Analysis
-
max time kernel
144s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 02:19
Behavioral task
behavioral1
Sample
1af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
1af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6.exe
Resource
win11-20240419-en
General
-
Target
1af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6.exe
-
Size
1.7MB
-
MD5
11956bc787a56529d29f7f00b4af9192
-
SHA1
eca8a989bee6ebde3e5ef2b9a116cb7e859f3c4e
-
SHA256
1af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6
-
SHA512
6a2c694adb16be5220823252a92d7f3480fa243883c9b1ca7c74fbc1a48c0adacce14436222a3bfabfdb34dc9066afa508b7b3f5e2a0c647660d9d28543a74b3
-
SSDEEP
49152:zZmm1vTigRg9EXPL4ME8XTL2UorDkm+o7Dkz+TWthB:FmmhTxg2Xi8DL2UoHx+cDSnP
Malware Config
Extracted
amadey
4.20
http://5.42.96.141
http://5.42.96.7
-
install_dir
908f070dff
-
install_file
explorku.exe
-
strings_key
b25a9385246248a95c600f9a061438e1
-
url_paths
/go34ko8/index.php
Extracted
risepro
147.45.47.126:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
Processes:
explorku.exe1af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6.exeamers.exeaxplons.exeb974ab4472.exeaxplons.exeexplorku.exeaxplons.exeexplorku.exeaxplons.exeexplorku.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amers.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b974ab4472.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
axplons.exe1af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6.exeexplorku.exeb974ab4472.exeexplorku.exeaxplons.exeaxplons.exeaxplons.exeexplorku.exeexplorku.exeamers.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b974ab4472.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b974ab4472.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amers.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amers.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6.exeexplorku.exeamers.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 1af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation explorku.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation amers.exe -
Executes dropped EXE 11 IoCs
Processes:
explorku.exeamers.exeaxplons.exeb974ab4472.exeinstaller.exeaxplons.exeexplorku.exeaxplons.exeexplorku.exeaxplons.exeexplorku.exepid process 3120 explorku.exe 3752 amers.exe 1980 axplons.exe 2604 b974ab4472.exe 1140 installer.exe 1312 axplons.exe 1736 explorku.exe 4312 axplons.exe 3224 explorku.exe 1708 axplons.exe 412 explorku.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
amers.exeaxplons.exeaxplons.exeaxplons.exeaxplons.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine amers.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine axplons.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/3616-0-0x0000000000080000-0x00000000005CB000-memory.dmp themida behavioral1/memory/3616-1-0x0000000000080000-0x00000000005CB000-memory.dmp themida behavioral1/memory/3616-3-0x0000000000080000-0x00000000005CB000-memory.dmp themida behavioral1/memory/3616-2-0x0000000000080000-0x00000000005CB000-memory.dmp themida behavioral1/memory/3616-7-0x0000000000080000-0x00000000005CB000-memory.dmp themida behavioral1/memory/3616-6-0x0000000000080000-0x00000000005CB000-memory.dmp themida behavioral1/memory/3616-5-0x0000000000080000-0x00000000005CB000-memory.dmp themida behavioral1/memory/3616-4-0x0000000000080000-0x00000000005CB000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe themida behavioral1/memory/3616-18-0x0000000000080000-0x00000000005CB000-memory.dmp themida behavioral1/memory/3120-22-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/3120-23-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/3120-27-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/3120-26-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/3120-25-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/3120-24-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/3120-21-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/3120-20-0x0000000000D70000-0x00000000012BB000-memory.dmp themida C:\Users\Admin\1000006002\b974ab4472.exe themida behavioral1/memory/3120-78-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/2604-80-0x00000000002C0000-0x00000000008DF000-memory.dmp themida behavioral1/memory/2604-83-0x00000000002C0000-0x00000000008DF000-memory.dmp themida behavioral1/memory/2604-84-0x00000000002C0000-0x00000000008DF000-memory.dmp themida behavioral1/memory/2604-82-0x00000000002C0000-0x00000000008DF000-memory.dmp themida behavioral1/memory/2604-81-0x00000000002C0000-0x00000000008DF000-memory.dmp themida behavioral1/memory/2604-85-0x00000000002C0000-0x00000000008DF000-memory.dmp themida behavioral1/memory/2604-87-0x00000000002C0000-0x00000000008DF000-memory.dmp themida behavioral1/memory/2604-86-0x00000000002C0000-0x00000000008DF000-memory.dmp themida behavioral1/memory/2604-88-0x00000000002C0000-0x00000000008DF000-memory.dmp themida behavioral1/memory/1736-123-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/1736-128-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/1736-127-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/1736-131-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/1736-126-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/1736-125-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/1736-124-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/1736-132-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/3120-136-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/2604-138-0x00000000002C0000-0x00000000008DF000-memory.dmp themida behavioral1/memory/3224-256-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/3224-257-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/3224-260-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/3224-263-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/3224-262-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/3224-261-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/3224-259-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/3224-255-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/3224-265-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/412-293-0x0000000000D70000-0x00000000012BB000-memory.dmp themida behavioral1/memory/412-299-0x0000000000D70000-0x00000000012BB000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explorku.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b974ab4472.exe = "C:\\Users\\Admin\\1000006002\\b974ab4472.exe" explorku.exe -
Processes:
1af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6.exeexplorku.exeb974ab4472.exeexplorku.exeexplorku.exeexplorku.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorku.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b974ab4472.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorku.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorku.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorku.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 26 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
amers.exeaxplons.exeaxplons.exeaxplons.exeaxplons.exepid process 3752 amers.exe 1980 axplons.exe 1312 axplons.exe 4312 axplons.exe 1708 axplons.exe -
Drops file in Windows directory 2 IoCs
Processes:
1af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6.exeamers.exedescription ioc process File created C:\Windows\Tasks\explorku.job 1af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6.exe File created C:\Windows\Tasks\axplons.job amers.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
amers.exeaxplons.exeinstaller.exeaxplons.exeaxplons.exeaxplons.exepid process 3752 amers.exe 3752 amers.exe 1980 axplons.exe 1980 axplons.exe 1140 installer.exe 1312 axplons.exe 1312 axplons.exe 1140 installer.exe 4312 axplons.exe 4312 axplons.exe 1140 installer.exe 1708 axplons.exe 1708 axplons.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
installer.exedescription pid process Token: SeDebugPrivilege 1140 installer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
1af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6.exepid process 3616 1af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
1af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6.exeexplorku.exeamers.exedescription pid process target process PID 3616 wrote to memory of 3120 3616 1af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6.exe explorku.exe PID 3616 wrote to memory of 3120 3616 1af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6.exe explorku.exe PID 3616 wrote to memory of 3120 3616 1af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6.exe explorku.exe PID 3120 wrote to memory of 2184 3120 explorku.exe explorku.exe PID 3120 wrote to memory of 2184 3120 explorku.exe explorku.exe PID 3120 wrote to memory of 2184 3120 explorku.exe explorku.exe PID 3120 wrote to memory of 3752 3120 explorku.exe amers.exe PID 3120 wrote to memory of 3752 3120 explorku.exe amers.exe PID 3120 wrote to memory of 3752 3120 explorku.exe amers.exe PID 3752 wrote to memory of 1980 3752 amers.exe axplons.exe PID 3752 wrote to memory of 1980 3752 amers.exe axplons.exe PID 3752 wrote to memory of 1980 3752 amers.exe axplons.exe PID 3120 wrote to memory of 2604 3120 explorku.exe b974ab4472.exe PID 3120 wrote to memory of 2604 3120 explorku.exe b974ab4472.exe PID 3120 wrote to memory of 2604 3120 explorku.exe b974ab4472.exe PID 3120 wrote to memory of 1140 3120 explorku.exe installer.exe PID 3120 wrote to memory of 1140 3120 explorku.exe installer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6.exe"C:\Users\Admin\AppData\Local\Temp\1af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"3⤵PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\amers.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\amers.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
-
C:\Users\Admin\1000006002\b974ab4472.exe"C:\Users\Admin\1000006002\b974ab4472.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\1000012001\installer.exe"C:\Users\Admin\AppData\Local\Temp\1000012001\installer.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
-
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1312
-
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exeC:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1736
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exeC:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3224
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exeC:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5411c09927ab87381ce26d7ad2dd68281
SHA13cc6ffaf79343f1a406556516c525e6337406e70
SHA256034b2f5647bc70ca9db5e2c31f5d795d76f31ec55b56e6512efa3beb8981252c
SHA5128922c64b998a6ce2083ff62c4127a4995e0d81fc2c2af84d15e9a8bce299eed07ccafd4038a99a2f95be58d52e9fe5987f5a6a99f65a03b714eb8eee9b49f1a4
-
Filesize
1.8MB
MD54bd3e99486ffbbd065656e0300d56c3e
SHA1d65965f613f83d235f0bfcabea5505a7c547eeca
SHA256b1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282
SHA512856330451d808359d077c05387eac0a5b97f331e8abcb14a57f40887577d3905718b4263ada0c82af1284cba57d9da375e2827311736a56a3dcc27f7e63d0ee9
-
Filesize
621KB
MD5611a4246c5aabf1594344d7bd3fccb4c
SHA1cf0e6b3ecb479a8bdb7421090ecc89148db9f83b
SHA256aa34e0bb1a7400fd7430922307c36441290730d07f48f982f01d4bad2fde3d0e
SHA5120daff7de219bcc38ddc8ddf261993b6e870605fbf6ec194e08651b293008a8a42c0c13780482f7fc45e3a5f509b644430311cb382be632075544e61dc63fe23e
-
Filesize
1.7MB
MD511956bc787a56529d29f7f00b4af9192
SHA1eca8a989bee6ebde3e5ef2b9a116cb7e859f3c4e
SHA2561af0090ffc936e296ff8097bfae2f215049c2edadb8826ad5d6647a7c41a53d6
SHA5126a2c694adb16be5220823252a92d7f3480fa243883c9b1ca7c74fbc1a48c0adacce14436222a3bfabfdb34dc9066afa508b7b3f5e2a0c647660d9d28543a74b3
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82