Analysis
-
max time kernel
171s -
max time network
303s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 22:49
Behavioral task
behavioral1
Sample
4f59cf1f566021a6fa0ce0dc63ec40060baf970db3062a10ef25fce2f4304cef.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
4f59cf1f566021a6fa0ce0dc63ec40060baf970db3062a10ef25fce2f4304cef.exe
Resource
win10-20240404-en
General
-
Target
4f59cf1f566021a6fa0ce0dc63ec40060baf970db3062a10ef25fce2f4304cef.exe
-
Size
1.7MB
-
MD5
9cfb4f803076a321d61e8493374be103
-
SHA1
f3e4007305eb66b412e0ef8e1999f780f2abaf44
-
SHA256
4f59cf1f566021a6fa0ce0dc63ec40060baf970db3062a10ef25fce2f4304cef
-
SHA512
13d942f1e0c7c3368aabff5cdbb30a6a6ec75cee8e31a25d3e1c531d0e3029c0f44c27ac36a2b959bc62040b1e1133d25f9d62c74974d5acff4a96b45e0b7265
-
SSDEEP
24576:JXeFlzFIx2oCfkVhhm5iCHtT2pcv3MbpcwGu+vLQ6goB+R9rS5777GaJb1f:JX2l3oYkVgxHOcvmAxv1/B+K57fGSZ
Malware Config
Extracted
amadey
4.20
http://193.233.132.139
-
install_dir
5454e6f062
-
install_file
explorta.exe
-
strings_key
c7a869c5ba1d72480093ec207994e2bf
-
url_paths
/sev56rkm/index.php
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
risepro
147.45.47.126:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amert.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4a9827fddb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4f59cf1f566021a6fa0ce0dc63ec40060baf970db3062a10ef25fce2f4304cef.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 36 1000 rundll32.exe 38 1992 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4f59cf1f566021a6fa0ce0dc63ec40060baf970db3062a10ef25fce2f4304cef.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4f59cf1f566021a6fa0ce0dc63ec40060baf970db3062a10ef25fce2f4304cef.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4a9827fddb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4a9827fddb.exe -
Executes dropped EXE 5 IoCs
pid Process 2684 explorta.exe 2300 amert.exe 1552 explorha.exe 2404 4a9827fddb.exe 2868 ce5017f69f.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Wine amert.exe Key opened \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Wine explorha.exe -
Loads dropped DLL 18 IoCs
pid Process 1992 4f59cf1f566021a6fa0ce0dc63ec40060baf970db3062a10ef25fce2f4304cef.exe 2684 explorta.exe 2684 explorta.exe 2300 amert.exe 2684 explorta.exe 2684 explorta.exe 2276 rundll32.exe 2276 rundll32.exe 2276 rundll32.exe 2276 rundll32.exe 1000 rundll32.exe 1000 rundll32.exe 1000 rundll32.exe 1000 rundll32.exe 1992 rundll32.exe 1992 rundll32.exe 1992 rundll32.exe 1992 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1992-0-0x0000000000D00000-0x0000000001249000-memory.dmp themida behavioral1/memory/1992-3-0x0000000000D00000-0x0000000001249000-memory.dmp themida behavioral1/memory/1992-4-0x0000000000D00000-0x0000000001249000-memory.dmp themida behavioral1/memory/1992-2-0x0000000000D00000-0x0000000001249000-memory.dmp themida behavioral1/memory/1992-1-0x0000000000D00000-0x0000000001249000-memory.dmp themida behavioral1/memory/1992-5-0x0000000000D00000-0x0000000001249000-memory.dmp themida behavioral1/memory/1992-7-0x0000000000D00000-0x0000000001249000-memory.dmp themida behavioral1/memory/1992-8-0x0000000000D00000-0x0000000001249000-memory.dmp themida behavioral1/memory/1992-6-0x0000000000D00000-0x0000000001249000-memory.dmp themida behavioral1/files/0x00080000000145c9-15.dat themida behavioral1/memory/2684-23-0x0000000000CE0000-0x0000000001229000-memory.dmp themida behavioral1/memory/2684-30-0x0000000000CE0000-0x0000000001229000-memory.dmp themida behavioral1/memory/2684-29-0x0000000000CE0000-0x0000000001229000-memory.dmp themida behavioral1/memory/2684-28-0x0000000000CE0000-0x0000000001229000-memory.dmp themida behavioral1/memory/2684-27-0x0000000000CE0000-0x0000000001229000-memory.dmp themida behavioral1/memory/2684-26-0x0000000000CE0000-0x0000000001229000-memory.dmp themida behavioral1/memory/2684-25-0x0000000000CE0000-0x0000000001229000-memory.dmp themida behavioral1/memory/2684-24-0x0000000000CE0000-0x0000000001229000-memory.dmp themida behavioral1/memory/2684-22-0x0000000000CE0000-0x0000000001229000-memory.dmp themida behavioral1/memory/1992-21-0x0000000000D00000-0x0000000001249000-memory.dmp themida behavioral1/files/0x0009000000014c0b-68.dat themida behavioral1/memory/2404-78-0x00000000003E0000-0x0000000000A5D000-memory.dmp themida behavioral1/memory/2404-79-0x00000000003E0000-0x0000000000A5D000-memory.dmp themida behavioral1/memory/2404-80-0x00000000003E0000-0x0000000000A5D000-memory.dmp themida behavioral1/memory/2404-81-0x00000000003E0000-0x0000000000A5D000-memory.dmp themida behavioral1/memory/2404-82-0x00000000003E0000-0x0000000000A5D000-memory.dmp themida behavioral1/memory/2404-83-0x00000000003E0000-0x0000000000A5D000-memory.dmp themida behavioral1/memory/2404-85-0x00000000003E0000-0x0000000000A5D000-memory.dmp themida behavioral1/memory/2404-84-0x00000000003E0000-0x0000000000A5D000-memory.dmp themida behavioral1/memory/2404-86-0x00000000003E0000-0x0000000000A5D000-memory.dmp themida behavioral1/memory/2684-102-0x0000000000CE0000-0x0000000001229000-memory.dmp themida behavioral1/memory/2404-187-0x00000000003E0000-0x0000000000A5D000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\ce5017f69f.exe = "C:\\Users\\Admin\\1000021002\\ce5017f69f.exe" explorta.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\4a9827fddb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000020001\\4a9827fddb.exe" explorta.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4a9827fddb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4f59cf1f566021a6fa0ce0dc63ec40060baf970db3062a10ef25fce2f4304cef.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0006000000015d02-92.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2300 amert.exe 1552 explorha.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\explorta.job 4f59cf1f566021a6fa0ce0dc63ec40060baf970db3062a10ef25fce2f4304cef.exe File created C:\Windows\Tasks\explorha.job amert.exe -
pid Process 2836 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2300 amert.exe 1552 explorha.exe 264 chrome.exe 264 chrome.exe 1000 rundll32.exe 1000 rundll32.exe 1000 rundll32.exe 1000 rundll32.exe 1000 rundll32.exe 2836 powershell.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeDebugPrivilege 2836 powershell.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe Token: SeShutdownPrivilege 264 chrome.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 1992 4f59cf1f566021a6fa0ce0dc63ec40060baf970db3062a10ef25fce2f4304cef.exe 2300 amert.exe 2868 ce5017f69f.exe 2868 ce5017f69f.exe 2868 ce5017f69f.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 2868 ce5017f69f.exe 2868 ce5017f69f.exe 264 chrome.exe 264 chrome.exe 2868 ce5017f69f.exe 2868 ce5017f69f.exe 2868 ce5017f69f.exe 2868 ce5017f69f.exe 2868 ce5017f69f.exe 2868 ce5017f69f.exe -
Suspicious use of SendNotifyMessage 43 IoCs
pid Process 2868 ce5017f69f.exe 2868 ce5017f69f.exe 2868 ce5017f69f.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 264 chrome.exe 2868 ce5017f69f.exe 2868 ce5017f69f.exe 2868 ce5017f69f.exe 2868 ce5017f69f.exe 2868 ce5017f69f.exe 2868 ce5017f69f.exe 2868 ce5017f69f.exe 2868 ce5017f69f.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2684 1992 4f59cf1f566021a6fa0ce0dc63ec40060baf970db3062a10ef25fce2f4304cef.exe 28 PID 1992 wrote to memory of 2684 1992 4f59cf1f566021a6fa0ce0dc63ec40060baf970db3062a10ef25fce2f4304cef.exe 28 PID 1992 wrote to memory of 2684 1992 4f59cf1f566021a6fa0ce0dc63ec40060baf970db3062a10ef25fce2f4304cef.exe 28 PID 1992 wrote to memory of 2684 1992 4f59cf1f566021a6fa0ce0dc63ec40060baf970db3062a10ef25fce2f4304cef.exe 28 PID 2684 wrote to memory of 2500 2684 explorta.exe 30 PID 2684 wrote to memory of 2500 2684 explorta.exe 30 PID 2684 wrote to memory of 2500 2684 explorta.exe 30 PID 2684 wrote to memory of 2500 2684 explorta.exe 30 PID 2684 wrote to memory of 2300 2684 explorta.exe 31 PID 2684 wrote to memory of 2300 2684 explorta.exe 31 PID 2684 wrote to memory of 2300 2684 explorta.exe 31 PID 2684 wrote to memory of 2300 2684 explorta.exe 31 PID 2300 wrote to memory of 1552 2300 amert.exe 32 PID 2300 wrote to memory of 1552 2300 amert.exe 32 PID 2300 wrote to memory of 1552 2300 amert.exe 32 PID 2300 wrote to memory of 1552 2300 amert.exe 32 PID 2684 wrote to memory of 2404 2684 explorta.exe 33 PID 2684 wrote to memory of 2404 2684 explorta.exe 33 PID 2684 wrote to memory of 2404 2684 explorta.exe 33 PID 2684 wrote to memory of 2404 2684 explorta.exe 33 PID 2684 wrote to memory of 2868 2684 explorta.exe 34 PID 2684 wrote to memory of 2868 2684 explorta.exe 34 PID 2684 wrote to memory of 2868 2684 explorta.exe 34 PID 2684 wrote to memory of 2868 2684 explorta.exe 34 PID 2868 wrote to memory of 264 2868 ce5017f69f.exe 35 PID 2868 wrote to memory of 264 2868 ce5017f69f.exe 35 PID 2868 wrote to memory of 264 2868 ce5017f69f.exe 35 PID 2868 wrote to memory of 264 2868 ce5017f69f.exe 35 PID 264 wrote to memory of 380 264 chrome.exe 36 PID 264 wrote to memory of 380 264 chrome.exe 36 PID 264 wrote to memory of 380 264 chrome.exe 36 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38 PID 264 wrote to memory of 988 264 chrome.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f59cf1f566021a6fa0ce0dc63ec40060baf970db3062a10ef25fce2f4304cef.exe"C:\Users\Admin\AppData\Local\Temp\4f59cf1f566021a6fa0ce0dc63ec40060baf970db3062a10ef25fce2f4304cef.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"3⤵PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe"C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1552 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main5⤵
- Loads dropped DLL
PID:2276 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main6⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1000 -
C:\Windows\system32\netsh.exenetsh wlan show profiles7⤵PID:2060
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\816782303773_Desktop.zip' -CompressionLevel Optimal7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1992
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000020001\4a9827fddb.exe"C:\Users\Admin\AppData\Local\Temp\1000020001\4a9827fddb.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2404
-
-
C:\Users\Admin\1000021002\ce5017f69f.exe"C:\Users\Admin\1000021002\ce5017f69f.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7739758,0x7fef7739768,0x7fef77397785⤵PID:380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1216,i,15689294390678860563,14712626016071387062,131072 /prefetch:25⤵PID:988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1216,i,15689294390678860563,14712626016071387062,131072 /prefetch:85⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1612 --field-trial-handle=1216,i,15689294390678860563,14712626016071387062,131072 /prefetch:85⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2268 --field-trial-handle=1216,i,15689294390678860563,14712626016071387062,131072 /prefetch:15⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2272 --field-trial-handle=1216,i,15689294390678860563,14712626016071387062,131072 /prefetch:15⤵PID:568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3332 --field-trial-handle=1216,i,15689294390678860563,14712626016071387062,131072 /prefetch:15⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1484 --field-trial-handle=1216,i,15689294390678860563,14712626016071387062,131072 /prefetch:25⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3488 --field-trial-handle=1216,i,15689294390678860563,14712626016071387062,131072 /prefetch:85⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2728 --field-trial-handle=1216,i,15689294390678860563,14712626016071387062,131072 /prefetch:85⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3588 --field-trial-handle=1216,i,15689294390678860563,14712626016071387062,131072 /prefetch:85⤵PID:1536
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1016
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD58e713d75974f22bae989ea098bd16baa
SHA17a144e5049c177017f3802228a00eafb5c55ab7f
SHA2568a1658924ca1b92f2b8fc44c62fb039b07d59b46dd4b844f4ee4e9d3bad63a8b
SHA512aa588ff259fac37ad3694dc261933b01934e74954f79d0ff48f56f7aaf63b162d2dec0de0d0ffb9f4ebc3c44885cf4c8686aeac381d956035144e583b9cd993e
-
Filesize
278KB
MD561ddf0fdc85be2a17f78dee90b3655d5
SHA11d1007738da054bfa19c2210ad567243f200eb3f
SHA25656a10500a0ed4e17c3d2e24a9d55c5e6364f12a11ac42c5639908acfc73d60bd
SHA51213763b1cf4ce2cb0d442e08da7112617ad6ae884b2afa558e63b2d38084e7b528ed50a6cab2ac43a3fc675de0ed7d076c687e0f903793fd2c949f1ed21c63afd
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2KB
MD55aa11388de0d45ee01aef6cd15a6632a
SHA15e5ff11805a1648067f61ed543f6e929d1224411
SHA2565119902e422d102456b12b3952434a77b9c9e26e1020ed3f62c8bbac3e45fc21
SHA5125b3a97f51bcca57e700254d19583f88b305c6e161fafda975d266d737a5ad395e04fe734f110d254c38d27fda4ecfed7ae8c76d1b745a4f760845fbef4135ba7
-
Filesize
2KB
MD570b9eee2d385a729a5be732b9531eff2
SHA156167a782dab2efb5065c3050dbb345e40ea9739
SHA2568d2a457ffd2ff3f0f98e02b3869dd597fcb0664b4d049cc02e6e9299a9ddf56d
SHA512e75a1fb241fbc3a4e52bb2ab5739d952ba20cfe27fa5129fc201c1694f251a6e4204da93a782cc0fbf716bc184959272d007fae328f6ce45f4f5c4925de1e1c3
-
Filesize
6KB
MD5eaff63ba299831d5ba4bc2dc20b0fc72
SHA15ec5d1ac1cc4eeb1d440e613596120811eadcaf0
SHA2564b3d24d97314829fd1a0930fc82c61f418085ed4fb63386c6b2228d8ad111c86
SHA512fd0c3a756bfc1cdd25f86bef47173356591ba53b95cdb7bdf2961ce4202aff1925cc8332f9357f901bcb5e61c9e6cf139da3127281d8f60e04a4dbab59181161
-
Filesize
6KB
MD57d3dcec785de6dd10ba976db439204f2
SHA144ddfff2f86fc22c2c08910dc7f61f50f6161e7c
SHA256ea990af9b014e067fad134d2f24fa31fc608b846541867f021087d75ac2dff8c
SHA512d5e2fd66b1cae71b7cadf76a5c5f44d45c2806251964b041faefc85eb56c17d1cfefbbd730593f6d40b25cefec089bd8a303e68df1e12291385f1d47a246e47c
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
140KB
MD527e2b31198dcf10cbd429fec0c357fcc
SHA18afa85148c2fe5d7a6bb47dce02a5ce8666a199f
SHA25635e5d1b80e92c7e2a60b3b91f98fc011d708ef423b12a36aef826e561ff107f7
SHA51248a56a79ac430baf81b81502d1a8ab9798363365da2c4ab51a07f5c0e917d6b271ca1b8fe3ba7fe154e0c5aabff5318d5c2661bb6a476a4e02964bdb593ceea4
-
Filesize
277KB
MD58cb0a19bf25949e0761e5211f3934481
SHA11c05d7e259e57047194c2fc54f38dca663d107dc
SHA25636e0d6b317e6cacd9b77e3e8aa64ec76b82a24a9e204083745b74df436bd0173
SHA512ea9e0b1def805c7fc96872a85cbb3169c68582acfd4321e5f8475ef11c5a42b3af3f0cc2c542e1c7562e994cac7ccfe2d67e95c828370a15712174930dfc662d
-
Filesize
295KB
MD5d2c5b4e65a504fc99365aeb08343f898
SHA1904afd68dca3cb1a651bfe8c56efaaa9aa8190a3
SHA2560f75a14df91b26606ccea1dc5e4c316736b08e886c07a6b634d30ad8578297d4
SHA51221f1b79f49aafcbe3e71f5ab948374939077f23ea3f1473bc291ddaaeab6b8eb35c6a111fa4fe18646c2982739649f096353da89030f0056ed6086a7d073a7b7
-
Filesize
1.8MB
MD56cb4effacd5bfe6073329e79a782475e
SHA1c4f9bed7166f301fbf1f364040a35b2899d8a400
SHA25694e303883a33e0b079c2430fb49d83317475ef9b14dc31a863d29c3321e04e15
SHA5126e3d900d7f54dd83c5b575cbf285cf7dc8ca8784ce58a8f2e68d9ff0b14f6752ba8c328d47159f111da86bcc6004eb3bd4c4e2255615be33a1168f4098d8f72d
-
Filesize
2.1MB
MD5f15212edbd502768d71dcd268b7dfd3f
SHA111569939932adf7f3c4416e8ce3de8f7f1e4d3a7
SHA25648c2aedc34ab721f0c4115dff25a3068261bdefb2ca66fa3d85fe91cc1f67e5b
SHA512ae6455a8d46fb8793f9c0bb9182adde39520ad9c99fd9de4671a9cd3fecd2530c3bd6e46a65db7b6342a3dedb0ee3dc9797938a36fb6e21d1d6a8269d1557f6f
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
Filesize
1.7MB
MD59cfb4f803076a321d61e8493374be103
SHA1f3e4007305eb66b412e0ef8e1999f780f2abaf44
SHA2564f59cf1f566021a6fa0ce0dc63ec40060baf970db3062a10ef25fce2f4304cef
SHA51213d942f1e0c7c3368aabff5cdbb30a6a6ec75cee8e31a25d3e1c531d0e3029c0f44c27ac36a2b959bc62040b1e1133d25f9d62c74974d5acff4a96b45e0b7265