1a31d88d7804df5cb9870221c1c
SHA2564ef30589afb6f2eea8c98ed3a5f43ee88eda9eacedcc5f23313e4a1fcf3d8e6c
SHA512ffe04dafa35946cbe30e97ac99a0d42352e1060aec1b53a22f81ffe65c46e8e8749ee56e24d09321f51b7a163676600689638c81df04e00b14ed09e2d2f1a045
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e