Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 21:00
Static task
static1
Behavioral task
behavioral1
Sample
46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exe
Resource
win11-20240426-en
General
-
Target
46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exe
-
Size
1.8MB
-
MD5
a67307604cbc98209e513df9f5864a3e
-
SHA1
2b4a5fc21340fcdc4e722ab3ac9532f115387e57
-
SHA256
46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69
-
SHA512
294b37ff3cb5214faa45e89cda297e5292884fb8454832e2def31d7c043c49ef032cb48eff0cd1c7df98f9c68c2efb8fbff6c389b8543eb560557baf66bcef2f
-
SSDEEP
49152:IoypdSOKtc5CDcyEB8V+6t6VG138miSDktgcUGq3WkLy:RQdSOKtc5CDcf8VFt6eiSDkOO+
Malware Config
Extracted
amadey
4.20
http://5.42.96.7
-
install_dir
7af68cdb52
-
install_file
axplons.exe
-
strings_key
e2ce58e78f631ed97d01fe7b70e85d5e
-
url_paths
/zamo7h/index.php
Extracted
redline
@CLOUDYTTEAM
185.172.128.33:8970
Extracted
redline
1
185.215.113.67:26260
Extracted
stealc
http://49.13.229.86
-
url_path
/c73eed764cc59dcb.php
Extracted
lumma
https://zippyfinickysofwps.shop/api
https://acceptabledcooeprs.shop/api
https://obsceneclassyjuwks.shop/api
https://miniaturefinerninewjs.shop/api
https://plaintediousidowsko.shop/api
https://sweetsquarediaslw.shop/api
https://holicisticscrarws.shop/api
https://boredimperissvieos.shop/api
https://smallelementyjdui.shop/api
https://sofaprivateawarderysj.shop/api
https://lineagelasserytailsd.shop/api
https://tendencyportionjsuk.shop/api
https://headraisepresidensu.shop/api
https://appetitesallooonsj.shop/api
https://minorittyeffeoos.shop/api
https://prideconstituiiosjk.shop/api
Signatures
-
Detect ZGRat V1 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2928-38-0x0000000000400000-0x0000000000592000-memory.dmp family_zgrat_v1 behavioral1/files/0x0007000000023440-52.dat family_zgrat_v1 behavioral1/memory/2164-79-0x0000000000910000-0x00000000009D0000-memory.dmp family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
Processes:
resource yara_rule behavioral1/files/0x0007000000023440-52.dat family_redline behavioral1/files/0x000700000002343f-66.dat family_redline behavioral1/memory/4628-74-0x0000000000020000-0x0000000000072000-memory.dmp family_redline behavioral1/memory/2164-79-0x0000000000910000-0x00000000009D0000-memory.dmp family_redline behavioral1/files/0x0008000000023443-112.dat family_redline behavioral1/memory/640-128-0x0000000000280000-0x00000000002D2000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
Processes:
46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exeaxplons.exeaxplons.exeaxplons.exeaxplons.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exeaxplons.exeaxplons.exeaxplons.exeaxplons.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
NewB.exe46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exeaxplons.exeRegAsm.exeinstall.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation NewB.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation axplons.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation install.exe -
Executes dropped EXE 18 IoCs
Processes:
axplons.exealex.exetrf.exekeks.exegold.exeredline1.exeinstall.exeswizzhis.exelumma1.exe580551.exefile300un.exeNewB.exeaxplons.exeNewB.exeaxplons.exeNewB.exeaxplons.exeNewB.exepid Process 4748 axplons.exe 4828 alex.exe 2164 trf.exe 4628 keks.exe 3240 gold.exe 640 redline1.exe 3600 install.exe 1584 swizzhis.exe 4460 lumma1.exe 1732 580551.exe 2428 file300un.exe 3512 NewB.exe 3736 axplons.exe 3264 NewB.exe 2064 axplons.exe 4464 NewB.exe 2316 axplons.exe 2728 NewB.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exeaxplons.exeaxplons.exeaxplons.exeaxplons.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine 46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine axplons.exe -
Loads dropped DLL 3 IoCs
Processes:
580551.exeRegAsm.exepid Process 1732 580551.exe 2440 RegAsm.exe 2440 RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exeaxplons.exeaxplons.exeaxplons.exeaxplons.exepid Process 1820 46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exe 4748 axplons.exe 3736 axplons.exe 2064 axplons.exe 2316 axplons.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
alex.exegold.exeswizzhis.exelumma1.exefile300un.exedescription pid Process procid_target PID 4828 set thread context of 2928 4828 alex.exe 86 PID 3240 set thread context of 1792 3240 gold.exe 96 PID 1584 set thread context of 2440 1584 swizzhis.exe 109 PID 4460 set thread context of 4124 4460 lumma1.exe 120 PID 2428 set thread context of 1656 2428 file300un.exe 134 -
Drops file in Windows directory 1 IoCs
Processes:
46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exedescription ioc Process File created C:\Windows\Tasks\axplons.job 46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exepid Process 4124 sc.exe 4992 sc.exe 4696 sc.exe 468 sc.exe 676 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 3712 4828 WerFault.exe 85 3876 1656 WerFault.exe 134 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RegAsm.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Processes:
keks.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 keks.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 keks.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exeaxplons.exetrf.exeRegAsm.exeredline1.exekeks.exeaxplons.exeaxplons.exeaxplons.exepid Process 1820 46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exe 1820 46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exe 4748 axplons.exe 4748 axplons.exe 2164 trf.exe 2440 RegAsm.exe 2440 RegAsm.exe 640 redline1.exe 4628 keks.exe 640 redline1.exe 640 redline1.exe 4628 keks.exe 4628 keks.exe 640 redline1.exe 640 redline1.exe 4628 keks.exe 4628 keks.exe 2440 RegAsm.exe 2440 RegAsm.exe 3736 axplons.exe 3736 axplons.exe 2064 axplons.exe 2064 axplons.exe 2316 axplons.exe 2316 axplons.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
trf.exeredline1.exekeks.exeRegAsm.exedescription pid Process Token: SeDebugPrivilege 2164 trf.exe Token: SeBackupPrivilege 2164 trf.exe Token: SeSecurityPrivilege 2164 trf.exe Token: SeSecurityPrivilege 2164 trf.exe Token: SeSecurityPrivilege 2164 trf.exe Token: SeSecurityPrivilege 2164 trf.exe Token: SeDebugPrivilege 640 redline1.exe Token: SeDebugPrivilege 4628 keks.exe Token: SeDebugPrivilege 2928 RegAsm.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
msbuild.exepid Process 1656 msbuild.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exeaxplons.exealex.exeRegAsm.exegold.execmd.exeswizzhis.exedescription pid Process procid_target PID 1820 wrote to memory of 4748 1820 46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exe 84 PID 1820 wrote to memory of 4748 1820 46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exe 84 PID 1820 wrote to memory of 4748 1820 46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exe 84 PID 4748 wrote to memory of 4828 4748 axplons.exe 85 PID 4748 wrote to memory of 4828 4748 axplons.exe 85 PID 4748 wrote to memory of 4828 4748 axplons.exe 85 PID 4828 wrote to memory of 2928 4828 alex.exe 86 PID 4828 wrote to memory of 2928 4828 alex.exe 86 PID 4828 wrote to memory of 2928 4828 alex.exe 86 PID 4828 wrote to memory of 2928 4828 alex.exe 86 PID 4828 wrote to memory of 2928 4828 alex.exe 86 PID 4828 wrote to memory of 2928 4828 alex.exe 86 PID 4828 wrote to memory of 2928 4828 alex.exe 86 PID 4828 wrote to memory of 2928 4828 alex.exe 86 PID 2928 wrote to memory of 2164 2928 RegAsm.exe 90 PID 2928 wrote to memory of 2164 2928 RegAsm.exe 90 PID 2928 wrote to memory of 4628 2928 RegAsm.exe 91 PID 2928 wrote to memory of 4628 2928 RegAsm.exe 91 PID 2928 wrote to memory of 4628 2928 RegAsm.exe 91 PID 4748 wrote to memory of 3240 4748 axplons.exe 93 PID 4748 wrote to memory of 3240 4748 axplons.exe 93 PID 4748 wrote to memory of 3240 4748 axplons.exe 93 PID 3240 wrote to memory of 3688 3240 gold.exe 95 PID 3240 wrote to memory of 3688 3240 gold.exe 95 PID 3240 wrote to memory of 3688 3240 gold.exe 95 PID 3240 wrote to memory of 1792 3240 gold.exe 96 PID 3240 wrote to memory of 1792 3240 gold.exe 96 PID 3240 wrote to memory of 1792 3240 gold.exe 96 PID 3240 wrote to memory of 1792 3240 gold.exe 96 PID 3240 wrote to memory of 1792 3240 gold.exe 96 PID 3240 wrote to memory of 1792 3240 gold.exe 96 PID 3240 wrote to memory of 1792 3240 gold.exe 96 PID 3240 wrote to memory of 1792 3240 gold.exe 96 PID 3240 wrote to memory of 1792 3240 gold.exe 96 PID 4748 wrote to memory of 640 4748 axplons.exe 98 PID 4748 wrote to memory of 640 4748 axplons.exe 98 PID 4748 wrote to memory of 640 4748 axplons.exe 98 PID 4748 wrote to memory of 3600 4748 axplons.exe 99 PID 4748 wrote to memory of 3600 4748 axplons.exe 99 PID 4748 wrote to memory of 3600 4748 axplons.exe 99 PID 2988 wrote to memory of 4124 2988 cmd.exe 120 PID 2988 wrote to memory of 4124 2988 cmd.exe 120 PID 2988 wrote to memory of 4124 2988 cmd.exe 120 PID 2988 wrote to memory of 664 2988 cmd.exe 104 PID 2988 wrote to memory of 664 2988 cmd.exe 104 PID 2988 wrote to memory of 664 2988 cmd.exe 104 PID 2988 wrote to memory of 4992 2988 cmd.exe 105 PID 2988 wrote to memory of 4992 2988 cmd.exe 105 PID 2988 wrote to memory of 4992 2988 cmd.exe 105 PID 2988 wrote to memory of 3704 2988 cmd.exe 106 PID 2988 wrote to memory of 3704 2988 cmd.exe 106 PID 2988 wrote to memory of 3704 2988 cmd.exe 106 PID 4748 wrote to memory of 1584 4748 axplons.exe 107 PID 4748 wrote to memory of 1584 4748 axplons.exe 107 PID 4748 wrote to memory of 1584 4748 axplons.exe 107 PID 1584 wrote to memory of 2440 1584 swizzhis.exe 109 PID 1584 wrote to memory of 2440 1584 swizzhis.exe 109 PID 1584 wrote to memory of 2440 1584 swizzhis.exe 109 PID 1584 wrote to memory of 2440 1584 swizzhis.exe 109 PID 1584 wrote to memory of 2440 1584 swizzhis.exe 109 PID 1584 wrote to memory of 2440 1584 swizzhis.exe 109 PID 1584 wrote to memory of 2440 1584 swizzhis.exe 109 PID 1584 wrote to memory of 2440 1584 swizzhis.exe 109 PID 1584 wrote to memory of 2440 1584 swizzhis.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exe"C:\Users\Admin\AppData\Local\Temp\46df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exe"C:\Users\Admin\AppData\Local\Temp\1000003001\alex.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe"C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe"C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe"5⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4628
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"5⤵PID:1412
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 36⤵PID:1144
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 3324⤵
- Program crash
PID:3712
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000004001\gold.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\gold.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:3688
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:1792
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\redline1.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\redline1.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe"C:\Users\Admin\AppData\Local\Temp\1000006001\install.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:3600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameSyncLink\installg.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\sc.exeSc stop GameServerClient5⤵
- Launches sc.exe
PID:4124
-
-
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService remove GameServerClient confirm5⤵PID:664
-
-
C:\Windows\SysWOW64\sc.exeSc delete GameSyncLink5⤵
- Launches sc.exe
PID:4992
-
-
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService remove GameSyncLink confirm5⤵PID:3704
-
-
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService install GameSyncLink "C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe"5⤵PID:4572
-
-
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService start GameSyncLink5⤵PID:1472
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameSyncLink\installc.bat" "4⤵PID:620
-
C:\Windows\SysWOW64\sc.exeSc stop GameServerClientC5⤵
- Launches sc.exe
PID:4696
-
-
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService remove GameServerClientC confirm5⤵PID:3624
-
-
C:\Windows\SysWOW64\sc.exeSc delete PiercingNetLink5⤵
- Launches sc.exe
PID:468
-
-
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService remove PiercingNetLink confirm5⤵PID:2916
-
-
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService install PiercingNetLink "C:\Program Files (x86)\GameSyncLink\PiercingNetLink.exe"5⤵PID:4000
-
-
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService start PiercingNetLink5⤵PID:2064
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameSyncLink\installm.bat" "4⤵PID:3516
-
C:\Windows\SysWOW64\sc.exeSc delete GameSyncLinks5⤵
- Launches sc.exe
PID:676
-
-
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService remove GameSyncLinks confirm5⤵PID:804
-
-
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService install GameSyncLinks "C:\Program Files (x86)\GameSyncLink\GameSyncLinks.exe"5⤵PID:4780
-
-
C:\Program Files (x86)\GameSyncLink\GameService.exeGameService start GameSyncLinks5⤵PID:4836
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "4⤵PID:956
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000007001\swizzhis.exe"C:\Users\Admin\AppData\Local\Temp\1000007001\swizzhis.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2440
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000010001\lumma1.exe"C:\Users\Admin\AppData\Local\Temp\1000010001\lumma1.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4460 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:3672
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:4124
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000013001\file300un.exe"C:\Users\Admin\AppData\Local\Temp\1000013001\file300un.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2428 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"4⤵
- Suspicious use of UnmapMainImage
PID:1656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 205⤵
- Program crash
PID:3876
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe"C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:3512 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe" /F4⤵
- Creates scheduled task(s)
PID:1380
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4828 -ip 48281⤵PID:468
-
C:\Program Files (x86)\GameSyncLink\GameService.exe"C:\Program Files (x86)\GameSyncLink\GameService.exe"1⤵PID:4624
-
C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe"C:\Program Files (x86)\GameSyncLink\GameSyncLink.exe"2⤵PID:1628
-
C:\Windows\Temp\580551.exe"C:\Windows\Temp\580551.exe" --list-devices3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1732
-
-
-
C:\Program Files (x86)\GameSyncLink\GameService.exe"C:\Program Files (x86)\GameSyncLink\GameService.exe"1⤵PID:3196
-
C:\Program Files (x86)\GameSyncLink\PiercingNetLink.exe"C:\Program Files (x86)\GameSyncLink\PiercingNetLink.exe"2⤵PID:1244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1656 -ip 16561⤵PID:2352
-
C:\Program Files (x86)\GameSyncLink\GameService.exe"C:\Program Files (x86)\GameSyncLink\GameService.exe"1⤵PID:372
-
C:\Program Files (x86)\GameSyncLink\GameSyncLinks.exe"C:\Program Files (x86)\GameSyncLink\GameSyncLinks.exe"2⤵PID:3880
-
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3736
-
C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe1⤵
- Executes dropped EXE
PID:3264
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe1⤵
- Executes dropped EXE
PID:4464
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2316
-
C:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000015001\NewB.exe1⤵
- Executes dropped EXE
PID:2728
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2.7MB
MD531841361be1f3dc6c2ce7756b490bf0f
SHA1ff2506641a401ac999f5870769f50b7326f7e4eb
SHA256222393a4ab4b2ae83ca861faee6df02ac274b2f2ca0bed8db1783dd61f2f37ee
SHA51253d66fa19e8db360042dadc55caaa9a1ca30a9d825e23ed2a58f32834691eb2aaaa27a4471e3fc4d13e201accc43160436ed0e9939df1cc227a62a09a2ae0019
-
Filesize
402KB
MD57f981db325bfed412599b12604bd00ab
SHA19f8a8fd9df3af3a4111e429b639174229c0c10cd
SHA256043839a678bed1b10be00842eae413f5ecd1cad7a0eaa384dd80bc1dcd31e69b
SHA512a5be61416bc60669523e15213098a6d3bb5a2393612b57863fedfa1ff974bc110e0b7e8aadc97d0c9830a80798518616f9edfb65ae22334a362a743b6af3a82d
-
Filesize
304KB
MD59faf597de46ed64912a01491fe550d33
SHA149203277926355afd49393782ae4e01802ad48af
SHA2560854678d655668c8ebb949c990166e26a4c04aef4ecf0191a95693ca150a9715
SHA512ef8a7a8566eaf962c4e21d49d9c1583ed2cdc9c2751ce75133a9765d2fa6dc511fc6cc99ea871eb83d50bd08a31cb0b25c03f27b8e6f351861231910a6cf1a1e
-
Filesize
4.2MB
MD50f52e5e68fe33694d488bfe7a1a71529
SHA111d7005bd72cb3fd46f24917bf3fc5f3203f361f
SHA256efd29c35766c607aa15d1cb83dec625739791b1616ad37d5b47e78cdb8a42ca8
SHA512238fbb1c04eef2f2005cb7abf0223e3cd062d9d2840966292e19dcaa495609e134a0bdc35389ae9925ecfc787a13772d3ac7b29058579f702bc849dd0343c400
-
Filesize
1.0MB
MD5808c0214e53b576530ee5b4592793bb0
SHA13fb03784f5dab1e99d5453664bd3169eff495c97
SHA256434b1a9bd966d204eef1f4cddb7b73a91ebc5aaf4ac9b4ddd999c6444d92eb61
SHA5122db3b4cb0233230e7c21cd820bde5de00286fbaedd3fe4dcefb6c66fe6867431f0ee1753fc18dcb89b2a18e888bd15d4d2de29b1d5cd93e425e3fcfe508c79c0
-
Filesize
1.2MB
MD556e7d98642cfc9ec438b59022c2d58d7
SHA126526f702e584d8c8b629b2db5d282c2125665d7
SHA256a2aa61942bae116f8c855fda0e9a991dba92b3a1e2f147aee0e7e2be1bdea383
SHA5120be0b11de472029bd4e2268cddb5ddb381f7f275dfe50c47b9c836980e5cbfa7f71fe78804ef2180ee110ca9cf36944ec8b8b22babb31a1fc7a6585f79932a1f
-
Filesize
2.7MB
MD5d18dbc8c3596af59d661a2d0437bb173
SHA10a88bb498001120fc5ae83764c5339f06ae70bac
SHA256ca58a17fe665c5997d673e7e5317d2a70dc2225ced1dbeea010888874ae48a81
SHA51225c2563ec9bf5fbd9f8c3a0606015ba93f4cfd8a8ea9dae72b34fc43c57cb024c3fb97b6bf82b6a59d79b092c014c4c47ca202126755a96880e7476cc91e5e76
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
1.8MB
MD5a67307604cbc98209e513df9f5864a3e
SHA12b4a5fc21340fcdc4e722ab3ac9532f115387e57
SHA25646df76fcbd73ee551748a4b9a65b6957b6ca4c4a7863a4bb16d40ad5c119bf69
SHA512294b37ff3cb5214faa45e89cda297e5292884fb8454832e2def31d7c043c49ef032cb48eff0cd1c7df98f9c68c2efb8fbff6c389b8543eb560557baf66bcef2f
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2804150937-2146708401-419095071-1000\76b53b3ec448f7ccdda2063b15d2bfc3_5a32ead2-14a8-4b34-b6a3-85cfb28e2fbd
Filesize2KB
MD5a3ac049abb21ff9f5063db8e6cf468c6
SHA187d94de2b995a4cba1ee221df07f98de84beba76
SHA256a1cdfb25c47c134cdb58e62a724e593b8bd8d418da63b008c00145e85051e47c
SHA51243b475edef011615f5f92754455ca94e526ef5027e29d0c74d8dcb3942ae9a4e1c397cedf2b51d13d7bf6997d3f076842d50d5745014c9b468a34e7c0e02fd88
-
Filesize
304KB
MD50c582da789c91878ab2f1b12d7461496
SHA1238bd2408f484dd13113889792d6e46d6b41c5ba
SHA256a6ab532816fbb0c9664c708746db35287aaa85cbb417bef2eafcd9f5eaf7cf67
SHA512a1b7c5c13462a7704ea2aea5025d1cb16ddd622fe1e2de3bbe08337c271a4dc8b9be2eae58a4896a7df3ad44823675384dbc60bdc737c54b173909be7a0a086a
-
Filesize
750KB
MD520ae0bb07ba77cb3748aa63b6eb51afb
SHA187c468dc8f3d90a63833d36e4c900fa88d505c6d
SHA256daf6ae706fc78595f0d386817a0f8a3a7eb4ec8613219382b1cbaa7089418e7d
SHA512db315e00ce2b2d5a05cb69541ee45aade4332e424c4955a79d2b7261ab7bd739f02dc688224f031a7a030c92fa915d029538e236dbd3c28b8d07d1265a52e5b2
-
Filesize
2KB
MD5718048dcb9d505f5cc3b633b8e74902d
SHA1696bad822551d7fb4ecdda1ba6cd29f6697a0032
SHA25643ae9fbf7418b1b79db6b9121faf48d9d213fc4eab3b09b660a99905cc42a65d
SHA512ca519b4c02e9861a9098b7e093db69de4e02374a889a3a1a513bdbac94fbdd7ee9c7bb36e420bbed6ca1d9249edb3f929e323d6eee409e36bef63ad29135cca8
-
Filesize
2KB
MD557802067b24d05300cdd369ee6a48c48
SHA13fd216573d9d1329598cfeeeeb8c38accfdfdd4e
SHA256adfd8cdab6e6ac5a5b5b234e05be88ec741a5b20627c97e442f34fb206b54d2b
SHA512c631ad8e69412499cc4d7ef9359f9c0c8525f7b1eca26d139b52c1e04924099049b1cdf406e6518389eb5fc7792977a11ef4c010205d05b811eb51a739a97ecc
-
Filesize
2KB
MD52128be6b7c279ef791f6dff3bf23ea34
SHA1b452eac07cd95b9088ba9eb82e403dbe426af6b3
SHA256fd83769ffaaff3d66b89e82a20a7574ba5073b84bcf88ab090ae5443b35f5f8e
SHA5121f07e72bacd3836809d282da397ed2ca9aa634e0b4fc8b947de7aae1a511f9f80e8f7a1b0bacdcb5cd62fb430b3b9e534330877e238c95302884fd71497cc046
-
Filesize
2KB
MD58e56749da6a3af20eb210a35003f4622
SHA14b58c1888e6e1c05b32e3eea8a691edafb9b3114
SHA256249a61c02618ccc34a6dfe56a8a90916f9ed2ecf87be1ec7ed6e325844fa7d57
SHA5124ecac9a46eec06b991e1cf652a70de575ec9ed9b012f784710a4655bac212d6ae30755ea877e6a38b25af4bcb4162719f03917d38f62c582b462db8f641bdf05
-
Filesize
2.0MB
MD55c9e996ee95437c15b8d312932e72529
SHA1eb174c76a8759f4b85765fa24d751846f4a2d2ef
SHA2560eecdbfabaaef36f497e944a6ceb468d01824f3ae6457b4ae4b3ac8e95eebb55
SHA512935102aad64da7eeb3e4b172488b3a0395298d480f885ecedc5d8325f0a9eabeea8ba1ece512753ac170a03016c80ba4990786ab608b4de0b11e6343fbf2192b
-
Filesize
398KB
MD51d7955354884a9058e89bb8ea34415c9
SHA162c046984afd51877ecadad1eca209fda74c8cb1
SHA256111f216aef35f45086888c3f0a30bb9ab48e2b333daeddafd3a76be037a22a6e
SHA5127eb8739841c476cda3cf4c8220998bc8c435c04a89c4bbef27b8f3b904762dede224552b4204d35935562aa73f258c4e0ddb69d065f732cb06cc357796cdd1b2