Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 15:42
Behavioral task
behavioral1
Sample
3d23bc2b3fa66b9d251e3258f54201208ce55c0bab5f9ef966e9b1b524d6b692.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
3d23bc2b3fa66b9d251e3258f54201208ce55c0bab5f9ef966e9b1b524d6b692.exe
Resource
win11-20240419-en
General
-
Target
3d23bc2b3fa66b9d251e3258f54201208ce55c0bab5f9ef966e9b1b524d6b692.exe
-
Size
1.7MB
-
MD5
294f7d1382358dd4bb5c5f8531be5c51
-
SHA1
b9f76e569139729316df3d3cd16179910b7fcd35
-
SHA256
3d23bc2b3fa66b9d251e3258f54201208ce55c0bab5f9ef966e9b1b524d6b692
-
SHA512
34df04d8747dd8e6f9b710b7b05fb63f339ff033fef1644f0e0fe4f9e07f674f06f2bbb01a1bc143326b20cfcbb26c8fc35fea891a17de95436c8862a6469dcb
-
SSDEEP
49152:NaW2PHAkyAy6jmYs54ADFzjTMzexw28+nyuMqUo:NP2PlyAy6iY25FzMF+nV3
Malware Config
Extracted
amadey
4.20
http://193.233.132.139
-
install_dir
5454e6f062
-
install_file
explorta.exe
-
strings_key
c7a869c5ba1d72480093ec207994e2bf
-
url_paths
/sev56rkm/index.php
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3d23bc2b3fa66b9d251e3258f54201208ce55c0bab5f9ef966e9b1b524d6b692.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6036d94397.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amert.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 52 2516 rundll32.exe 87 5520 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3d23bc2b3fa66b9d251e3258f54201208ce55c0bab5f9ef966e9b1b524d6b692.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3d23bc2b3fa66b9d251e3258f54201208ce55c0bab5f9ef966e9b1b524d6b692.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6036d94397.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6036d94397.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation explorha.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 3d23bc2b3fa66b9d251e3258f54201208ce55c0bab5f9ef966e9b1b524d6b692.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation explorta.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation amert.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 95cdaba620.exe -
Executes dropped EXE 9 IoCs
pid Process 4524 explorta.exe 1976 amert.exe 3548 explorha.exe 5076 6036d94397.exe 4344 95cdaba620.exe 5608 explorha.exe 5600 explorta.exe 2960 explorta.exe 3552 explorha.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Wine amert.exe -
Loads dropped DLL 3 IoCs
pid Process 3552 rundll32.exe 2516 rundll32.exe 5520 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/5076-0-0x00000000006E0000-0x0000000000C31000-memory.dmp themida behavioral1/memory/5076-1-0x00000000006E0000-0x0000000000C31000-memory.dmp themida behavioral1/memory/5076-3-0x00000000006E0000-0x0000000000C31000-memory.dmp themida behavioral1/memory/5076-2-0x00000000006E0000-0x0000000000C31000-memory.dmp themida behavioral1/memory/5076-5-0x00000000006E0000-0x0000000000C31000-memory.dmp themida behavioral1/memory/5076-4-0x00000000006E0000-0x0000000000C31000-memory.dmp themida behavioral1/memory/5076-6-0x00000000006E0000-0x0000000000C31000-memory.dmp themida behavioral1/memory/5076-7-0x00000000006E0000-0x0000000000C31000-memory.dmp themida behavioral1/memory/5076-8-0x00000000006E0000-0x0000000000C31000-memory.dmp themida behavioral1/files/0x000200000001e32b-14.dat themida behavioral1/memory/4524-21-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/memory/5076-20-0x00000000006E0000-0x0000000000C31000-memory.dmp themida behavioral1/memory/4524-23-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/memory/4524-24-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/memory/4524-22-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/memory/4524-25-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/memory/4524-26-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/memory/4524-27-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/memory/4524-29-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/memory/4524-28-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/memory/4524-32-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/memory/4524-64-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/files/0x0007000000023276-69.dat themida behavioral1/memory/5076-83-0x0000000000FC0000-0x0000000001636000-memory.dmp themida behavioral1/memory/5076-87-0x0000000000FC0000-0x0000000001636000-memory.dmp themida behavioral1/memory/5076-86-0x0000000000FC0000-0x0000000001636000-memory.dmp themida behavioral1/memory/5076-85-0x0000000000FC0000-0x0000000001636000-memory.dmp themida behavioral1/memory/5076-84-0x0000000000FC0000-0x0000000001636000-memory.dmp themida behavioral1/memory/5076-89-0x0000000000FC0000-0x0000000001636000-memory.dmp themida behavioral1/memory/5076-90-0x0000000000FC0000-0x0000000001636000-memory.dmp themida behavioral1/memory/5076-88-0x0000000000FC0000-0x0000000001636000-memory.dmp themida behavioral1/memory/5076-91-0x0000000000FC0000-0x0000000001636000-memory.dmp themida behavioral1/memory/4524-92-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/memory/4524-125-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/memory/5076-127-0x0000000000FC0000-0x0000000001636000-memory.dmp themida behavioral1/memory/5600-200-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/memory/5600-199-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/memory/5600-198-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/memory/5600-203-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/memory/5600-204-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/memory/5600-202-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/memory/5600-201-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/memory/5600-205-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/memory/5600-211-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/memory/2960-274-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/memory/2960-275-0x0000000000390000-0x00000000008E1000-memory.dmp themida behavioral1/memory/2960-293-0x0000000000390000-0x00000000008E1000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6036d94397.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000020001\\6036d94397.exe" explorta.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\95cdaba620.exe = "C:\\Users\\Admin\\1000021002\\95cdaba620.exe" explorta.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3d23bc2b3fa66b9d251e3258f54201208ce55c0bab5f9ef966e9b1b524d6b692.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6036d94397.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000023282-98.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1976 amert.exe 3548 explorha.exe 5608 explorha.exe 3552 explorha.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\explorta.job 3d23bc2b3fa66b9d251e3258f54201208ce55c0bab5f9ef966e9b1b524d6b692.exe File created C:\Windows\Tasks\explorha.job amert.exe -
pid Process 3520 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133594838418937656" chrome.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1976 amert.exe 1976 amert.exe 3548 explorha.exe 3548 explorha.exe 2516 rundll32.exe 2516 rundll32.exe 2516 rundll32.exe 2516 rundll32.exe 2516 rundll32.exe 2516 rundll32.exe 1600 chrome.exe 1600 chrome.exe 2516 rundll32.exe 2516 rundll32.exe 2516 rundll32.exe 2516 rundll32.exe 3520 powershell.exe 3520 powershell.exe 3520 powershell.exe 5608 explorha.exe 5608 explorha.exe 3552 explorha.exe 3552 explorha.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeDebugPrivilege 3520 powershell.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe Token: SeCreatePagefilePrivilege 1600 chrome.exe Token: SeShutdownPrivilege 1600 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 5076 3d23bc2b3fa66b9d251e3258f54201208ce55c0bab5f9ef966e9b1b524d6b692.exe 1976 amert.exe 4344 95cdaba620.exe 4344 95cdaba620.exe 4344 95cdaba620.exe 4344 95cdaba620.exe 4344 95cdaba620.exe 4344 95cdaba620.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 4344 95cdaba620.exe 4344 95cdaba620.exe 4344 95cdaba620.exe 4344 95cdaba620.exe 4344 95cdaba620.exe 4344 95cdaba620.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe 1600 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5076 wrote to memory of 4524 5076 3d23bc2b3fa66b9d251e3258f54201208ce55c0bab5f9ef966e9b1b524d6b692.exe 90 PID 5076 wrote to memory of 4524 5076 3d23bc2b3fa66b9d251e3258f54201208ce55c0bab5f9ef966e9b1b524d6b692.exe 90 PID 5076 wrote to memory of 4524 5076 3d23bc2b3fa66b9d251e3258f54201208ce55c0bab5f9ef966e9b1b524d6b692.exe 90 PID 4524 wrote to memory of 4500 4524 explorta.exe 96 PID 4524 wrote to memory of 4500 4524 explorta.exe 96 PID 4524 wrote to memory of 4500 4524 explorta.exe 96 PID 4524 wrote to memory of 1976 4524 explorta.exe 99 PID 4524 wrote to memory of 1976 4524 explorta.exe 99 PID 4524 wrote to memory of 1976 4524 explorta.exe 99 PID 1976 wrote to memory of 3548 1976 amert.exe 100 PID 1976 wrote to memory of 3548 1976 amert.exe 100 PID 1976 wrote to memory of 3548 1976 amert.exe 100 PID 4524 wrote to memory of 5076 4524 explorta.exe 102 PID 4524 wrote to memory of 5076 4524 explorta.exe 102 PID 4524 wrote to memory of 5076 4524 explorta.exe 102 PID 4524 wrote to memory of 4344 4524 explorta.exe 103 PID 4524 wrote to memory of 4344 4524 explorta.exe 103 PID 4524 wrote to memory of 4344 4524 explorta.exe 103 PID 4344 wrote to memory of 1600 4344 95cdaba620.exe 105 PID 4344 wrote to memory of 1600 4344 95cdaba620.exe 105 PID 1600 wrote to memory of 3972 1600 chrome.exe 107 PID 1600 wrote to memory of 3972 1600 chrome.exe 107 PID 3548 wrote to memory of 3552 3548 explorha.exe 108 PID 3548 wrote to memory of 3552 3548 explorha.exe 108 PID 3548 wrote to memory of 3552 3548 explorha.exe 108 PID 3552 wrote to memory of 2516 3552 rundll32.exe 109 PID 3552 wrote to memory of 2516 3552 rundll32.exe 109 PID 2516 wrote to memory of 920 2516 rundll32.exe 110 PID 2516 wrote to memory of 920 2516 rundll32.exe 110 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112 PID 1600 wrote to memory of 4844 1600 chrome.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d23bc2b3fa66b9d251e3258f54201208ce55c0bab5f9ef966e9b1b524d6b692.exe"C:\Users\Admin\AppData\Local\Temp\3d23bc2b3fa66b9d251e3258f54201208ce55c0bab5f9ef966e9b1b524d6b692.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"3⤵PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe"C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main6⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\system32\netsh.exenetsh wlan show profiles7⤵PID:920
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\808065738166_Desktop.zip' -CompressionLevel Optimal7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5520
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000020001\6036d94397.exe"C:\Users\Admin\AppData\Local\Temp\1000020001\6036d94397.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:5076
-
-
C:\Users\Admin\1000021002\95cdaba620.exe"C:\Users\Admin\1000021002\95cdaba620.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffa36409758,0x7ffa36409768,0x7ffa364097785⤵PID:3972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1880,i,4706628887663291274,5322118188000928902,131072 /prefetch:25⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1880,i,4706628887663291274,5322118188000928902,131072 /prefetch:85⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2280 --field-trial-handle=1880,i,4706628887663291274,5322118188000928902,131072 /prefetch:85⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3240 --field-trial-handle=1880,i,4706628887663291274,5322118188000928902,131072 /prefetch:15⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3376 --field-trial-handle=1880,i,4706628887663291274,5322118188000928902,131072 /prefetch:15⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4676 --field-trial-handle=1880,i,4706628887663291274,5322118188000928902,131072 /prefetch:15⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 --field-trial-handle=1880,i,4706628887663291274,5322118188000928902,131072 /prefetch:85⤵PID:5828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3456 --field-trial-handle=1880,i,4706628887663291274,5322118188000928902,131072 /prefetch:85⤵PID:5868
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1328 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:81⤵PID:1332
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:5600
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5608
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3552
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2960
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD59c8cd66ca976be3f4c9ee6aacd17fc6a
SHA1ba9fe161459e77ba5d6c0c6067f735c6849f68e6
SHA2569dc9dacfeb72ba5195c184987dd73a2e0947881d7a938b946147b97ce4145fcf
SHA51237b03daf3556001debdc35f8ad771e8599ec176aef9036d5960ce6b6d4a018e7abbef8413db339b6fd97d146466cf66d284242e85abf2a5f38525e312941e968
-
Filesize
240B
MD50d72f4fe8a25a2598c4d4f34f70cc596
SHA1004846f502f4ec5e77a4c1fe6f076841e04d99f9
SHA256ff0a43f88fa7a923e7c1037d34c22b7b7c31b6685dc093a92cdf7378fb48b05b
SHA5123e5a474cd6ef9730f6a11b64992f31c1c85ba0390dddcd722f8bc1868f911f3fca9d9d1f05ff79bd5e442a3528cdde5a1b08db752e4d1213c87c29506dfa05df
-
Filesize
1KB
MD558a25a211875a98ac0e77e4052ab6eb0
SHA1ee7379e78bd20183edef2a871706fa677de77cc2
SHA25640ad8bde899930d39a6cbf789cb192e5dd5b2847578fcfd51e9348f6df4bd306
SHA5121d594020971d652fbaf2d3301dc5edfd0fe808720e0787f49c73823c98bbbe5bb25543bc7e19de80c96545408d6832202ee0506079178fe2e3688349659807d1
-
Filesize
537B
MD5a184df1f5f1e416171bbb0da65443ad1
SHA1f56c166d8a4812299d0838637ab09f5d9c3f978f
SHA25685144f1805d8944c879a8d503781a9e561623fd1e1ff7daffa5e0d17f15573f9
SHA51284cafff431361b3bfa3fe7dc78354a41d7150b4de51c3ebc7173a40b5597ec2543abc5a8c188a5df6c20c237b94f0db02ce27b6631ae93215fd0967a2327ff81
-
Filesize
6KB
MD5084fa21ddbeb5f8b8061e457f3b6d1b6
SHA1cb5175e4e62f4f6a8a0d187991ef6ea16359ba08
SHA256064a68fa5c45a3e23250c65fa689d7505680f1a3ce589298b625016a00a5ffe9
SHA512df3475a765b327568c237f7769a296476ad609a380573eb99a5429f3ab0c4b1e49a37eb9ad60e88d21e8b5f385faf27bd4fc76e973674880ccc4dc38870a5e95
-
Filesize
6KB
MD52f19d1b5c55703f9f71c0d81f015d329
SHA10a179c6711c3bf14269441bbc60c4f63b3745997
SHA256f31ef35bab5717914842ab2f36da19b020acdfcbf348ccfed7a69719afc69aed
SHA512f3a6e5791d19caa026370440f46b523f19cbd8edf9f4d6047796b9989de34ef587a745e0c01719a9aa80ae93e7eae37c40976da28b28a0754b261e28037bb5f2
-
Filesize
6KB
MD5ec5cc76445c7b66d91658fe89be02860
SHA1272e0b50dcf2d590ac3c004ba0a2163b6fdd6da9
SHA256e457406ee1eccac0979b12b82738dcfc646f284270090340b31ea3618c96231a
SHA51296d7a4716003a01327d0f7d3ca696b68df95c42e7a1c8dd60116c0c36050ef8ac423d80f265aa80f0f2940af20956037acfc7e1334f773570846052772dc8dd9
-
Filesize
264KB
MD542ed12d9307db59c600aea547c725c05
SHA117a51f95f1005f90deba442620a80491c3de7d58
SHA256e84d797f2e06d3f45a437bc5996514aee208991e2acdf1f526ae0d4a22c11eb7
SHA51221e44d19b8fbf2bc3f830ef1ed8ffa85f6daf9435e0aef8f1e1c0a1da07f3c4e930e8cd3eaee305e74cda0537a3710e7292a8cd66eaa9f9bcedb4023e13561fa
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
1.8MB
MD5ff66b91ccb0c5700673f7cde55db46ea
SHA15baa53417f6dacc4481d2b77c152eca788dc1d37
SHA2560c154fdc849a4f9353c55a03996686c672b46dc90b34c000135c5840f0e5f590
SHA512a836d2332fb5e3017ae835ea0cee7595ac6cc5570320530be8dc7ea64d6f8429a8f5d5976c3d6417aeae8541f6829fd97322940b69e78987e77f65fe59a65e02
-
Filesize
2.1MB
MD5a62045b02e0e31f527d73cbb99e03291
SHA15ff39e694ee644028e1d57a02b4437139899b6b0
SHA2560dd32d944214958f863e36e3b7b80fd412b6aa74460895fac222837acbf3a784
SHA51245f81e25e502c54f6187b8717adfc2309ee2bd75732ac49f428aaf73fb27d43ac3e014182e661fc1d003c44633c90e053dd6b7a99eba63dc58cc7b9874e67e2a
-
Filesize
1.7MB
MD5294f7d1382358dd4bb5c5f8531be5c51
SHA1b9f76e569139729316df3d3cd16179910b7fcd35
SHA2563d23bc2b3fa66b9d251e3258f54201208ce55c0bab5f9ef966e9b1b524d6b692
SHA51234df04d8747dd8e6f9b710b7b05fb63f339ff033fef1644f0e0fe4f9e07f674f06f2bbb01a1bc143326b20cfcbb26c8fc35fea891a17de95436c8862a6469dcb
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444