Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 14:19
Static task
static1
Behavioral task
behavioral1
Sample
9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exe
Resource
win10v2004-20240426-en
General
-
Target
9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exe
-
Size
1.8MB
-
MD5
78252626a9222f6094d37e3ee242d1c7
-
SHA1
bb3fe98f10d462c995da9d1a244b1ac6342499b4
-
SHA256
9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e
-
SHA512
ffe47040aa7eb4babe660e65100bbf60d5921ab08e445ceec304a818157def5dc5d387e57ebbc3a62112c618f97090befadab31b366df7ca42b735ebda1a2839
-
SSDEEP
49152:wQoU9Fvc3k/fV83ZmvYIR0WuyRYedGAlpm48ety5A:coFvc3k/fSh0jRYed5zFFt
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
risepro
147.45.47.126:58709
Extracted
amadey
4.21
49e482
http://147.45.47.70
-
install_dir
1b29d73536
-
install_file
axplont.exe
-
strings_key
4d31dd1a190d9879c21fac6d87dc0043
-
url_paths
/tr8nomy/index.php
Extracted
xehook
2.1.5 Stable
https://ussrconnect.ru/
https://c0nnect1ng.ru/
https://vodkaenjoy.ru/
-
id
105
-
token
xehook105401801
Signatures
-
Detect Xehook Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2272-115-0x0000000000400000-0x000000000042C000-memory.dmp family_xehook -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
Processes:
explortu.exeaxplont.exe9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exeexplortu.exeexplortu.exe90cebc9cf8.exeexplortu.exeaxplont.exeexplortu.exe2fb76609a9.exeaxplont.exeaxplont.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 90cebc9cf8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2fb76609a9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exeaxplont.exeexplortu.exeaxplont.exeaxplont.exe2fb76609a9.exeexplortu.exe90cebc9cf8.exeaxplont.exeexplortu.exeexplortu.exeexplortu.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2fb76609a9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 90cebc9cf8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 90cebc9cf8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2fb76609a9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exeexplortu.exe2fb76609a9.exeaxplont.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation explortu.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 2fb76609a9.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation axplont.exe -
Executes dropped EXE 12 IoCs
Processes:
explortu.exeexplortu.exe2fb76609a9.exeaxplont.exeexplortu.exeaxplont.exevictor.exe90cebc9cf8.exeexplortu.exeaxplont.exeaxplont.exeexplortu.exepid Process 4740 explortu.exe 5080 explortu.exe 624 2fb76609a9.exe 212 axplont.exe 456 explortu.exe 4016 axplont.exe 2520 victor.exe 3180 90cebc9cf8.exe 2288 explortu.exe 4520 axplont.exe 3576 axplont.exe 2772 explortu.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
axplont.exeexplortu.exeaxplont.exe90cebc9cf8.exeexplortu.exeexplortu.exe9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exeexplortu.exeaxplont.exeaxplont.exeexplortu.exe2fb76609a9.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine 90cebc9cf8.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine 9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine 2fb76609a9.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explortu.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\90cebc9cf8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000005001\\90cebc9cf8.exe" explortu.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 28 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
Processes:
9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exeexplortu.exeexplortu.exe2fb76609a9.exeaxplont.exeexplortu.exeaxplont.exe90cebc9cf8.exeexplortu.exeaxplont.exeaxplont.exeexplortu.exepid Process 3696 9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exe 4740 explortu.exe 5080 explortu.exe 624 2fb76609a9.exe 212 axplont.exe 456 explortu.exe 4016 axplont.exe 3180 90cebc9cf8.exe 2288 explortu.exe 4520 axplont.exe 3576 axplont.exe 2772 explortu.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
explortu.exevictor.exedescription pid Process procid_target PID 4740 set thread context of 5080 4740 explortu.exe 90 PID 2520 set thread context of 2272 2520 victor.exe 100 -
Drops file in Windows directory 2 IoCs
Processes:
9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exe2fb76609a9.exedescription ioc Process File created C:\Windows\Tasks\explortu.job 9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exe File created C:\Windows\Tasks\axplont.job 2fb76609a9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4492 2520 WerFault.exe 98 -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exeexplortu.exeexplortu.exe2fb76609a9.exeaxplont.exeexplortu.exeaxplont.exe90cebc9cf8.exeexplortu.exeaxplont.exeexplortu.exeaxplont.exepid Process 3696 9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exe 3696 9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exe 4740 explortu.exe 4740 explortu.exe 5080 explortu.exe 5080 explortu.exe 624 2fb76609a9.exe 624 2fb76609a9.exe 212 axplont.exe 212 axplont.exe 456 explortu.exe 456 explortu.exe 4016 axplont.exe 4016 axplont.exe 3180 90cebc9cf8.exe 3180 90cebc9cf8.exe 2288 explortu.exe 2288 explortu.exe 4520 axplont.exe 4520 axplont.exe 2772 explortu.exe 2772 explortu.exe 3576 axplont.exe 3576 axplont.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegAsm.exedescription pid Process Token: SeDebugPrivilege 2272 RegAsm.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exeexplortu.exe2fb76609a9.exeaxplont.exevictor.exedescription pid Process procid_target PID 3696 wrote to memory of 4740 3696 9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exe 85 PID 3696 wrote to memory of 4740 3696 9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exe 85 PID 3696 wrote to memory of 4740 3696 9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exe 85 PID 4740 wrote to memory of 5080 4740 explortu.exe 90 PID 4740 wrote to memory of 5080 4740 explortu.exe 90 PID 4740 wrote to memory of 5080 4740 explortu.exe 90 PID 4740 wrote to memory of 5080 4740 explortu.exe 90 PID 4740 wrote to memory of 5080 4740 explortu.exe 90 PID 4740 wrote to memory of 5080 4740 explortu.exe 90 PID 4740 wrote to memory of 5080 4740 explortu.exe 90 PID 4740 wrote to memory of 5080 4740 explortu.exe 90 PID 4740 wrote to memory of 5080 4740 explortu.exe 90 PID 4740 wrote to memory of 5080 4740 explortu.exe 90 PID 4740 wrote to memory of 5080 4740 explortu.exe 90 PID 4740 wrote to memory of 5080 4740 explortu.exe 90 PID 4740 wrote to memory of 624 4740 explortu.exe 94 PID 4740 wrote to memory of 624 4740 explortu.exe 94 PID 4740 wrote to memory of 624 4740 explortu.exe 94 PID 624 wrote to memory of 212 624 2fb76609a9.exe 95 PID 624 wrote to memory of 212 624 2fb76609a9.exe 95 PID 624 wrote to memory of 212 624 2fb76609a9.exe 95 PID 212 wrote to memory of 2520 212 axplont.exe 98 PID 212 wrote to memory of 2520 212 axplont.exe 98 PID 212 wrote to memory of 2520 212 axplont.exe 98 PID 2520 wrote to memory of 2860 2520 victor.exe 99 PID 2520 wrote to memory of 2860 2520 victor.exe 99 PID 2520 wrote to memory of 2860 2520 victor.exe 99 PID 2520 wrote to memory of 2272 2520 victor.exe 100 PID 2520 wrote to memory of 2272 2520 victor.exe 100 PID 2520 wrote to memory of 2272 2520 victor.exe 100 PID 2520 wrote to memory of 2272 2520 victor.exe 100 PID 2520 wrote to memory of 2272 2520 victor.exe 100 PID 2520 wrote to memory of 2272 2520 victor.exe 100 PID 2520 wrote to memory of 2272 2520 victor.exe 100 PID 2520 wrote to memory of 2272 2520 victor.exe 100 PID 4740 wrote to memory of 3180 4740 explortu.exe 105 PID 4740 wrote to memory of 3180 4740 explortu.exe 105 PID 4740 wrote to memory of 3180 4740 explortu.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exe"C:\Users\Admin\AppData\Local\Temp\9e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
C:\Users\Admin\1000004002\2fb76609a9.exe"C:\Users\Admin\1000004002\2fb76609a9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\1000025001\victor.exe"C:\Users\Admin\AppData\Local\Temp\1000025001\victor.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:2860
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 2566⤵
- Program crash
PID:4492
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\90cebc9cf8.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\90cebc9cf8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
-
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4016
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2520 -ip 25201⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4520
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD54004784b2e02643c140c2179e2127991
SHA17a9740ba16984e1ed124f268786f53b18aabe345
SHA256c62ba053b3c7416571e07d79c18aad76ba4b75a449c267b21ad446bd54c96084
SHA5122bb3c7654fb361ccf9996bd7e2904cbc7ad60c3149ce2dd38ef16461d9039b8b8547377bf5acdeccd3b1768e65ba55efb062c4c05434697178f3f6047d4c38b8
-
Filesize
2.3MB
MD5a8d05ec9d8bc672a6e172ac51c735d21
SHA1a6ddb74bbac392903a53acf4620bbc896a20a3dc
SHA2567d6c8b947ebf5a86c190a3b1aef41464c4d8c1c71d664e4d6f2fa47d8aa7f45f
SHA512c6309f4cb69b1ea46e2014ade44c540f8d277cf3d1de5de1548a1041fda641bd2e866bbc1f94ea5b2e911794b0e634f29e1373909447b54787772a193ba3c2be
-
Filesize
1.0MB
MD5585d16749fda38cb7f8a987137890167
SHA10b3f1064b2f0ddf397552e442e99e1c233c67df1
SHA256496219a22d96d4eb4c699045521b7fa73bba242d4e84e62f565e8d8046fa00c5
SHA512784c3a2e3fa3e90f57ed059a5bc204441da3ebc173a93b67e752f84cc2e2cf0f4ddc49aabeaa3233053e49d51633f6bb93a90c0735292084305b00bf79b2c632
-
Filesize
1.8MB
MD578252626a9222f6094d37e3ee242d1c7
SHA1bb3fe98f10d462c995da9d1a244b1ac6342499b4
SHA2569e86c34297ba479641a15e416329247d413585e27a75cd12f8c27fde9eea9b8e
SHA512ffe47040aa7eb4babe660e65100bbf60d5921ab08e445ceec304a818157def5dc5d387e57ebbc3a62112c618f97090befadab31b366df7ca42b735ebda1a2839