Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 12:25
Static task
static1
General
-
Target
7116fbb10cb94a7b2e4c9a1075255f98ec28b5775715806725027a84520a6469.exe
-
Size
1.8MB
-
MD5
d8b22fea1211eb693868d08d3db4935d
-
SHA1
4facbc997e375b483d2291b1c832e4ed58e7a9e7
-
SHA256
7116fbb10cb94a7b2e4c9a1075255f98ec28b5775715806725027a84520a6469
-
SHA512
3dd114e2eda5885a17402970425aff5997feb96d6344de77c3b90d8f306af4ad95772826c3536491782fd74e8c3298a85096613abd3684e768aea6236b127712
-
SSDEEP
49152:pPJX3MJzQEitae+XoJcakPZ423i7URS7yYi1BU2CS6o3Yfp5:ZR3kzTitB+XIcd4ACUs+Y8BU9o3gp5
Malware Config
Extracted
amadey
4.20
http://5.42.96.7
-
install_dir
7af68cdb52
-
install_file
axplons.exe
-
strings_key
e2ce58e78f631ed97d01fe7b70e85d5e
-
url_paths
/zamo7h/index.php
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral1/memory/1252-267-0x000001DACCEB0000-0x000001DAD06E4000-memory.dmp family_zgrat_v1 behavioral1/memory/1252-279-0x000001DAEC4E0000-0x000001DAEC5EA000-memory.dmp family_zgrat_v1 behavioral1/memory/1252-283-0x000001DAEC5F0000-0x000001DAEC614000-memory.dmp family_zgrat_v1 -
Glupteba payload 11 IoCs
resource yara_rule behavioral1/memory/4704-181-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/4704-268-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3340-333-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3340-411-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3140-479-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3140-489-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3140-501-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3140-506-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3140-511-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3140-520-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3140-524-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7116fbb10cb94a7b2e4c9a1075255f98ec28b5775715806725027a84520a6469.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4316 netsh.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7116fbb10cb94a7b2e4c9a1075255f98ec28b5775715806725027a84520a6469.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7116fbb10cb94a7b2e4c9a1075255f98ec28b5775715806725027a84520a6469.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation NewB.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation ISetup8.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation u114.1.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 7116fbb10cb94a7b2e4c9a1075255f98ec28b5775715806725027a84520a6469.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation axplons.exe -
Executes dropped EXE 16 IoCs
pid Process 1084 axplons.exe 856 NewB.exe 1336 ISetup8.exe 696 toolspub1.exe 4704 4767d2e713f2021e8fe856e3ea638b58.exe 5088 u114.0.exe 4508 u114.1.exe 3340 4767d2e713f2021e8fe856e3ea638b58.exe 4352 axplons.exe 3992 NewB.exe 3140 csrss.exe 1932 injector.exe 1364 windefender.exe 3740 windefender.exe 4168 axplons.exe 3640 NewB.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine 7116fbb10cb94a7b2e4c9a1075255f98ec28b5775715806725027a84520a6469.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine axplons.exe -
Loads dropped DLL 2 IoCs
pid Process 5088 u114.0.exe 5088 u114.0.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000a00000002344b-492.dat upx behavioral1/memory/1364-494-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/1364-497-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3740-503-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral1/memory/3740-513-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 4767d2e713f2021e8fe856e3ea638b58.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2392 7116fbb10cb94a7b2e4c9a1075255f98ec28b5775715806725027a84520a6469.exe 1084 axplons.exe 4352 axplons.exe 4168 axplons.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 4767d2e713f2021e8fe856e3ea638b58.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe 4767d2e713f2021e8fe856e3ea638b58.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\axplons.job 7116fbb10cb94a7b2e4c9a1075255f98ec28b5775715806725027a84520a6469.exe File opened for modification C:\Windows\rss 4767d2e713f2021e8fe856e3ea638b58.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4492 sc.exe -
pid Process 1500 powershell.exe 852 powershell.exe 852 powershell.exe 1360 powershell.exe 5004 powershell.exe 2200 powershell.exe 4624 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 1956 1336 WerFault.exe 91 1364 696 WerFault.exe 92 4744 5088 WerFault.exe 94 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u114.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u114.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u114.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u114.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u114.0.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3536 schtasks.exe 1172 schtasks.exe 3884 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2372 = "Easter Island Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1972 = "Belarus Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2772 = "Omsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-831 = "SA Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1822 = "Russia TZ 1 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-92 = "Pacific SA Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-271 = "Greenwich Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-191 = "Mountain Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-201 = "US Mountain Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-3051 = "Qyzylorda Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2412 = "Marquesas Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-351 = "FLE Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-32 = "Mid-Atlantic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2372 = "Easter Island Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1842 = "Russia TZ 4 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-261 = "GMT Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-364 = "Middle East Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-215 = "Pacific Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-412 = "E. Africa Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-431 = "Iran Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-212 = "Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2392 7116fbb10cb94a7b2e4c9a1075255f98ec28b5775715806725027a84520a6469.exe 2392 7116fbb10cb94a7b2e4c9a1075255f98ec28b5775715806725027a84520a6469.exe 1084 axplons.exe 1084 axplons.exe 5088 u114.0.exe 5088 u114.0.exe 852 powershell.exe 852 powershell.exe 4704 4767d2e713f2021e8fe856e3ea638b58.exe 4704 4767d2e713f2021e8fe856e3ea638b58.exe 1360 powershell.exe 1360 powershell.exe 1360 powershell.exe 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 3340 4767d2e713f2021e8fe856e3ea638b58.exe 3340 4767d2e713f2021e8fe856e3ea638b58.exe 3340 4767d2e713f2021e8fe856e3ea638b58.exe 3340 4767d2e713f2021e8fe856e3ea638b58.exe 3340 4767d2e713f2021e8fe856e3ea638b58.exe 3340 4767d2e713f2021e8fe856e3ea638b58.exe 3340 4767d2e713f2021e8fe856e3ea638b58.exe 3340 4767d2e713f2021e8fe856e3ea638b58.exe 3340 4767d2e713f2021e8fe856e3ea638b58.exe 3340 4767d2e713f2021e8fe856e3ea638b58.exe 4352 axplons.exe 4352 axplons.exe 5004 powershell.exe 5004 powershell.exe 5004 powershell.exe 2200 powershell.exe 2200 powershell.exe 2200 powershell.exe 4624 powershell.exe 4624 powershell.exe 4624 powershell.exe 1500 powershell.exe 1500 powershell.exe 1500 powershell.exe 852 powershell.exe 852 powershell.exe 852 powershell.exe 1932 injector.exe 1932 injector.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 852 powershell.exe Token: SeDebugPrivilege 4704 4767d2e713f2021e8fe856e3ea638b58.exe Token: SeImpersonatePrivilege 4704 4767d2e713f2021e8fe856e3ea638b58.exe Token: SeDebugPrivilege 1360 powershell.exe Token: SeDebugPrivilege 1252 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: SeDebugPrivilege 5004 powershell.exe Token: SeDebugPrivilege 2200 powershell.exe Token: SeDebugPrivilege 4624 powershell.exe Token: SeDebugPrivilege 1500 powershell.exe Token: SeDebugPrivilege 852 powershell.exe Token: SeSystemEnvironmentPrivilege 3140 csrss.exe Token: SeSecurityPrivilege 4492 sc.exe Token: SeSecurityPrivilege 4492 sc.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 4508 u114.1.exe 4508 u114.1.exe 4508 u114.1.exe 4508 u114.1.exe 4508 u114.1.exe 4508 u114.1.exe 4508 u114.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 4508 u114.1.exe 4508 u114.1.exe 4508 u114.1.exe 4508 u114.1.exe 4508 u114.1.exe 4508 u114.1.exe 4508 u114.1.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 2392 wrote to memory of 1084 2392 7116fbb10cb94a7b2e4c9a1075255f98ec28b5775715806725027a84520a6469.exe 85 PID 2392 wrote to memory of 1084 2392 7116fbb10cb94a7b2e4c9a1075255f98ec28b5775715806725027a84520a6469.exe 85 PID 2392 wrote to memory of 1084 2392 7116fbb10cb94a7b2e4c9a1075255f98ec28b5775715806725027a84520a6469.exe 85 PID 1084 wrote to memory of 856 1084 axplons.exe 88 PID 1084 wrote to memory of 856 1084 axplons.exe 88 PID 1084 wrote to memory of 856 1084 axplons.exe 88 PID 856 wrote to memory of 3884 856 NewB.exe 89 PID 856 wrote to memory of 3884 856 NewB.exe 89 PID 856 wrote to memory of 3884 856 NewB.exe 89 PID 856 wrote to memory of 1336 856 NewB.exe 91 PID 856 wrote to memory of 1336 856 NewB.exe 91 PID 856 wrote to memory of 1336 856 NewB.exe 91 PID 856 wrote to memory of 696 856 NewB.exe 92 PID 856 wrote to memory of 696 856 NewB.exe 92 PID 856 wrote to memory of 696 856 NewB.exe 92 PID 856 wrote to memory of 4704 856 NewB.exe 93 PID 856 wrote to memory of 4704 856 NewB.exe 93 PID 856 wrote to memory of 4704 856 NewB.exe 93 PID 1336 wrote to memory of 5088 1336 ISetup8.exe 94 PID 1336 wrote to memory of 5088 1336 ISetup8.exe 94 PID 1336 wrote to memory of 5088 1336 ISetup8.exe 94 PID 1336 wrote to memory of 4508 1336 ISetup8.exe 96 PID 1336 wrote to memory of 4508 1336 ISetup8.exe 96 PID 1336 wrote to memory of 4508 1336 ISetup8.exe 96 PID 4704 wrote to memory of 852 4704 4767d2e713f2021e8fe856e3ea638b58.exe 104 PID 4704 wrote to memory of 852 4704 4767d2e713f2021e8fe856e3ea638b58.exe 104 PID 4704 wrote to memory of 852 4704 4767d2e713f2021e8fe856e3ea638b58.exe 104 PID 4508 wrote to memory of 1252 4508 u114.1.exe 109 PID 4508 wrote to memory of 1252 4508 u114.1.exe 109 PID 3340 wrote to memory of 1360 3340 4767d2e713f2021e8fe856e3ea638b58.exe 110 PID 3340 wrote to memory of 1360 3340 4767d2e713f2021e8fe856e3ea638b58.exe 110 PID 3340 wrote to memory of 1360 3340 4767d2e713f2021e8fe856e3ea638b58.exe 110 PID 3340 wrote to memory of 3648 3340 4767d2e713f2021e8fe856e3ea638b58.exe 114 PID 3340 wrote to memory of 3648 3340 4767d2e713f2021e8fe856e3ea638b58.exe 114 PID 3648 wrote to memory of 4316 3648 cmd.exe 116 PID 3648 wrote to memory of 4316 3648 cmd.exe 116 PID 3340 wrote to memory of 5004 3340 4767d2e713f2021e8fe856e3ea638b58.exe 119 PID 3340 wrote to memory of 5004 3340 4767d2e713f2021e8fe856e3ea638b58.exe 119 PID 3340 wrote to memory of 5004 3340 4767d2e713f2021e8fe856e3ea638b58.exe 119 PID 3340 wrote to memory of 2200 3340 4767d2e713f2021e8fe856e3ea638b58.exe 124 PID 3340 wrote to memory of 2200 3340 4767d2e713f2021e8fe856e3ea638b58.exe 124 PID 3340 wrote to memory of 2200 3340 4767d2e713f2021e8fe856e3ea638b58.exe 124 PID 3340 wrote to memory of 3140 3340 4767d2e713f2021e8fe856e3ea638b58.exe 126 PID 3340 wrote to memory of 3140 3340 4767d2e713f2021e8fe856e3ea638b58.exe 126 PID 3340 wrote to memory of 3140 3340 4767d2e713f2021e8fe856e3ea638b58.exe 126 PID 3140 wrote to memory of 4624 3140 csrss.exe 127 PID 3140 wrote to memory of 4624 3140 csrss.exe 127 PID 3140 wrote to memory of 4624 3140 csrss.exe 127 PID 3140 wrote to memory of 1500 3140 csrss.exe 133 PID 3140 wrote to memory of 1500 3140 csrss.exe 133 PID 3140 wrote to memory of 1500 3140 csrss.exe 133 PID 3140 wrote to memory of 852 3140 csrss.exe 135 PID 3140 wrote to memory of 852 3140 csrss.exe 135 PID 3140 wrote to memory of 852 3140 csrss.exe 135 PID 3140 wrote to memory of 1932 3140 csrss.exe 137 PID 3140 wrote to memory of 1932 3140 csrss.exe 137 PID 1364 wrote to memory of 4176 1364 windefender.exe 143 PID 1364 wrote to memory of 4176 1364 windefender.exe 143 PID 1364 wrote to memory of 4176 1364 windefender.exe 143 PID 4176 wrote to memory of 4492 4176 cmd.exe 144 PID 4176 wrote to memory of 4492 4176 cmd.exe 144 PID 4176 wrote to memory of 4492 4176 cmd.exe 144 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7116fbb10cb94a7b2e4c9a1075255f98ec28b5775715806725027a84520a6469.exe"C:\Users\Admin\AppData\Local\Temp\7116fbb10cb94a7b2e4c9a1075255f98ec28b5775715806725027a84520a6469.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe"C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe" /F4⤵
- Creates scheduled task(s)
PID:3884
-
-
C:\Users\Admin\AppData\Local\Temp\1000254001\ISetup8.exe"C:\Users\Admin\AppData\Local\Temp\1000254001\ISetup8.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\u114.0.exe"C:\Users\Admin\AppData\Local\Temp\u114.0.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5088 -s 19886⤵
- Program crash
PID:4744
-
-
-
C:\Users\Admin\AppData\Local\Temp\u114.1.exe"C:\Users\Admin\AppData\Local\Temp\u114.1.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD16⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 15925⤵
- Program crash
PID:1956
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000255001\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\1000255001\toolspub1.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 2685⤵
- Program crash
PID:1364
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:4316
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:3536
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f7⤵PID:4576
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1932
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:1172
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)9⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4492
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1336 -ip 13361⤵PID:4344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 696 -ip 6961⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 5088 -ip 50881⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe1⤵
- Executes dropped EXE
PID:3992
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3740
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4168
-
C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe1⤵
- Executes dropped EXE
PID:3640
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
386KB
MD5258e2128803910f3b69a21d5bae342c4
SHA1fa9bb27e5804e43b268f063b69d40d8b9d6e05fc
SHA2567954fe796c7bdfd2286b9c29349d8f349f02a0cb53e19bb5bbeaef65108f9e33
SHA51203027a8add75e227870f8db62472807709c7343be3376b8791c38c94a2f6a22859da21c6c2672e65a6ca1e9e697a6c63d094b1d03ff7ad150c1f52ff31cbcd42
-
Filesize
240KB
MD56bcbbfac4eb7dbecb5a44983645a75db
SHA106335c12d2dc398efa4956674628debaf8a22b39
SHA256f73c2ff7df05fca90c08e6ac7a30b97f56a5f62ddc1aed09e0970dc416f995aa
SHA512550b13098d9842bc79b441721b6a93f085d75c274d7b5e0387fae87f9cf5a3566fb13694b5369149e093cb41a109fa015a9698f0553827c8c46c864083a54a33
-
Filesize
4.1MB
MD53be36f6f21f6e93a2499c382b8939aa2
SHA12f97f9808218f11bbe2d355863dd176c3b9f4111
SHA2565a5ac28472ecf1827e143781289e800b82e9a860e0fb578df7dda99b989db32c
SHA512908569a24b17e57097f5da5acce7c52a7531605d43d4566e5af1309c9ceb81d4466a8f3f4586f6bc5b8e5e204f72a478b3ee0e2d42b707ac1ea305a63d710cea
-
Filesize
1.8MB
MD5d8b22fea1211eb693868d08d3db4935d
SHA14facbc997e375b483d2291b1c832e4ed58e7a9e7
SHA2567116fbb10cb94a7b2e4c9a1075255f98ec28b5775715806725027a84520a6469
SHA5123dd114e2eda5885a17402970425aff5997feb96d6344de77c3b90d8f306af4ad95772826c3536491782fd74e8c3298a85096613abd3684e768aea6236b127712
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
2KB
MD5830a37f4acd8b91d7ead3f99cba2d1ca
SHA1990ae9ee258555e9305ccc76b7346ebc1e3a2a3c
SHA2562b52d8a288768b1a4104dde2f280e22fc48269c3e30a8946b12d68c3eeb56327
SHA512bf4386c762e47e3050bce2d5a208f14dea1210644b79903cd496c9325626986807ddfbd97628041693c7335c9a513240bb756a9dae582814fadf6b4aab92fdf5
-
Filesize
3KB
MD53523895da37c0bc66bd0fdb9c75113c1
SHA1e7449101c305bf466e8386ee52dfedf4bfe6550f
SHA256b84ee50fee63f0893829a62672b5f157a4d71a22cf05a2498da16c4af2ef6e54
SHA512008539bc6c2bfb3a2c7251bf0fd2e2e33753b6b00f7c1ddb0d34bbab14162ff969ce554c36125e1ca4252c6100aada05e9f30ce30d19cd0fc4bc519cc34d8827
-
Filesize
239KB
MD5431c601846123a7b4aa67d75e31a3dfd
SHA10704a6551c01b3b5744e7b743b33ffa5be2b4ced
SHA2560a9eab89753e07a01b1c5e0197acefea9cc05e5f7829823f811e7aa1d7b817b7
SHA51287a0f6eb99baf620b25216ba491f4891154224ad44ecbbe209c5189585d4cc8abea25ef7b34d78608f074c00ce76374fe49252d76b693521363aced52e4cda27
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5632628e81ff14e5df640ce80c54b750e
SHA13e51c6f3e6d944973a274ee2befbb533ac06a639
SHA2564831fbd7fafea4a824d6084d4a8b471624d5ca9445ac073899868c3364ba13ae
SHA512e7dd8a8ad3cafe8b052fa3f9a90d17d18b98c23d5ab7ae2e93f0b853b73f64a2679775faac0fe9b828bae8086863214c480bb010224584654fa4903008bacfb8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5a6f04f977f6cd2d8158a312c486387f4
SHA1441520329afaf3566da38ed853ccbceab2574bcc
SHA256f12e885423d5dde2b556cc9b86875a79f856c966dcf3743099ddba845d1daab9
SHA512d9dd798eb15c9556a6b8f6089f4b4ea27b28a308544076512ee437598ca4c7414757dde50c4799f8f93a149f9121242c5fe8a7ff435238451b9c3d485431fcb9
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5972527454f8255da196f6b8a1bddc2c8
SHA1b0ed491b1d7d6e99593ac74fd63d175fa99f1bfb
SHA256677fa25f638f3c4fdfcd5d357d3eda864abe5c46a403cc02f4e84ec08f733956
SHA51278f98aa6b4488bf75a225018b9d2bece4c19b6dd93e89476f94091b1755ac6cadee0ae792a4942536f0392a6b832b6ead374cfc4ecaf19da46768918172756de
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59c3b21d3f8c36b68ef8244c59e049dd6
SHA1e7c4ff827c94abf9e23f90ecec18133cf0b06e8b
SHA25617fd7726b5bf64b7f95a7a44079ae850661e6580787d68a67d7ad15eaa808547
SHA5125a34000568a01237f18aead812c998107170a17ffe6f7089a0f855cf042abcc993f71edb203e35a56465763504ee059927cf653ae6e98812802cde0e4db7493d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5170125585158c430c56c08ce8a5fa7c6
SHA12ed31bee05ec7e61bd3dfeee60f7ae8d6f22aa26
SHA256c81e688e087dbc6a43a71748106a6a191c9cea2865edfb825fd83fe80ce057e4
SHA5120d0c0f7e283cbb09fcfb2645f4caad768972ed59ea9431862c5e715a51ee7b471edb062c257275c6659cd36a821ac855540646b35b501a19f6362ec0fd80c71c
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec