Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2024, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a.exe
Resource
win10v2004-20240412-en
General
-
Target
223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a.exe
-
Size
1.8MB
-
MD5
9afd11e0ec6b6d2b686fb038a4a6c42e
-
SHA1
fdadef19c9cf1a88317f6d4122b9c15b504bfe13
-
SHA256
223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a
-
SHA512
fd37c0eb60ec27f6fd892f0c748f04a4cd334fbd4b287891654f014510da11c433151ea8341dda9ce2fec1c4f76342524557883e678a8c6be8765dd0d4495fd0
-
SSDEEP
49152:a3/bnoJa5fu+CQkh/9yMdlnhWLbjll8/wlZ/VADihMTKie:ajnoCv/kh/0MdlhWLPlu/8/+OhOde
Malware Config
Extracted
amadey
4.20
http://193.233.132.139
-
install_dir
5454e6f062
-
install_file
explorta.exe
-
strings_key
c7a869c5ba1d72480093ec207994e2bf
-
url_paths
/sev56rkm/index.php
Extracted
amadey
4.17
http://193.233.132.167
-
install_dir
4d0ab15804
-
install_file
chrosha.exe
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0f99a58c5a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amert.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ chrosha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 98 1264 rundll32.exe 103 5460 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0f99a58c5a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chrosha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0f99a58c5a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chrosha.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation 223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation explorta.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation 22452f6664.exe Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation chrosha.exe -
Executes dropped EXE 8 IoCs
pid Process 3116 explorta.exe 3520 0f99a58c5a.exe 4088 explorta.exe 4140 amert.exe 2964 22452f6664.exe 6028 explorta.exe 6048 chrosha.exe 5172 explorta.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Software\Wine amert.exe Key opened \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Software\Wine explorta.exe Key opened \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Software\Wine chrosha.exe Key opened \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Software\Wine explorta.exe Key opened \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Software\Wine 223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a.exe Key opened \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Software\Wine explorta.exe Key opened \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Software\Wine 0f99a58c5a.exe Key opened \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Software\Wine explorta.exe -
Loads dropped DLL 3 IoCs
pid Process 868 rundll32.exe 1264 rundll32.exe 5460 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0f99a58c5a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000009001\\0f99a58c5a.exe" explorta.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\22452f6664.exe = "C:\\Users\\Admin\\1000013002\\22452f6664.exe" explorta.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023403-127.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 3840 223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a.exe 3116 explorta.exe 3520 0f99a58c5a.exe 4140 amert.exe 4088 explorta.exe 6048 chrosha.exe 6028 explorta.exe 5172 explorta.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3116 set thread context of 4088 3116 explorta.exe 98 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\explorta.job 223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a.exe File created C:\Windows\Tasks\chrosha.job amert.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133584345372457221" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4084619521-2220719027-1909462854-1000\{05D9933B-42CC-4C40-8374-56D7D6C6DBEE} chrome.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 3840 223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a.exe 3840 223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a.exe 3116 explorta.exe 3116 explorta.exe 3520 0f99a58c5a.exe 3520 0f99a58c5a.exe 4140 amert.exe 4140 amert.exe 4088 explorta.exe 4088 explorta.exe 3948 chrome.exe 3948 chrome.exe 6028 explorta.exe 6028 explorta.exe 6048 chrosha.exe 6048 chrosha.exe 1264 rundll32.exe 1264 rundll32.exe 1264 rundll32.exe 1264 rundll32.exe 1264 rundll32.exe 1264 rundll32.exe 1264 rundll32.exe 1264 rundll32.exe 1264 rundll32.exe 1264 rundll32.exe 5692 powershell.exe 5692 powershell.exe 5692 powershell.exe 5172 explorta.exe 5172 explorta.exe 4568 chrome.exe 4568 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe Token: SeShutdownPrivilege 3948 chrome.exe Token: SeCreatePagefilePrivilege 3948 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3840 223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a.exe 2964 22452f6664.exe 2964 22452f6664.exe 4140 amert.exe 2964 22452f6664.exe 2964 22452f6664.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 2964 22452f6664.exe 3948 chrome.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe -
Suspicious use of SendNotifyMessage 61 IoCs
pid Process 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 3948 chrome.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe 2964 22452f6664.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3840 wrote to memory of 3116 3840 223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a.exe 89 PID 3840 wrote to memory of 3116 3840 223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a.exe 89 PID 3840 wrote to memory of 3116 3840 223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a.exe 89 PID 3116 wrote to memory of 3520 3116 explorta.exe 96 PID 3116 wrote to memory of 3520 3116 explorta.exe 96 PID 3116 wrote to memory of 3520 3116 explorta.exe 96 PID 3116 wrote to memory of 4088 3116 explorta.exe 98 PID 3116 wrote to memory of 4088 3116 explorta.exe 98 PID 3116 wrote to memory of 4088 3116 explorta.exe 98 PID 3116 wrote to memory of 4088 3116 explorta.exe 98 PID 3116 wrote to memory of 4088 3116 explorta.exe 98 PID 3116 wrote to memory of 4088 3116 explorta.exe 98 PID 3116 wrote to memory of 4088 3116 explorta.exe 98 PID 3116 wrote to memory of 4088 3116 explorta.exe 98 PID 3116 wrote to memory of 4088 3116 explorta.exe 98 PID 3116 wrote to memory of 4088 3116 explorta.exe 98 PID 3116 wrote to memory of 4088 3116 explorta.exe 98 PID 3116 wrote to memory of 4088 3116 explorta.exe 98 PID 3116 wrote to memory of 4140 3116 explorta.exe 99 PID 3116 wrote to memory of 4140 3116 explorta.exe 99 PID 3116 wrote to memory of 4140 3116 explorta.exe 99 PID 3116 wrote to memory of 2964 3116 explorta.exe 101 PID 3116 wrote to memory of 2964 3116 explorta.exe 101 PID 3116 wrote to memory of 2964 3116 explorta.exe 101 PID 2964 wrote to memory of 3948 2964 22452f6664.exe 102 PID 2964 wrote to memory of 3948 2964 22452f6664.exe 102 PID 3948 wrote to memory of 4888 3948 chrome.exe 104 PID 3948 wrote to memory of 4888 3948 chrome.exe 104 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 4864 3948 chrome.exe 106 PID 3948 wrote to memory of 3152 3948 chrome.exe 107 PID 3948 wrote to memory of 3152 3948 chrome.exe 107 PID 3948 wrote to memory of 2828 3948 chrome.exe 108 PID 3948 wrote to memory of 2828 3948 chrome.exe 108 PID 3948 wrote to memory of 2828 3948 chrome.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a.exe"C:\Users\Admin\AppData\Local\Temp\223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\1000009001\0f99a58c5a.exe"C:\Users\Admin\AppData\Local\Temp\1000009001\0f99a58c5a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3520
-
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4088
-
-
C:\Users\Admin\AppData\Local\Temp\1000012001\amert.exe"C:\Users\Admin\AppData\Local\Temp\1000012001\amert.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4140
-
-
C:\Users\Admin\1000013002\22452f6664.exe"C:\Users\Admin\1000013002\22452f6664.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7fff49f0ab58,0x7fff49f0ab68,0x7fff49f0ab785⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:25⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1944 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:85⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2208 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:85⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:15⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3064 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:15⤵PID:5128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4308 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:15⤵PID:5532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3308 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:15⤵PID:5732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3388 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:85⤵PID:5836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4156 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:85⤵
- Modifies registry class
PID:5844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:85⤵PID:6004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:85⤵PID:6076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5060 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:85⤵PID:6136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1912,i,12986558689420484387,10772183407957729410,131072 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5248
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6028
-
C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exeC:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6048 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main2⤵
- Loads dropped DLL
PID:868 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1264 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:2544
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\084619521222_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5692
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5460
-
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5172
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5c092fb0f67a989a62c1a0ac4e9512dbb
SHA1163e3395224453e201a8bb1d3a4875617e69b7f8
SHA2569cead4b495d88629f80fd5004b18bdd222603a3d9940de2f1e533c8557bbaaba
SHA512ea8b1e2b9342f3e7bcd3594c0a48d38385ad117115f7918dbde15149aba584f65ad375bd1f2ac9154a7ef354f2ddc78b93fcdeda364cedf7e1a32c8b687e21b1
-
Filesize
336B
MD501d03107fd01591741518f3765483c31
SHA11baa53f2b0d223d00b35791a68da7c3ea8d1bbdb
SHA2561f7c220515e10dfd1846d27a60cf92fad7875b4a58c1e2f215819f5c35bdbabc
SHA5120856a0a8b44bad872c0bcfe55ada2ed3fddceada007a1dcccb1d1123f6c0ec9f2b60543b8cff4ad6b9df087bc1b805065288d0e7da4d6f912db92e0be0dfda21
-
Filesize
2KB
MD5e5ef6b163fad04981acfdb9486cc63d8
SHA14ce9e9ad8a44efd88ac2eb62801d6014965e4bf0
SHA256f7fa5b7616503d8160d69828338de99a83b98eda16705111a3e7dafffe2c7837
SHA5129a72b1e7930ab164e7c8218b3866b50dfea5d23f4f0e730f82030f6c4acfe90a003d527c9b6d37f2d0c53e1ea7b0b8fde51a0d4f7dbd227a47a3d357dc715d60
-
Filesize
2KB
MD508845ca47efa683c760f5403cac5e527
SHA1c62ef4e95c15c3f5717003dd95d5e2a1bf38d8f2
SHA256793f9c7cf2369beb7e08511c69ce6efcca7742fa28bfe4ab15a134d8c05448a1
SHA512f91459ddb3675dbaafac993ac5553346f4dc4c725effda7ff60762f2316eb9b40212086d0b158149f9b68b9c2088baf6ea887cc80347075292070278c283fd02
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD572a34dfe13417464ae49c75004edd463
SHA1f0d84a6c835b61bdefefc600a6538987931ac56c
SHA25606f046c8497dc5aa9d91155869d6c3be9c6fe88997643c3b25e09d5e321d244a
SHA512bda4fc1251a85b16285f501512b252aa12b453cbc55af6aeaeb999323754ae056e46cd0cc408fc35085e47e3f0a2287e30db005f9ed57f9d7b74294117b4d8c1
-
Filesize
524B
MD5a78ae68deb40f018611ee73042f7bdaf
SHA1a0ff1493aa2798ed298ae4a44841b70243e8677e
SHA256984235e1d504a07a4236468850e3e7e7a8407cc860721774e4947651317ad388
SHA51253b4bf06e3818b4e916d3833e2d79c2014af059322b0b6fe29f20336bb1306178031c103745fba5fa7f2c2373a40779b30d4e3eda2272e85639307d4d859a501
-
Filesize
7KB
MD555d85a0ccb2f663a3d1c58bb947fde19
SHA1511d62e90b56f18495ec3200b79773c4de9de53e
SHA2563a8334f05c83d425b1bde59d07b2eb5210ac16282a559275f5419844f4277dd5
SHA5125e1fc0ad8963f1f6ee0a4d64d26d739225e6c4aa9b7e7125aa14830a80ffb2953151fd78e86e9ab4bb832bc647eedf1f75ce0011615a77bb4c46d6ae700df0d0
-
Filesize
16KB
MD5efc99fecd3778fb86a888822e23750e9
SHA1e81b4c2227ee91d31d3dad819c127b64286e7cef
SHA256a5ba7c98d99a4b1e35c3e35ae679dc4874f4b1bb5bf92716044e17adb31357b7
SHA5124a651d7627698c8b7de5c0c3facd90d9524c3b7a830ccf76a0249d8551a64294321dd8be9546c712e86cad8d6c007565297db1629eeefd308cb65bf7c606dc34
-
Filesize
252KB
MD531e7aa875f77fd1e15379c18111a0ec4
SHA19736a727b3b8f48d398cea0189657266a13c25be
SHA256b91603db297e423406427f27d343c730868370694372d69a624de064f14a3fec
SHA512d86f4aba9b2ceeb89773a851af1db074dc1d381a9e0d8eb0db1591eabe7766fbd8577a3670ef73b74c886ea31c17afbd1efc72fde9ee3a6f113cc3b6345e70df
-
Filesize
2.3MB
MD50286032b26c7a079fea08e19293d99bd
SHA115d0391efcc49ecdade1bada595d8bebdafea4ef
SHA25617ead72811224d62a0132d741e23c1cdb1541371dbc12aee151ebad40235c67c
SHA512aa1ca7346c6a10e77e000ee48acb07543506cdac890719856b6bf74662b8ee8a7b3c899aa2521bd1b1d24073f7efd2a571299f38ee014cb58749c210dc8f298f
-
Filesize
1.8MB
MD5835a5a8fe8a9af07418b87cf3d3b2de9
SHA1f7383fce0f86f3b368589bddf163576c1277987f
SHA256ef0bff6a01433d87f35c08cb28e03c11b5694ccc916e9c0ceeffdde6aab1391e
SHA51274ec8f2dc12ceceb6e160136731cba52b470525b3dc91f3ea46e29278da38f788ea854518c7de8d4004e3adaef222a023edbc1f54466c40f8e74ae8944b27561
-
Filesize
1.8MB
MD59afd11e0ec6b6d2b686fb038a4a6c42e
SHA1fdadef19c9cf1a88317f6d4122b9c15b504bfe13
SHA256223d8c8d3b57716eca8abcbdb69332efd4514c932c33f177291695b46807804a
SHA512fd37c0eb60ec27f6fd892f0c748f04a4cd334fbd4b287891654f014510da11c433151ea8341dda9ce2fec1c4f76342524557883e678a8c6be8765dd0d4495fd0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
109KB
MD5154c3f1334dd435f562672f2664fea6b
SHA151dd25e2ba98b8546de163b8f26e2972a90c2c79
SHA2565f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f
SHA5121bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841
-
Filesize
1.2MB
MD5f35b671fda2603ec30ace10946f11a90
SHA1059ad6b06559d4db581b1879e709f32f80850872
SHA25683e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7
SHA512b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705