Analysis
-
max time kernel
52s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 02:09
Behavioral task
behavioral1
Sample
778a0c870cc2ff58b29173cadac9f31962311781a6f478d3086aa9576f25786d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
778a0c870cc2ff58b29173cadac9f31962311781a6f478d3086aa9576f25786d.exe
Resource
win10v2004-20240419-en
General
-
Target
778a0c870cc2ff58b29173cadac9f31962311781a6f478d3086aa9576f25786d.exe
-
Size
1.6MB
-
MD5
3d62073c6642613d8c50498ba63c0b01
-
SHA1
b71c8e1736f7fb7fc08189c804ac1c1ac59f8a59
-
SHA256
778a0c870cc2ff58b29173cadac9f31962311781a6f478d3086aa9576f25786d
-
SHA512
b1eee614951896ea0b7f111929c4b2d81fdfe61ff88b40c204547f04b088bd3eae31d9000e20c2d5aeaca812693cd6e2ba0317024e71e4eadc70e772f44d784b
-
SSDEEP
24576:hf0xHY18UVlG5hLonP7fseunxFlOR/w0aC97XPVcK2z9sTXl+6FiA08kp/nL+eui:xbj65h2jfsJxrO9wSX+z6DsAbkV+FXxQ
Malware Config
Extracted
amadey
4.20
http://193.233.132.139
-
install_dir
5454e6f062
-
install_file
explorta.exe
-
strings_key
c7a869c5ba1d72480093ec207994e2bf
-
url_paths
/sev56rkm/index.php
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Signatures
-
Detects executables packed with Themida 29 IoCs
resource yara_rule behavioral1/memory/2896-0-0x0000000001030000-0x000000000156A000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2896-1-0x0000000001030000-0x000000000156A000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2896-2-0x0000000001030000-0x000000000156A000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2896-3-0x0000000001030000-0x000000000156A000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2896-4-0x0000000001030000-0x000000000156A000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2896-6-0x0000000001030000-0x000000000156A000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2896-7-0x0000000001030000-0x000000000156A000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2896-5-0x0000000001030000-0x000000000156A000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2152-22-0x0000000000A20000-0x0000000000F5A000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2152-24-0x0000000000A20000-0x0000000000F5A000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2152-23-0x0000000000A20000-0x0000000000F5A000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2152-21-0x0000000000A20000-0x0000000000F5A000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/files/0x0007000000015605-20.dat INDICATOR_EXE_Packed_Themida behavioral1/memory/2152-25-0x0000000000A20000-0x0000000000F5A000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2152-27-0x0000000000A20000-0x0000000000F5A000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2152-26-0x0000000000A20000-0x0000000000F5A000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2896-19-0x0000000001030000-0x000000000156A000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2152-28-0x0000000000A20000-0x0000000000F5A000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2068-49-0x0000000000A20000-0x0000000000F5A000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2152-88-0x0000000000A20000-0x0000000000F5A000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/2152-111-0x0000000000A20000-0x0000000000F5A000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/files/0x0006000000015cb6-116.dat INDICATOR_EXE_Packed_Themida behavioral1/memory/2152-125-0x0000000004A70000-0x0000000005103000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/3044-129-0x00000000011D0000-0x0000000001863000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/3044-127-0x00000000011D0000-0x0000000001863000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/3044-130-0x00000000011D0000-0x0000000001863000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/3044-128-0x00000000011D0000-0x0000000001863000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/3044-126-0x00000000011D0000-0x0000000001863000-memory.dmp INDICATOR_EXE_Packed_Themida behavioral1/memory/3044-299-0x00000000011D0000-0x0000000001863000-memory.dmp INDICATOR_EXE_Packed_Themida -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 778a0c870cc2ff58b29173cadac9f31962311781a6f478d3086aa9576f25786d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amert.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 739b6cefcf.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 54 2612 rundll32.exe 58 1072 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 739b6cefcf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 778a0c870cc2ff58b29173cadac9f31962311781a6f478d3086aa9576f25786d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 739b6cefcf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 778a0c870cc2ff58b29173cadac9f31962311781a6f478d3086aa9576f25786d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe -
Executes dropped EXE 6 IoCs
pid Process 2152 explorta.exe 2068 explorta.exe 2784 amert.exe 2096 explorha.exe 3044 739b6cefcf.exe 108 ab7e91842a.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Wine explorta.exe Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Wine amert.exe Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Wine explorha.exe -
Loads dropped DLL 18 IoCs
pid Process 2896 778a0c870cc2ff58b29173cadac9f31962311781a6f478d3086aa9576f25786d.exe 2152 explorta.exe 2152 explorta.exe 2784 amert.exe 2152 explorta.exe 2152 explorta.exe 2504 rundll32.exe 2504 rundll32.exe 2504 rundll32.exe 2504 rundll32.exe 2612 rundll32.exe 2612 rundll32.exe 2612 rundll32.exe 2612 rundll32.exe 1072 rundll32.exe 1072 rundll32.exe 1072 rundll32.exe 1072 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2896-0-0x0000000001030000-0x000000000156A000-memory.dmp themida behavioral1/memory/2896-1-0x0000000001030000-0x000000000156A000-memory.dmp themida behavioral1/memory/2896-2-0x0000000001030000-0x000000000156A000-memory.dmp themida behavioral1/memory/2896-3-0x0000000001030000-0x000000000156A000-memory.dmp themida behavioral1/memory/2896-4-0x0000000001030000-0x000000000156A000-memory.dmp themida behavioral1/memory/2896-6-0x0000000001030000-0x000000000156A000-memory.dmp themida behavioral1/memory/2896-7-0x0000000001030000-0x000000000156A000-memory.dmp themida behavioral1/memory/2896-5-0x0000000001030000-0x000000000156A000-memory.dmp themida behavioral1/memory/2152-22-0x0000000000A20000-0x0000000000F5A000-memory.dmp themida behavioral1/memory/2152-24-0x0000000000A20000-0x0000000000F5A000-memory.dmp themida behavioral1/memory/2152-23-0x0000000000A20000-0x0000000000F5A000-memory.dmp themida behavioral1/memory/2152-21-0x0000000000A20000-0x0000000000F5A000-memory.dmp themida behavioral1/files/0x0007000000015605-20.dat themida behavioral1/memory/2152-25-0x0000000000A20000-0x0000000000F5A000-memory.dmp themida behavioral1/memory/2152-27-0x0000000000A20000-0x0000000000F5A000-memory.dmp themida behavioral1/memory/2152-26-0x0000000000A20000-0x0000000000F5A000-memory.dmp themida behavioral1/memory/2896-19-0x0000000001030000-0x000000000156A000-memory.dmp themida behavioral1/memory/2152-28-0x0000000000A20000-0x0000000000F5A000-memory.dmp themida behavioral1/memory/2068-49-0x0000000000A20000-0x0000000000F5A000-memory.dmp themida behavioral1/memory/2152-88-0x0000000000A20000-0x0000000000F5A000-memory.dmp themida behavioral1/memory/2152-111-0x0000000000A20000-0x0000000000F5A000-memory.dmp themida behavioral1/files/0x0006000000015cb6-116.dat themida behavioral1/memory/2152-125-0x0000000004A70000-0x0000000005103000-memory.dmp themida behavioral1/memory/3044-129-0x00000000011D0000-0x0000000001863000-memory.dmp themida behavioral1/memory/3044-127-0x00000000011D0000-0x0000000001863000-memory.dmp themida behavioral1/memory/3044-130-0x00000000011D0000-0x0000000001863000-memory.dmp themida behavioral1/memory/3044-128-0x00000000011D0000-0x0000000001863000-memory.dmp themida behavioral1/memory/3044-126-0x00000000011D0000-0x0000000001863000-memory.dmp themida behavioral1/memory/3044-299-0x00000000011D0000-0x0000000001863000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\739b6cefcf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000020001\\739b6cefcf.exe" explorta.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\ab7e91842a.exe = "C:\\Users\\Admin\\1000021002\\ab7e91842a.exe" explorta.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 739b6cefcf.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 778a0c870cc2ff58b29173cadac9f31962311781a6f478d3086aa9576f25786d.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0006000000015d0f-140.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2068 explorta.exe 2784 amert.exe 2096 explorha.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2152 set thread context of 2068 2152 explorta.exe 29 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\explorta.job 778a0c870cc2ff58b29173cadac9f31962311781a6f478d3086aa9576f25786d.exe File created C:\Windows\Tasks\explorha.job amert.exe -
pid Process 2428 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2068 explorta.exe 2784 amert.exe 2096 explorha.exe 1872 chrome.exe 1872 chrome.exe 2612 rundll32.exe 2612 rundll32.exe 2612 rundll32.exe 2612 rundll32.exe 2612 rundll32.exe 2428 powershell.exe -
Suspicious use of AdjustPrivilegeToken 61 IoCs
description pid Process Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeDebugPrivilege 2428 powershell.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe Token: SeShutdownPrivilege 1872 chrome.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 2896 778a0c870cc2ff58b29173cadac9f31962311781a6f478d3086aa9576f25786d.exe 2784 amert.exe 108 ab7e91842a.exe 108 ab7e91842a.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 108 ab7e91842a.exe 108 ab7e91842a.exe 1872 chrome.exe 1872 chrome.exe 108 ab7e91842a.exe 108 ab7e91842a.exe 108 ab7e91842a.exe 108 ab7e91842a.exe 108 ab7e91842a.exe 108 ab7e91842a.exe 108 ab7e91842a.exe -
Suspicious use of SendNotifyMessage 43 IoCs
pid Process 108 ab7e91842a.exe 108 ab7e91842a.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 1872 chrome.exe 108 ab7e91842a.exe 108 ab7e91842a.exe 108 ab7e91842a.exe 108 ab7e91842a.exe 108 ab7e91842a.exe 108 ab7e91842a.exe 108 ab7e91842a.exe 108 ab7e91842a.exe 108 ab7e91842a.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2152 2896 778a0c870cc2ff58b29173cadac9f31962311781a6f478d3086aa9576f25786d.exe 28 PID 2896 wrote to memory of 2152 2896 778a0c870cc2ff58b29173cadac9f31962311781a6f478d3086aa9576f25786d.exe 28 PID 2896 wrote to memory of 2152 2896 778a0c870cc2ff58b29173cadac9f31962311781a6f478d3086aa9576f25786d.exe 28 PID 2896 wrote to memory of 2152 2896 778a0c870cc2ff58b29173cadac9f31962311781a6f478d3086aa9576f25786d.exe 28 PID 2152 wrote to memory of 2068 2152 explorta.exe 29 PID 2152 wrote to memory of 2068 2152 explorta.exe 29 PID 2152 wrote to memory of 2068 2152 explorta.exe 29 PID 2152 wrote to memory of 2068 2152 explorta.exe 29 PID 2152 wrote to memory of 2068 2152 explorta.exe 29 PID 2152 wrote to memory of 2068 2152 explorta.exe 29 PID 2152 wrote to memory of 2068 2152 explorta.exe 29 PID 2152 wrote to memory of 2068 2152 explorta.exe 29 PID 2152 wrote to memory of 2068 2152 explorta.exe 29 PID 2152 wrote to memory of 2068 2152 explorta.exe 29 PID 2152 wrote to memory of 2068 2152 explorta.exe 29 PID 2152 wrote to memory of 2068 2152 explorta.exe 29 PID 2152 wrote to memory of 2068 2152 explorta.exe 29 PID 2152 wrote to memory of 2784 2152 explorta.exe 31 PID 2152 wrote to memory of 2784 2152 explorta.exe 31 PID 2152 wrote to memory of 2784 2152 explorta.exe 31 PID 2152 wrote to memory of 2784 2152 explorta.exe 31 PID 2784 wrote to memory of 2096 2784 amert.exe 32 PID 2784 wrote to memory of 2096 2784 amert.exe 32 PID 2784 wrote to memory of 2096 2784 amert.exe 32 PID 2784 wrote to memory of 2096 2784 amert.exe 32 PID 2152 wrote to memory of 3044 2152 explorta.exe 34 PID 2152 wrote to memory of 3044 2152 explorta.exe 34 PID 2152 wrote to memory of 3044 2152 explorta.exe 34 PID 2152 wrote to memory of 3044 2152 explorta.exe 34 PID 2152 wrote to memory of 108 2152 explorta.exe 35 PID 2152 wrote to memory of 108 2152 explorta.exe 35 PID 2152 wrote to memory of 108 2152 explorta.exe 35 PID 2152 wrote to memory of 108 2152 explorta.exe 35 PID 108 wrote to memory of 1872 108 ab7e91842a.exe 36 PID 108 wrote to memory of 1872 108 ab7e91842a.exe 36 PID 108 wrote to memory of 1872 108 ab7e91842a.exe 36 PID 108 wrote to memory of 1872 108 ab7e91842a.exe 36 PID 1872 wrote to memory of 1052 1872 chrome.exe 37 PID 1872 wrote to memory of 1052 1872 chrome.exe 37 PID 1872 wrote to memory of 1052 1872 chrome.exe 37 PID 1872 wrote to memory of 2172 1872 chrome.exe 39 PID 1872 wrote to memory of 2172 1872 chrome.exe 39 PID 1872 wrote to memory of 2172 1872 chrome.exe 39 PID 1872 wrote to memory of 2172 1872 chrome.exe 39 PID 1872 wrote to memory of 2172 1872 chrome.exe 39 PID 1872 wrote to memory of 2172 1872 chrome.exe 39 PID 1872 wrote to memory of 2172 1872 chrome.exe 39 PID 1872 wrote to memory of 2172 1872 chrome.exe 39 PID 1872 wrote to memory of 2172 1872 chrome.exe 39 PID 1872 wrote to memory of 2172 1872 chrome.exe 39 PID 1872 wrote to memory of 2172 1872 chrome.exe 39 PID 1872 wrote to memory of 2172 1872 chrome.exe 39 PID 1872 wrote to memory of 2172 1872 chrome.exe 39 PID 1872 wrote to memory of 2172 1872 chrome.exe 39 PID 1872 wrote to memory of 2172 1872 chrome.exe 39 PID 1872 wrote to memory of 2172 1872 chrome.exe 39 PID 1872 wrote to memory of 2172 1872 chrome.exe 39 PID 1872 wrote to memory of 2172 1872 chrome.exe 39 PID 1872 wrote to memory of 2172 1872 chrome.exe 39 PID 1872 wrote to memory of 2172 1872 chrome.exe 39 PID 1872 wrote to memory of 2172 1872 chrome.exe 39 PID 1872 wrote to memory of 2172 1872 chrome.exe 39 PID 1872 wrote to memory of 2172 1872 chrome.exe 39 PID 1872 wrote to memory of 2172 1872 chrome.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\778a0c870cc2ff58b29173cadac9f31962311781a6f478d3086aa9576f25786d.exe"C:\Users\Admin\AppData\Local\Temp\778a0c870cc2ff58b29173cadac9f31962311781a6f478d3086aa9576f25786d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe"C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2096 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main5⤵
- Loads dropped DLL
PID:2504 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main6⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2612 -
C:\Windows\system32\netsh.exenetsh wlan show profiles7⤵PID:2684
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\627615824406_Desktop.zip' -CompressionLevel Optimal7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1072
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000020001\739b6cefcf.exe"C:\Users\Admin\AppData\Local\Temp\1000020001\739b6cefcf.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3044
-
-
C:\Users\Admin\1000021002\ab7e91842a.exe"C:\Users\Admin\1000021002\ab7e91842a.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7129758,0x7fef7129768,0x7fef71297785⤵PID:1052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1184 --field-trial-handle=1224,i,15618486139092350455,2902691136202623777,131072 /prefetch:25⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1224,i,15618486139092350455,2902691136202623777,131072 /prefetch:85⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1224,i,15618486139092350455,2902691136202623777,131072 /prefetch:85⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2256 --field-trial-handle=1224,i,15618486139092350455,2902691136202623777,131072 /prefetch:15⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2264 --field-trial-handle=1224,i,15618486139092350455,2902691136202623777,131072 /prefetch:15⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1488 --field-trial-handle=1224,i,15618486139092350455,2902691136202623777,131072 /prefetch:25⤵PID:932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3068 --field-trial-handle=1224,i,15618486139092350455,2902691136202623777,131072 /prefetch:15⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3560 --field-trial-handle=1224,i,15618486139092350455,2902691136202623777,131072 /prefetch:85⤵PID:1388
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2788
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5cd1794325395932cf010eb97b3f2f598
SHA1072b6d1ef3312deae9a52d2c22d1dee8c41aff16
SHA2561ac580dc061e76f64988938a9ba1eacaa3567424126d0f25b471c2fd065d50a7
SHA512ece7c453b5858fd0eed760f4579a6c056696af8aee43ce23bc2b3a4de20afb016ad859430a4a5f5a8587ba057f69578d1ea4674cf4cb6909c394c2c11b124f94
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
6KB
MD527df5dadc4c9a8d9d6a596ae8822b541
SHA135e3d8ea855b4a7e99702dc6b5b0541557168234
SHA2562790d3a0cfa77368de7a397af6e490594b5e0fd0097507746113054f0e1dab80
SHA512d614efa7cba35a6becdcfbc12a9ff09081659cbfa9d00567014025df2dd64ea901e34eedb36b902d010a8f33bf684d33b90f7a6af3f969ee4970142c7c7cf8dd
-
Filesize
6KB
MD59b0a8e97ae79b6428fade2a0b300db0f
SHA1c323049579a2b04c7b8434abc354bcba575280d6
SHA2561bf199376e98c039fe12e30ef80dd2a4d996f3cfbf6f76295d32a1b9a4fdaefb
SHA512fea7de1e366c14d8d2643509d268aa74466ee06fad2f236394ac3a5134bc4b12d2b162016ab3cd96f2d71e5231736258d9416c44ae46ef1cb4bbd778b5306ca5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
1.8MB
MD542248d466f205bfc4afa763b61244232
SHA105342a4403a57f43df7b2dcee1e7cc557129b3f3
SHA256e16e317f82031639a5955b03b21678e302911fbc2dbf96f79986fca88a72b9a5
SHA5123abab799d1d85dd3a731e2d0c821307947086bf8b1f44b1f72706f156db22b6c3b4105f4965af26016d731a2271fb2bef632143b1367b0b55fb122a86a592d31
-
Filesize
2.2MB
MD51c6cb382d9630ea63b06d80bbda162cd
SHA194b5f30f003be05991ef254fb9756a793f92de6d
SHA25615977fd30f8665d19a27149732fa94576d81b353a8cfbcd55d0a622b134c95b5
SHA512abe9cfbb5140d4f7e70104870dbdfb99bb7b4a45c01c7ade34b23f5d211adf62c76b7c8c29455dff5bfb901a7b7d785ff81eeaba34cf97b65847695df542734d
-
Filesize
1.6MB
MD53d62073c6642613d8c50498ba63c0b01
SHA1b71c8e1736f7fb7fc08189c804ac1c1ac59f8a59
SHA256778a0c870cc2ff58b29173cadac9f31962311781a6f478d3086aa9576f25786d
SHA512b1eee614951896ea0b7f111929c4b2d81fdfe61ff88b40c204547f04b088bd3eae31d9000e20c2d5aeaca812693cd6e2ba0317024e71e4eadc70e772f44d784b
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444