Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 16:30
Static task
static1
Behavioral task
behavioral1
Sample
141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9.exe
Resource
win11-20240419-en
General
-
Target
141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9.exe
-
Size
1.8MB
-
MD5
46446c63c5d32d2157a4a6977b0e30c2
-
SHA1
cc7df76a3b496b7f37dc7f97dd486e42b0a888af
-
SHA256
141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9
-
SHA512
58e2f3ede95800ef5938585c9928f7aedccd895b606ac2c1a7b020511899ede811fa31d5080e39ccce03bf2a33961ffef307a27cd9f0fd25b08d77f0d325a079
-
SSDEEP
24576:gbog96Qggz2b+gtbrUzh+m2FFGioyoY9MHDow15R3Pxy62cTcZsC+RxiEOzOIJfN:gbpex30wFFfoBMAPM6aJT27O0B5dJi
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
amadey
4.21
49e482
http://147.45.47.70
-
install_dir
1b29d73536
-
install_file
axplont.exe
-
strings_key
4d31dd1a190d9879c21fac6d87dc0043
-
url_paths
/tr8nomy/index.php
Extracted
redline
@LOGSCLOUDYT_BOT
185.172.128.33:8970
Extracted
redline
1
185.215.113.67:40960
Extracted
stealc
zzvv
http://23.88.106.134
-
url_path
/c73eed764cc59dcb.php
Extracted
risepro
147.45.47.126:58709
Extracted
lumma
https://roomabolishsnifftwk.shop/api
https://museumtespaceorsp.shop/api
https://buttockdecarderwiso.shop/api
https://averageaattractiionsl.shop/api
https://femininiespywageg.shop/api
https://detailbaconroollyws.shop/api
https://employhabragaomlsp.shop/api
https://stalfbaclcalorieeis.shop/api
https://horsedwollfedrwos.shop/api
https://civilianurinedtsraov.shop/api
https://patternapplauderw.shop/api
https://understanndtytonyguw.shop/api
https://considerrycurrentyws.shop/api
https://messtimetabledkolvk.shop/api
https://deprivedrinkyfaiir.shop/api
https://relaxtionflouwerwi.shop/api
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral1/files/0x0007000000023563-98.dat family_redline behavioral1/files/0x0007000000023562-112.dat family_redline behavioral1/memory/4512-133-0x0000000000C50000-0x0000000000CA2000-memory.dmp family_redline behavioral1/memory/2608-131-0x0000000000F00000-0x0000000000F52000-memory.dmp family_redline -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file300un.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths file300un.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe = "0" file300un.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f34da4e680.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 426ae2511d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5708 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f34da4e680.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f34da4e680.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 426ae2511d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 426ae2511d.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation explortu.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 426ae2511d.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation axplont.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation file300un.exe -
Executes dropped EXE 16 IoCs
pid Process 4844 explortu.exe 4820 426ae2511d.exe 3876 f34da4e680.exe 4744 axplont.exe 2008 33333.exe 952 One.exe 4512 svhoost.exe 2608 fileosn.exe 5420 lumma1234.exe 5744 gold.exe 5916 swizzzz.exe 4044 file300un.exe 5436 axplont.exe 4592 explortu.exe 5144 axplont.exe 5124 explortu.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine 141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine 426ae2511d.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine f34da4e680.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions file300un.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe = "0" file300un.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths file300un.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f34da4e680.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000005001\\f34da4e680.exe" explortu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA file300un.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file300un.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 4712 141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9.exe 4844 explortu.exe 4820 426ae2511d.exe 3876 f34da4e680.exe 4744 axplont.exe 5436 axplont.exe 4592 explortu.exe 5124 explortu.exe 5144 axplont.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2008 set thread context of 4344 2008 33333.exe 111 PID 5420 set thread context of 5536 5420 lumma1234.exe 120 PID 5744 set thread context of 5796 5744 gold.exe 126 PID 5916 set thread context of 5956 5916 swizzzz.exe 128 PID 4044 set thread context of 5700 4044 file300un.exe 136 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\explortu.job 141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9.exe File created C:\Windows\Tasks\axplont.job 426ae2511d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 5628 2008 WerFault.exe 109 5320 5744 WerFault.exe 124 5816 5700 WerFault.exe 136 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5428 timeout.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 svhoost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 svhoost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4712 141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9.exe 4712 141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9.exe 4844 explortu.exe 4844 explortu.exe 4820 426ae2511d.exe 4820 426ae2511d.exe 3876 f34da4e680.exe 3876 f34da4e680.exe 4744 axplont.exe 4744 axplont.exe 5956 RegAsm.exe 5956 RegAsm.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 4512 svhoost.exe 952 One.exe 952 One.exe 5708 powershell.exe 5708 powershell.exe 952 One.exe 952 One.exe 952 One.exe 952 One.exe 952 One.exe 952 One.exe 952 One.exe 952 One.exe 952 One.exe 952 One.exe 5708 powershell.exe 4512 svhoost.exe 4512 svhoost.exe 5436 axplont.exe 5436 axplont.exe 4592 explortu.exe 4592 explortu.exe 5124 explortu.exe 5124 explortu.exe 5144 axplont.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 952 One.exe Token: SeBackupPrivilege 952 One.exe Token: SeSecurityPrivilege 952 One.exe Token: SeSecurityPrivilege 952 One.exe Token: SeSecurityPrivilege 952 One.exe Token: SeSecurityPrivilege 952 One.exe Token: SeDebugPrivilege 4044 file300un.exe Token: SeDebugPrivilege 4512 svhoost.exe Token: SeDebugPrivilege 5708 powershell.exe Token: SeDebugPrivilege 4344 RegAsm.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4820 426ae2511d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4712 wrote to memory of 4844 4712 141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9.exe 94 PID 4712 wrote to memory of 4844 4712 141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9.exe 94 PID 4712 wrote to memory of 4844 4712 141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9.exe 94 PID 4844 wrote to memory of 3408 4844 explortu.exe 102 PID 4844 wrote to memory of 3408 4844 explortu.exe 102 PID 4844 wrote to memory of 3408 4844 explortu.exe 102 PID 4844 wrote to memory of 4820 4844 explortu.exe 103 PID 4844 wrote to memory of 4820 4844 explortu.exe 103 PID 4844 wrote to memory of 4820 4844 explortu.exe 103 PID 4844 wrote to memory of 3876 4844 explortu.exe 105 PID 4844 wrote to memory of 3876 4844 explortu.exe 105 PID 4844 wrote to memory of 3876 4844 explortu.exe 105 PID 4820 wrote to memory of 4744 4820 426ae2511d.exe 106 PID 4820 wrote to memory of 4744 4820 426ae2511d.exe 106 PID 4820 wrote to memory of 4744 4820 426ae2511d.exe 106 PID 4744 wrote to memory of 2008 4744 axplont.exe 109 PID 4744 wrote to memory of 2008 4744 axplont.exe 109 PID 4744 wrote to memory of 2008 4744 axplont.exe 109 PID 2008 wrote to memory of 1408 2008 33333.exe 110 PID 2008 wrote to memory of 1408 2008 33333.exe 110 PID 2008 wrote to memory of 1408 2008 33333.exe 110 PID 2008 wrote to memory of 4344 2008 33333.exe 111 PID 2008 wrote to memory of 4344 2008 33333.exe 111 PID 2008 wrote to memory of 4344 2008 33333.exe 111 PID 2008 wrote to memory of 4344 2008 33333.exe 111 PID 2008 wrote to memory of 4344 2008 33333.exe 111 PID 2008 wrote to memory of 4344 2008 33333.exe 111 PID 2008 wrote to memory of 4344 2008 33333.exe 111 PID 2008 wrote to memory of 4344 2008 33333.exe 111 PID 4344 wrote to memory of 952 4344 RegAsm.exe 112 PID 4344 wrote to memory of 952 4344 RegAsm.exe 112 PID 4344 wrote to memory of 4512 4344 RegAsm.exe 113 PID 4344 wrote to memory of 4512 4344 RegAsm.exe 113 PID 4344 wrote to memory of 4512 4344 RegAsm.exe 113 PID 4744 wrote to memory of 2608 4744 axplont.exe 115 PID 4744 wrote to memory of 2608 4744 axplont.exe 115 PID 4744 wrote to memory of 2608 4744 axplont.exe 115 PID 4744 wrote to memory of 5420 4744 axplont.exe 117 PID 4744 wrote to memory of 5420 4744 axplont.exe 117 PID 4744 wrote to memory of 5420 4744 axplont.exe 117 PID 5420 wrote to memory of 5528 5420 lumma1234.exe 119 PID 5420 wrote to memory of 5528 5420 lumma1234.exe 119 PID 5420 wrote to memory of 5528 5420 lumma1234.exe 119 PID 5420 wrote to memory of 5536 5420 lumma1234.exe 120 PID 5420 wrote to memory of 5536 5420 lumma1234.exe 120 PID 5420 wrote to memory of 5536 5420 lumma1234.exe 120 PID 5420 wrote to memory of 5536 5420 lumma1234.exe 120 PID 5420 wrote to memory of 5536 5420 lumma1234.exe 120 PID 5420 wrote to memory of 5536 5420 lumma1234.exe 120 PID 5420 wrote to memory of 5536 5420 lumma1234.exe 120 PID 5420 wrote to memory of 5536 5420 lumma1234.exe 120 PID 5420 wrote to memory of 5536 5420 lumma1234.exe 120 PID 4744 wrote to memory of 5744 4744 axplont.exe 124 PID 4744 wrote to memory of 5744 4744 axplont.exe 124 PID 4744 wrote to memory of 5744 4744 axplont.exe 124 PID 5744 wrote to memory of 5784 5744 gold.exe 125 PID 5744 wrote to memory of 5784 5744 gold.exe 125 PID 5744 wrote to memory of 5784 5744 gold.exe 125 PID 5744 wrote to memory of 5796 5744 gold.exe 126 PID 5744 wrote to memory of 5796 5744 gold.exe 126 PID 5744 wrote to memory of 5796 5744 gold.exe 126 PID 5744 wrote to memory of 5796 5744 gold.exe 126 PID 5744 wrote to memory of 5796 5744 gold.exe 126 PID 5744 wrote to memory of 5796 5744 gold.exe 126 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file300un.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9.exe"C:\Users\Admin\AppData\Local\Temp\141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵PID:3408
-
-
C:\Users\Admin\1000004002\426ae2511d.exe"C:\Users\Admin\1000004002\426ae2511d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:1408
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Roaming\configurationValue\One.exe"C:\Users\Admin\AppData\Roaming\configurationValue\One.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:952
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe"C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe"7⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"7⤵PID:5588
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 38⤵PID:5864
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 2886⤵
- Program crash
PID:5628
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe"5⤵
- Executes dropped EXE
PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe"C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5420 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:5528
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:5536
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe"C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5744 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:5784
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:5796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5744 -s 2886⤵
- Program crash
PID:5320
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe"C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5916 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5956 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" & del "C:\ProgramData\*.dll"" & exit7⤵PID:432
-
C:\Windows\SysWOW64\timeout.exetimeout /t 58⤵
- Delays execution with timeout.exe
PID:5428
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe"C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe"5⤵
- UAC bypass
- Windows security bypass
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4044 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe" -Force6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5708
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"6⤵PID:5700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5700 -s 1527⤵
- Program crash
PID:5816
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"6⤵PID:5736
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\f34da4e680.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\f34da4e680.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3876
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4172,i,5047420736443372512,9747851268033796534,262144 --variations-seed-version --mojo-platform-channel-handle=4420 /prefetch:81⤵PID:4332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2008 -ip 20081⤵PID:5604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5744 -ip 57441⤵PID:5344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5700 -ip 57001⤵PID:5612
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4592
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5436
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5144
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5124
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
6Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5346c787bf4f6e58ccd256fc3706e575f
SHA19a17a474339d4ca391a8770ac1e9dbca1bf20be3
SHA2567378549f353a1b4c1c4592fa9752498d7b176d9da6f904d0b06aeeebc2b4a6ab
SHA512ea0d61140cd3abcb497807c30da69e0db0803e2c481f7f45268fb08445062b78c63c26fb4bf4708e29e0f97aa8a9228317946a2db0fa6b5dbd372835c379b5a9
-
Filesize
2.1MB
MD5208bd37e8ead92ed1b933239fb3c7079
SHA1941191eed14fce000cfedbae9acfcb8761eb3492
SHA256e1fd277ffc74d67554adce94366e6fa5ebc81f8c4999634bcc3396164ba38494
SHA512a9c3c32573a16b7ca71a12af6e8c8e88502b66bae2465a82dd921fbc6e0c833b9b1c2d436963df189dd9d68568e1be9128826a2e59f1d5fe066b637d2d866715
-
Filesize
2.3MB
MD5a3726bf86b193f1b87325ac61f66ce02
SHA1af3311c8c3e2f5b3c65371ffa71a3e40f00540bd
SHA2564b5fe6f9527f032aea75af730100d7eafaaadffd5132a5970e3f7596f49da11e
SHA51291f5864253d0b493bcf4d8d7c51f05d955a515f0d6efa498231a7ff8c2d244aa5911f42f4a3f29844629da34c2702654e1eda9ae3ead2b50006b50b2408cf77c
-
Filesize
304KB
MD584bf36993bdd61d216e83fe391fcc7fd
SHA1e023212e847a54328aaea05fbe41eb4828855ce6
SHA2568e6d8b5a004c8f21bee1bbe4213c6d78cf80e439b38f587e963e9bb4569aaffa
SHA512bb3241949618ad2d39057e085e150f43b4d41d74efc4658d9c27f8c0ec80420191517a2c0b6b7e225c4e50e02cd031cdfd178e05b9a869847a3c27b210d09caf
-
Filesize
518KB
MD5c4ffab152141150528716daa608d5b92
SHA1a48d3aecc0e986b6c4369b9d4cfffb08b53aed89
SHA256c28de1802bdbcf51c88cd1a4ac5c1decb0558fa213d83833cf5dbd990b9ae475
SHA512a225e98f2bc27e2add9d34bd850e0e66a27bd1db757c979639a636a6efe412e638025c6e235c36188a24c9af2bde4b17d1dbaa0707dce11411402cd5de8024e9
-
Filesize
1.2MB
MD50b7e08a8268a6d413a322ff62d389bf9
SHA1e04b849cc01779fe256744ad31562aca833a82c1
SHA256d23a10b3ff0c565ea8ee7f54bcded0582e1e621ebad69d4523d6746f6d8e0e65
SHA5123d226673e30bbbc27e0a5a6c64bf81eca475c697486b20141df7975bef97901d4865b88f41937f5e3dd00b437f24f91493f80cb69aa366b7a49cd17b26197ba4
-
Filesize
778KB
MD505b11e7b711b4aaa512029ffcb529b5a
SHA1a8074cf8a13f21617632951e008cdfdace73bb83
SHA2562aab2ca39749b21877d1c52526009f9f5d251d934205e9f671a9e84cecd55afa
SHA512dde7b561ffb3b9fe71827be9313cd3b83900c3ce76b053d028e84223fba1b06035437b3860a74de7dc2f5d40f0b90bd7d60139701d752c803eb08f362a5d57ff
-
Filesize
579KB
MD5a991da123f34074f2ee8ea0d798990f9
SHA13988195503348626e8f9185747a216c8e7839130
SHA256fd42e618223f510d694c5fb2f8ecbc1a88cabf003bcf20da6227da30a1352a0f
SHA5121f958cacb820833ea8b5ac2d9ca7f596625e688f8f6b6e3ab6f27aa3b25b8c9e5b57e1eed532a8d2519da6c1b41492eb8ac930fc25eaf2be2f344c2f32e81a49
-
Filesize
1.8MB
MD546446c63c5d32d2157a4a6977b0e30c2
SHA1cc7df76a3b496b7f37dc7f97dd486e42b0a888af
SHA256141750e9e3f812197ecdbdc58df4e18182d0eaa34aa5c2a7d8fb4a98655a3cb9
SHA51258e2f3ede95800ef5938585c9928f7aedccd895b606ac2c1a7b020511899ede811fa31d5080e39ccce03bf2a33961ffef307a27cd9f0fd25b08d77f0d325a079
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
56KB
MD55be7f6f434724dfcc01e8b2b0e753bbe
SHA1ef1078290de6b5700ff6e804a79beba16c99ba3e
SHA2564064b300ca1a67a3086e1adb18001c0017384b8f84ff4c0e693858889cef2196
SHA5123b470c3ad5be3dd7721548021a818034584bbd88237b1710ce52ac67e04126fff4592c02f5868ebda72f662ec8c5f7fc4d0a458f49fe5eb47e024a5c50935ee2
-
Filesize
228KB
MD5b12d25b13f81e881f7afd9a5799c6413
SHA19ec508839d9b58a98b379978e5b9c6338e945247
SHA256a6aa57d304f15562b5a198a5731d5031bb2c3d2da15c07a1947729570a5c9b3b
SHA5126ba66222405edbb404edd653a59b4dc48827cb3ea527872d10a2aeb2aceb82060464ea4187a61cb86a11b19392ccec34fc433f0c4686e3a36764523b21e9aad5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1181767204-2009306918-3718769404-1000\76b53b3ec448f7ccdda2063b15d2bfc3_d2547453-e731-4fdf-8f92-95f955a44aca
Filesize2KB
MD5e6bd51fa0c8c89af24e415d86f840ba5
SHA17c64302b521824466a3195704513223a27d006b6
SHA2567c9361d56346f9542e44788df882c6cf51e408b95809fd6c3addb74318059e57
SHA512cab1f02f6c7c26876f31c5b0e2695f179752dfd0430cc337582b820d5114f4a200541c9b0b29a1a53cc2dff12849332c78b1509b1c8121cffc11ea6d074ffcfd
-
Filesize
408KB
MD5816df4ac8c796b73a28159a0b17369b6
SHA1db8bbb6f73fab9875de4aaa489c03665d2611558
SHA2567843255bc50ddda8c651f51347313daf07e53a745d39cc61d708c6e7d79b3647
SHA5127dd155346acf611ffaf6399408f6409146fd724d7d382c7e143e3921e3d109563c314a0367a378b0965e427470f36bf6d70e1586d695a266f34aebd789965285
-
Filesize
304KB
MD515a7cae61788e4718d3c33abb7be6436
SHA162dac3a5d50c93c51f2ab4a5ebf78837dc7d3a9f
SHA256bed71147aa297d95d2e2c67352fc06f7f631af3b7871ea148638ae66fc41e200
SHA5125b3e3028523e95452be169bdfb966cd03ea5dbe34b7b98cf7482ca91b8317a0f4de224751d5a530ec23e72cbd6cc8e414d2d3726fefee9c30feab69dc348fa45
-
Filesize
2KB
MD5e47dece3a32a672b8452c28900afd2ff
SHA118842f1b4ebb4577718917c0571876609bf9957b
SHA2565dc83497862b4e9ec12de9f57e59bdf890bf3899cd94a87b87fefa45f6227d27
SHA51272b7e3ca45f11b827b9bd509843100173d5d9775b9a82c3b517db0a98418fba6ca9389b65187b2c22a983bc32492159b4498d41d5c7858069324877e7c1cb8f1
-
Filesize
2KB
MD57275ec0a9703dd4d50333311e3c849f1
SHA14a307bc489f05fe6c195f5216b48478301209065
SHA256682f3a49a5b307faa05e34eea661a3af4a535b4fd89325d7c5daf51316c5c262
SHA512e172c600a29a8f6737654bd7c0fc562cd5c395a55adfc7beace9ab31feaf9d647f41906d09244b139aae1765a031f0bcf6a57c2ff2b847b5437a651231e56132