Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/05/2024, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
259a5f46d6fd81c34a3a1dc5c65729e7a63d73627765fdaf7e0760a704609256.exe
Resource
win10v2004-20240508-en
General
-
Target
259a5f46d6fd81c34a3a1dc5c65729e7a63d73627765fdaf7e0760a704609256.exe
-
Size
1.9MB
-
MD5
069ccf3cfa7a0ac6bfef6250253271a9
-
SHA1
53eb649ca18ef5fc853801525e1c9ffdb117bf56
-
SHA256
259a5f46d6fd81c34a3a1dc5c65729e7a63d73627765fdaf7e0760a704609256
-
SHA512
80845482df0c1bbdb6668fe888da21be8caf4287121986d693d02179879f9cc7d40761e9c70371bf421f0c4fb8a8173367d703f85e49bbb1720c427e951c7329
-
SSDEEP
49152:uJtMxRk93te6a91C0D8RbqrnyjhmtV4RvJQ0q0+3OSc:A2Rk93tNWc0D8RTMtahJF+O
Malware Config
Extracted
amadey
4.20
http://5.42.96.7
-
install_dir
7af68cdb52
-
install_file
axplons.exe
-
strings_key
e2ce58e78f631ed97d01fe7b70e85d5e
-
url_paths
/zamo7h/index.php
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral2/memory/2372-246-0x000001A490CF0000-0x000001A494524000-memory.dmp family_zgrat_v1 behavioral2/memory/2372-277-0x000001A4AED00000-0x000001A4AEE0A000-memory.dmp family_zgrat_v1 behavioral2/memory/2372-281-0x000001A4AEB90000-0x000001A4AEBB4000-memory.dmp family_zgrat_v1 -
Glupteba payload 11 IoCs
resource yara_rule behavioral2/memory/4672-220-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4672-272-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3300-323-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3300-399-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1852-447-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1852-477-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1852-491-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1852-495-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1852-500-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1852-509-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1852-514-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 259a5f46d6fd81c34a3a1dc5c65729e7a63d73627765fdaf7e0760a704609256.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4220 netsh.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 259a5f46d6fd81c34a3a1dc5c65729e7a63d73627765fdaf7e0760a704609256.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 259a5f46d6fd81c34a3a1dc5c65729e7a63d73627765fdaf7e0760a704609256.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe -
Executes dropped EXE 16 IoCs
pid Process 3708 axplons.exe 4796 NewB.exe 1420 ISetup8.exe 2440 toolspub1.exe 4672 4767d2e713f2021e8fe856e3ea638b58.exe 1464 u13g.0.exe 4220 u13g.1.exe 3300 4767d2e713f2021e8fe856e3ea638b58.exe 2132 axplons.exe 3136 NewB.exe 1852 csrss.exe 2616 injector.exe 2588 windefender.exe 2868 windefender.exe 2760 NewB.exe 1944 axplons.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000\Software\Wine 259a5f46d6fd81c34a3a1dc5c65729e7a63d73627765fdaf7e0760a704609256.exe Key opened \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000\Software\Wine axplons.exe -
Loads dropped DLL 2 IoCs
pid Process 1464 u13g.0.exe 1464 u13g.0.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000200000002aa0f-481.dat upx behavioral2/memory/2588-483-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2868-485-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2588-487-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2868-492-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2868-506-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2457560273-69882387-977367775-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 4767d2e713f2021e8fe856e3ea638b58.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2764 259a5f46d6fd81c34a3a1dc5c65729e7a63d73627765fdaf7e0760a704609256.exe 3708 axplons.exe 2132 axplons.exe 1944 axplons.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 4767d2e713f2021e8fe856e3ea638b58.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\Tasks\axplons.job 259a5f46d6fd81c34a3a1dc5c65729e7a63d73627765fdaf7e0760a704609256.exe File opened for modification C:\Windows\rss 4767d2e713f2021e8fe856e3ea638b58.exe File created C:\Windows\rss\csrss.exe 4767d2e713f2021e8fe856e3ea638b58.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4020 sc.exe -
pid Process 4564 powershell.exe 3860 powershell.exe 4588 powershell.exe 4444 powershell.exe 4020 powershell.exe 564 powershell.exe 2528 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3136 2440 WerFault.exe 83 1428 1420 WerFault.exe 82 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u13g.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u13g.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u13g.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u13g.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u13g.0.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4548 schtasks.exe 436 schtasks.exe 4140 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-441 = "Arabian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-281 = "Central Europe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-351 = "FLE Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-931 = "Coordinated Universal Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2772 = "Omsk Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-292 = "Central European Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-912 = "Mauritius Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-412 = "E. Africa Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-411 = "E. Africa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-1502 = "Turkey Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-12 = "Azores Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-512 = "Central Asia Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-221 = "Alaskan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-364 = "Middle East Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2891 = "Sudan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-151 = "Central America Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-2182 = "Astrakhan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-682 = "E. Australia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-402 = "Arabic Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@tzres.dll,-791 = "SA Western Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-435 = "Georgian Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 4767d2e713f2021e8fe856e3ea638b58.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2764 259a5f46d6fd81c34a3a1dc5c65729e7a63d73627765fdaf7e0760a704609256.exe 2764 259a5f46d6fd81c34a3a1dc5c65729e7a63d73627765fdaf7e0760a704609256.exe 3708 axplons.exe 3708 axplons.exe 1464 u13g.0.exe 1464 u13g.0.exe 4564 powershell.exe 4564 powershell.exe 4672 4767d2e713f2021e8fe856e3ea638b58.exe 4672 4767d2e713f2021e8fe856e3ea638b58.exe 3860 powershell.exe 3860 powershell.exe 2372 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2372 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2372 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2372 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2372 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2372 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2372 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2372 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2372 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2372 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2372 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2372 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2372 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2372 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2372 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2372 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2372 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2372 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2372 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2372 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2372 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2372 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2132 axplons.exe 2132 axplons.exe 3300 4767d2e713f2021e8fe856e3ea638b58.exe 3300 4767d2e713f2021e8fe856e3ea638b58.exe 3300 4767d2e713f2021e8fe856e3ea638b58.exe 3300 4767d2e713f2021e8fe856e3ea638b58.exe 3300 4767d2e713f2021e8fe856e3ea638b58.exe 3300 4767d2e713f2021e8fe856e3ea638b58.exe 3300 4767d2e713f2021e8fe856e3ea638b58.exe 3300 4767d2e713f2021e8fe856e3ea638b58.exe 3300 4767d2e713f2021e8fe856e3ea638b58.exe 3300 4767d2e713f2021e8fe856e3ea638b58.exe 4588 powershell.exe 4588 powershell.exe 4588 powershell.exe 4444 powershell.exe 4444 powershell.exe 4444 powershell.exe 4020 powershell.exe 4020 powershell.exe 4020 powershell.exe 564 powershell.exe 564 powershell.exe 564 powershell.exe 2528 powershell.exe 2528 powershell.exe 2528 powershell.exe 2616 injector.exe 2616 injector.exe 2616 injector.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 4564 powershell.exe Token: SeDebugPrivilege 4672 4767d2e713f2021e8fe856e3ea638b58.exe Token: SeImpersonatePrivilege 4672 4767d2e713f2021e8fe856e3ea638b58.exe Token: SeDebugPrivilege 3860 powershell.exe Token: SeDebugPrivilege 2372 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: SeDebugPrivilege 4588 powershell.exe Token: SeDebugPrivilege 4444 powershell.exe Token: SeDebugPrivilege 4020 powershell.exe Token: SeDebugPrivilege 564 powershell.exe Token: SeDebugPrivilege 2528 powershell.exe Token: SeSystemEnvironmentPrivilege 1852 csrss.exe Token: SeSecurityPrivilege 4020 sc.exe Token: SeSecurityPrivilege 4020 sc.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2764 259a5f46d6fd81c34a3a1dc5c65729e7a63d73627765fdaf7e0760a704609256.exe 4220 u13g.1.exe 4220 u13g.1.exe 4220 u13g.1.exe 4220 u13g.1.exe 4220 u13g.1.exe 4220 u13g.1.exe 4220 u13g.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 4220 u13g.1.exe 4220 u13g.1.exe 4220 u13g.1.exe 4220 u13g.1.exe 4220 u13g.1.exe 4220 u13g.1.exe 4220 u13g.1.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 2764 wrote to memory of 3708 2764 259a5f46d6fd81c34a3a1dc5c65729e7a63d73627765fdaf7e0760a704609256.exe 78 PID 2764 wrote to memory of 3708 2764 259a5f46d6fd81c34a3a1dc5c65729e7a63d73627765fdaf7e0760a704609256.exe 78 PID 2764 wrote to memory of 3708 2764 259a5f46d6fd81c34a3a1dc5c65729e7a63d73627765fdaf7e0760a704609256.exe 78 PID 3708 wrote to memory of 4796 3708 axplons.exe 79 PID 3708 wrote to memory of 4796 3708 axplons.exe 79 PID 3708 wrote to memory of 4796 3708 axplons.exe 79 PID 4796 wrote to memory of 4548 4796 NewB.exe 80 PID 4796 wrote to memory of 4548 4796 NewB.exe 80 PID 4796 wrote to memory of 4548 4796 NewB.exe 80 PID 4796 wrote to memory of 1420 4796 NewB.exe 82 PID 4796 wrote to memory of 1420 4796 NewB.exe 82 PID 4796 wrote to memory of 1420 4796 NewB.exe 82 PID 4796 wrote to memory of 2440 4796 NewB.exe 83 PID 4796 wrote to memory of 2440 4796 NewB.exe 83 PID 4796 wrote to memory of 2440 4796 NewB.exe 83 PID 4796 wrote to memory of 4672 4796 NewB.exe 84 PID 4796 wrote to memory of 4672 4796 NewB.exe 84 PID 4796 wrote to memory of 4672 4796 NewB.exe 84 PID 1420 wrote to memory of 1464 1420 ISetup8.exe 88 PID 1420 wrote to memory of 1464 1420 ISetup8.exe 88 PID 1420 wrote to memory of 1464 1420 ISetup8.exe 88 PID 1420 wrote to memory of 4220 1420 ISetup8.exe 91 PID 1420 wrote to memory of 4220 1420 ISetup8.exe 91 PID 1420 wrote to memory of 4220 1420 ISetup8.exe 91 PID 4672 wrote to memory of 4564 4672 4767d2e713f2021e8fe856e3ea638b58.exe 96 PID 4672 wrote to memory of 4564 4672 4767d2e713f2021e8fe856e3ea638b58.exe 96 PID 4672 wrote to memory of 4564 4672 4767d2e713f2021e8fe856e3ea638b58.exe 96 PID 4220 wrote to memory of 2372 4220 u13g.1.exe 101 PID 4220 wrote to memory of 2372 4220 u13g.1.exe 101 PID 3300 wrote to memory of 3860 3300 4767d2e713f2021e8fe856e3ea638b58.exe 102 PID 3300 wrote to memory of 3860 3300 4767d2e713f2021e8fe856e3ea638b58.exe 102 PID 3300 wrote to memory of 3860 3300 4767d2e713f2021e8fe856e3ea638b58.exe 102 PID 3300 wrote to memory of 788 3300 4767d2e713f2021e8fe856e3ea638b58.exe 107 PID 3300 wrote to memory of 788 3300 4767d2e713f2021e8fe856e3ea638b58.exe 107 PID 788 wrote to memory of 4220 788 cmd.exe 109 PID 788 wrote to memory of 4220 788 cmd.exe 109 PID 3300 wrote to memory of 4588 3300 4767d2e713f2021e8fe856e3ea638b58.exe 110 PID 3300 wrote to memory of 4588 3300 4767d2e713f2021e8fe856e3ea638b58.exe 110 PID 3300 wrote to memory of 4588 3300 4767d2e713f2021e8fe856e3ea638b58.exe 110 PID 3300 wrote to memory of 4444 3300 4767d2e713f2021e8fe856e3ea638b58.exe 112 PID 3300 wrote to memory of 4444 3300 4767d2e713f2021e8fe856e3ea638b58.exe 112 PID 3300 wrote to memory of 4444 3300 4767d2e713f2021e8fe856e3ea638b58.exe 112 PID 3300 wrote to memory of 1852 3300 4767d2e713f2021e8fe856e3ea638b58.exe 114 PID 3300 wrote to memory of 1852 3300 4767d2e713f2021e8fe856e3ea638b58.exe 114 PID 3300 wrote to memory of 1852 3300 4767d2e713f2021e8fe856e3ea638b58.exe 114 PID 1852 wrote to memory of 4020 1852 csrss.exe 115 PID 1852 wrote to memory of 4020 1852 csrss.exe 115 PID 1852 wrote to memory of 4020 1852 csrss.exe 115 PID 1852 wrote to memory of 564 1852 csrss.exe 121 PID 1852 wrote to memory of 564 1852 csrss.exe 121 PID 1852 wrote to memory of 564 1852 csrss.exe 121 PID 1852 wrote to memory of 2528 1852 csrss.exe 123 PID 1852 wrote to memory of 2528 1852 csrss.exe 123 PID 1852 wrote to memory of 2528 1852 csrss.exe 123 PID 1852 wrote to memory of 2616 1852 csrss.exe 125 PID 1852 wrote to memory of 2616 1852 csrss.exe 125 PID 2588 wrote to memory of 3076 2588 windefender.exe 131 PID 2588 wrote to memory of 3076 2588 windefender.exe 131 PID 2588 wrote to memory of 3076 2588 windefender.exe 131 PID 3076 wrote to memory of 4020 3076 cmd.exe 132 PID 3076 wrote to memory of 4020 3076 cmd.exe 132 PID 3076 wrote to memory of 4020 3076 cmd.exe 132 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\259a5f46d6fd81c34a3a1dc5c65729e7a63d73627765fdaf7e0760a704609256.exe"C:\Users\Admin\AppData\Local\Temp\259a5f46d6fd81c34a3a1dc5c65729e7a63d73627765fdaf7e0760a704609256.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe"C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe" /F4⤵
- Creates scheduled task(s)
PID:4548
-
-
C:\Users\Admin\AppData\Local\Temp\1000254001\ISetup8.exe"C:\Users\Admin\AppData\Local\Temp\1000254001\ISetup8.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\u13g.0.exe"C:\Users\Admin\AppData\Local\Temp\u13g.0.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\u13g.1.exe"C:\Users\Admin\AppData\Local\Temp\u13g.1.exe"5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD16⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 15965⤵
- Program crash
PID:1428
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000255001\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\1000255001\toolspub1.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:2440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 3845⤵
- Program crash
PID:3136
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4564
-
-
C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000256001\4767d2e713f2021e8fe856e3ea638b58.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:4220
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:436
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f7⤵PID:3820
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:564
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2616
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:4140
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)9⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2440 -ip 24401⤵PID:1372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1420 -ip 14201⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2132
-
C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe1⤵
- Executes dropped EXE
PID:3136
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2868
-
C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe1⤵
- Executes dropped EXE
PID:2760
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1944
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
386KB
MD5258e2128803910f3b69a21d5bae342c4
SHA1fa9bb27e5804e43b268f063b69d40d8b9d6e05fc
SHA2567954fe796c7bdfd2286b9c29349d8f349f02a0cb53e19bb5bbeaef65108f9e33
SHA51203027a8add75e227870f8db62472807709c7343be3376b8791c38c94a2f6a22859da21c6c2672e65a6ca1e9e697a6c63d094b1d03ff7ad150c1f52ff31cbcd42
-
Filesize
240KB
MD56bcbbfac4eb7dbecb5a44983645a75db
SHA106335c12d2dc398efa4956674628debaf8a22b39
SHA256f73c2ff7df05fca90c08e6ac7a30b97f56a5f62ddc1aed09e0970dc416f995aa
SHA512550b13098d9842bc79b441721b6a93f085d75c274d7b5e0387fae87f9cf5a3566fb13694b5369149e093cb41a109fa015a9698f0553827c8c46c864083a54a33
-
Filesize
4.1MB
MD5eb00d146a50bfc74d8281f4cca8fe3bc
SHA154761a16f66a52fdf5d878c9b5a2dcc964c93006
SHA256fd23d52e2ce8268f9648e5239256f5960e62d681315653c776eea49f45ec7c15
SHA5128d65e62e4a651b20f29a731e56f5cd08f1601dd97dfb5863d5c471303eed25981a0cf523c3fa1e672a59f599583aaca81e466575cb2c0609408c7a686f934019
-
Filesize
1.9MB
MD5069ccf3cfa7a0ac6bfef6250253271a9
SHA153eb649ca18ef5fc853801525e1c9ffdb117bf56
SHA256259a5f46d6fd81c34a3a1dc5c65729e7a63d73627765fdaf7e0760a704609256
SHA51280845482df0c1bbdb6668fe888da21be8caf4287121986d693d02179879f9cc7d40761e9c70371bf421f0c4fb8a8173367d703f85e49bbb1720c427e951c7329
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
2KB
MD5526cea11d76cace37eca4e0ec4161244
SHA1b671670911d97672817bf950f66427a255236ce3
SHA25645773c0ca5e8fc771ace2f765ec72edcc222cfaf0ea85c069f3729a5ba14fe2d
SHA5121feffb70886392878d0b42cd277a1e42f86e5005a5c2ab728ceeb7ec9e6dcb222d48dca86608636a03a825804ff4c48bb1a4237f6b66bad5e9fe80be565da925
-
Filesize
239KB
MD5431c601846123a7b4aa67d75e31a3dfd
SHA10704a6551c01b3b5744e7b743b33ffa5be2b4ced
SHA2560a9eab89753e07a01b1c5e0197acefea9cc05e5f7829823f811e7aa1d7b817b7
SHA51287a0f6eb99baf620b25216ba491f4891154224ad44ecbbe209c5189585d4cc8abea25ef7b34d78608f074c00ce76374fe49252d76b693521363aced52e4cda27
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ad9bf035018737ed1f343b7ba947b584
SHA1939a37b0f348e63fa4f9dc66b43304c10a1b1d69
SHA256bae549d8981071e89c43d0a21b68935b6512ee49c45113a2a112d5c43e3455e0
SHA512936c6591d35e163c323382180633b337f5ca76b8e81fe427c632a0b9f78771b7b3d6b42c6f31c0bd3a3663f718c7a615350b2c026aa08c5e2ba1db3593c0638a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD590b9558e7e7ea1c0b024622582ed9afe
SHA13649601788e18124c16a4ad9fd9e6daef07f7206
SHA2565070182d259a4d55b50038c77166ec329d27a15b224f1de8d1542daf0dce887f
SHA51251b2168ba6a6df1bf1319bf5ae1a7b70258a1b2c35261c46c1fecc91b550713b58063aaa93b76ce69f284a776af86a8343f517e5e72a3d533e7818a5bbdb495e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58526d078fbbc026e29d246abdc5fa56c
SHA1c7d1e463fbae95b049187baf50b16dff4fd628df
SHA2566c87dee3cd13b377481424ef6ceffa18e97b56412862a05246e8906edaae9102
SHA512b592d07feca3de35d3370cdbee5de350724ad247bea2d8bdc51742a852f5efbfa44cabfd06a489dc194ae6929d070fc5e0caf91155cc7d83c287a7a3d975e867
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58aa992f276220fea0c35975b7180ebce
SHA1f28ab57c37ef5e0f8ad86411125ee6c4bcd31e65
SHA25686a1a982cc69e8d6ab2ee48e94db3a81eb5557305974265038b14af620fde02d
SHA512c5e18757ba104d4c573a7ac459576ca60756b7190bc0d0f9af13632f44c1d00df19955f8738b6ba8d8102edb3bbeb81f2107ba862b760399766e6c9250708230
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5df4c597a36cb9e9bbf7235164d0b1ebb
SHA18aa453dab9192c8d85d520c314e2745a1d024a58
SHA2566961a6760a7a1a8a754699fb169a5a7017acfce4e15912b1cc90cca24892b616
SHA51285d5ba30dd0d424716afec2719602128076915344a7968a3bdb5335f7ca9db059b0b364a446a76b0fc24bbdee5840176183109ee14cb72b4631ffdb2aad2556a
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec