Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 07:34
Static task
static1
Behavioral task
behavioral1
Sample
8fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
8fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126.exe
Resource
win11-20240426-en
General
-
Target
8fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126.exe
-
Size
1.8MB
-
MD5
e08b5c71e81d980b66f93d6116480147
-
SHA1
b13878de6b3cacb041f805ef0a3e2effd29069cb
-
SHA256
8fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126
-
SHA512
64e52c96b9acda8e0e1a6b74516a0683733f1b2512b46ee692091bc406bdfe1d96141f23ad5148cf386797fc06abdda78d52d7c68b34b0095cf7987070082ab6
-
SSDEEP
49152:KIsaP+Ln6dzezCcNhUhXJ1r65UQ2svx3b+:Kni+L627NhUtJs5Xk
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
amadey
4.21
49e482
http://147.45.47.70
-
install_dir
1b29d73536
-
install_file
axplont.exe
-
strings_key
4d31dd1a190d9879c21fac6d87dc0043
-
url_paths
/tr8nomy/index.php
Extracted
redline
1
185.215.113.67:40960
Extracted
redline
@LOGSCLOUDYT_BOT
185.172.128.33:8970
Extracted
stealc
zzvv
http://23.88.106.134
-
url_path
/c73eed764cc59dcb.php
Extracted
risepro
147.45.47.126:58709
Extracted
lumma
https://roomabolishsnifftwk.shop/api
https://museumtespaceorsp.shop/api
https://buttockdecarderwiso.shop/api
https://detailbaconroollyws.shop/api
https://averageaattractiionsl.shop/api
https://horsedwollfedrwos.shop/api
https://femininiespywageg.shop/api
https://patternapplauderw.shop/api
https://employhabragaomlsp.shop/api
https://understanndtytonyguw.shop/api
https://stalfbaclcalorieeis.shop/api
https://civilianurinedtsraov.shop/api
https://considerrycurrentyws.shop/api
https://messtimetabledkolvk.shop/api
https://deprivedrinkyfaiir.shop/api
https://relaxtionflouwerwi.shop/api
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral1/files/0x0009000000023419-98.dat family_redline behavioral1/memory/4688-112-0x0000000000F30000-0x0000000000F82000-memory.dmp family_redline behavioral1/files/0x000700000002341d-126.dat family_redline behavioral1/memory/1476-135-0x0000000000890000-0x00000000008E2000-memory.dmp family_redline -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file300un.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths file300un.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe = "0" file300un.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9d085b1c66.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d79fa0efe5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5728 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d79fa0efe5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9d085b1c66.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d79fa0efe5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9d085b1c66.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation d79fa0efe5.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation axplont.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation file300un.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Newoff.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 8fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation explortu.exe -
Executes dropped EXE 21 IoCs
pid Process 5100 explortu.exe 1128 d79fa0efe5.exe 4568 axplont.exe 5028 9d085b1c66.exe 3476 33333.exe 4688 fileosn.exe 1476 svhoost.exe 2724 One.exe 1932 lumma1234.exe 3036 gold.exe 1128 explortu.exe 1408 axplont.exe 5004 swizzzz.exe 5356 file300un.exe 4328 Newoff.exe 5968 axplont.exe 5936 explortu.exe 3716 Newoff.exe 5792 axplont.exe 5780 explortu.exe 5852 Newoff.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Wine d79fa0efe5.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Wine 9d085b1c66.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Wine 8fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Wine explortu.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths file300un.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions file300un.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe = "0" file300un.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9d085b1c66.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000005001\\9d085b1c66.exe" explortu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA file300un.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file300un.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 4220 8fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126.exe 5100 explortu.exe 1128 d79fa0efe5.exe 4568 axplont.exe 5028 9d085b1c66.exe 1128 explortu.exe 1408 axplont.exe 5936 explortu.exe 5968 axplont.exe 5792 axplont.exe 5780 explortu.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3476 set thread context of 1448 3476 33333.exe 101 PID 1932 set thread context of 4472 1932 lumma1234.exe 109 PID 3036 set thread context of 3716 3036 gold.exe 111 PID 5004 set thread context of 4868 5004 swizzzz.exe 118 PID 5356 set thread context of 5752 5356 file300un.exe 126 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplont.job d79fa0efe5.exe File created C:\Windows\Tasks\explortu.job 8fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 5172 3476 WerFault.exe 100 5808 3036 WerFault.exe 110 5864 5752 WerFault.exe 126 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4436 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5696 timeout.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 fileosn.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 fileosn.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 4220 8fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126.exe 4220 8fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126.exe 5100 explortu.exe 5100 explortu.exe 1128 d79fa0efe5.exe 1128 d79fa0efe5.exe 4568 axplont.exe 4568 axplont.exe 5028 9d085b1c66.exe 5028 9d085b1c66.exe 1128 explortu.exe 1128 explortu.exe 1408 axplont.exe 1408 axplont.exe 4868 RegAsm.exe 4868 RegAsm.exe 1476 svhoost.exe 1476 svhoost.exe 2724 One.exe 2724 One.exe 5728 powershell.exe 5728 powershell.exe 5728 powershell.exe 1476 svhoost.exe 1476 svhoost.exe 1476 svhoost.exe 1476 svhoost.exe 4688 fileosn.exe 4688 fileosn.exe 4688 fileosn.exe 4688 fileosn.exe 4688 fileosn.exe 4688 fileosn.exe 5936 explortu.exe 5936 explortu.exe 5968 axplont.exe 5968 axplont.exe 5792 axplont.exe 5792 axplont.exe 5780 explortu.exe 5780 explortu.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2724 One.exe Token: SeBackupPrivilege 2724 One.exe Token: SeSecurityPrivilege 2724 One.exe Token: SeSecurityPrivilege 2724 One.exe Token: SeSecurityPrivilege 2724 One.exe Token: SeSecurityPrivilege 2724 One.exe Token: SeDebugPrivilege 5356 file300un.exe Token: SeDebugPrivilege 1476 svhoost.exe Token: SeDebugPrivilege 5728 powershell.exe Token: SeDebugPrivilege 4688 fileosn.exe Token: SeDebugPrivilege 1448 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4220 wrote to memory of 5100 4220 8fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126.exe 85 PID 4220 wrote to memory of 5100 4220 8fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126.exe 85 PID 4220 wrote to memory of 5100 4220 8fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126.exe 85 PID 5100 wrote to memory of 1880 5100 explortu.exe 93 PID 5100 wrote to memory of 1880 5100 explortu.exe 93 PID 5100 wrote to memory of 1880 5100 explortu.exe 93 PID 5100 wrote to memory of 1128 5100 explortu.exe 95 PID 5100 wrote to memory of 1128 5100 explortu.exe 95 PID 5100 wrote to memory of 1128 5100 explortu.exe 95 PID 1128 wrote to memory of 4568 1128 d79fa0efe5.exe 96 PID 1128 wrote to memory of 4568 1128 d79fa0efe5.exe 96 PID 1128 wrote to memory of 4568 1128 d79fa0efe5.exe 96 PID 5100 wrote to memory of 5028 5100 explortu.exe 97 PID 5100 wrote to memory of 5028 5100 explortu.exe 97 PID 5100 wrote to memory of 5028 5100 explortu.exe 97 PID 4568 wrote to memory of 3476 4568 axplont.exe 100 PID 4568 wrote to memory of 3476 4568 axplont.exe 100 PID 4568 wrote to memory of 3476 4568 axplont.exe 100 PID 3476 wrote to memory of 1448 3476 33333.exe 101 PID 3476 wrote to memory of 1448 3476 33333.exe 101 PID 3476 wrote to memory of 1448 3476 33333.exe 101 PID 3476 wrote to memory of 1448 3476 33333.exe 101 PID 3476 wrote to memory of 1448 3476 33333.exe 101 PID 3476 wrote to memory of 1448 3476 33333.exe 101 PID 3476 wrote to memory of 1448 3476 33333.exe 101 PID 3476 wrote to memory of 1448 3476 33333.exe 101 PID 4568 wrote to memory of 4688 4568 axplont.exe 102 PID 4568 wrote to memory of 4688 4568 axplont.exe 102 PID 4568 wrote to memory of 4688 4568 axplont.exe 102 PID 1448 wrote to memory of 2724 1448 RegAsm.exe 103 PID 1448 wrote to memory of 2724 1448 RegAsm.exe 103 PID 1448 wrote to memory of 1476 1448 RegAsm.exe 104 PID 1448 wrote to memory of 1476 1448 RegAsm.exe 104 PID 1448 wrote to memory of 1476 1448 RegAsm.exe 104 PID 4568 wrote to memory of 1932 4568 axplont.exe 106 PID 4568 wrote to memory of 1932 4568 axplont.exe 106 PID 4568 wrote to memory of 1932 4568 axplont.exe 106 PID 1932 wrote to memory of 4472 1932 lumma1234.exe 109 PID 1932 wrote to memory of 4472 1932 lumma1234.exe 109 PID 1932 wrote to memory of 4472 1932 lumma1234.exe 109 PID 1932 wrote to memory of 4472 1932 lumma1234.exe 109 PID 1932 wrote to memory of 4472 1932 lumma1234.exe 109 PID 1932 wrote to memory of 4472 1932 lumma1234.exe 109 PID 1932 wrote to memory of 4472 1932 lumma1234.exe 109 PID 1932 wrote to memory of 4472 1932 lumma1234.exe 109 PID 1932 wrote to memory of 4472 1932 lumma1234.exe 109 PID 4568 wrote to memory of 3036 4568 axplont.exe 110 PID 4568 wrote to memory of 3036 4568 axplont.exe 110 PID 4568 wrote to memory of 3036 4568 axplont.exe 110 PID 3036 wrote to memory of 3716 3036 gold.exe 111 PID 3036 wrote to memory of 3716 3036 gold.exe 111 PID 3036 wrote to memory of 3716 3036 gold.exe 111 PID 3036 wrote to memory of 3716 3036 gold.exe 111 PID 3036 wrote to memory of 3716 3036 gold.exe 111 PID 3036 wrote to memory of 3716 3036 gold.exe 111 PID 3036 wrote to memory of 3716 3036 gold.exe 111 PID 3036 wrote to memory of 3716 3036 gold.exe 111 PID 3036 wrote to memory of 3716 3036 gold.exe 111 PID 4568 wrote to memory of 5004 4568 axplont.exe 115 PID 4568 wrote to memory of 5004 4568 axplont.exe 115 PID 4568 wrote to memory of 5004 4568 axplont.exe 115 PID 5004 wrote to memory of 2044 5004 swizzzz.exe 117 PID 5004 wrote to memory of 2044 5004 swizzzz.exe 117 PID 5004 wrote to memory of 2044 5004 swizzzz.exe 117 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file300un.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126.exe"C:\Users\Admin\AppData\Local\Temp\8fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵PID:1880
-
-
C:\Users\Admin\1000004002\d79fa0efe5.exe"C:\Users\Admin\1000004002\d79fa0efe5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Roaming\configurationValue\One.exe"C:\Users\Admin\AppData\Roaming\configurationValue\One.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe"C:\Users\Admin\AppData\Roaming\configurationValue\svhoost.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"7⤵PID:5528
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 38⤵PID:5660
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 2606⤵
- Program crash
PID:5172
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe"5⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe"C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:4472
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe"C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:3716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 2846⤵
- Program crash
PID:5808
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe"C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:2044
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4868 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" & del "C:\ProgramData\*.dll"" & exit7⤵PID:5564
-
C:\Windows\SysWOW64\timeout.exetimeout /t 58⤵
- Delays execution with timeout.exe
PID:5696
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe"C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe"5⤵
- UAC bypass
- Windows security bypass
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:5356 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000020001\file300un.exe" -Force6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5728
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"6⤵PID:5752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5752 -s 1527⤵
- Program crash
PID:5864
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"6⤵PID:5768
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000031001\Newoff.exe"C:\Users\Admin\AppData\Local\Temp\1000031001\Newoff.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:4328 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Newoff.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000031001\Newoff.exe" /F6⤵
- Creates scheduled task(s)
PID:4436
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\9d085b1c66.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\9d085b1c66.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5028
-
-
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1128
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3476 -ip 34761⤵PID:3456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3036 -ip 30361⤵PID:5736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5752 -ip 57521⤵PID:5780
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5968
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5936
-
C:\Users\Admin\AppData\Local\Temp\1000031001\Newoff.exeC:\Users\Admin\AppData\Local\Temp\1000031001\Newoff.exe1⤵
- Executes dropped EXE
PID:3716
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5792
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5780
-
C:\Users\Admin\AppData\Local\Temp\1000031001\Newoff.exeC:\Users\Admin\AppData\Local\Temp\1000031001\Newoff.exe1⤵
- Executes dropped EXE
PID:5852
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
6Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5073fd45ecd71c3248ec538cd734b9a96
SHA1d0dce79ac861bfd1f2ce917882105ddbee3225a0
SHA256eae692dd1d86976bc6a0258c237af074f116aed24f81ff9c6fffff9c268447f7
SHA5124e0c5f0b2bc9704b40bf2b53a79b9071f0e9375e01d8206c01b8fbeebda8b4eebe0941e643150ad1ccc28933867340d0f17e42f61b984b2cb07fc1f55b83b070
-
Filesize
2.1MB
MD5208bd37e8ead92ed1b933239fb3c7079
SHA1941191eed14fce000cfedbae9acfcb8761eb3492
SHA256e1fd277ffc74d67554adce94366e6fa5ebc81f8c4999634bcc3396164ba38494
SHA512a9c3c32573a16b7ca71a12af6e8c8e88502b66bae2465a82dd921fbc6e0c833b9b1c2d436963df189dd9d68568e1be9128826a2e59f1d5fe066b637d2d866715
-
Filesize
2.3MB
MD56a07f69077745bf14148298fc7cc2355
SHA1d51ca013607bf547dbf8eed75e735029178275bd
SHA256e059d2495598f7548c226187891b743798beb46f55cef5f56bcb61b3673864c2
SHA5122976a3dc386d8003c7c3b0f5a2ee73752ca52f7d69c122e5da9a9855217e68e4c05f7d83999088c18cace8775722534a54bd295f0a7c9cc7f364ca864b621baa
-
Filesize
304KB
MD584bf36993bdd61d216e83fe391fcc7fd
SHA1e023212e847a54328aaea05fbe41eb4828855ce6
SHA2568e6d8b5a004c8f21bee1bbe4213c6d78cf80e439b38f587e963e9bb4569aaffa
SHA512bb3241949618ad2d39057e085e150f43b4d41d74efc4658d9c27f8c0ec80420191517a2c0b6b7e225c4e50e02cd031cdfd178e05b9a869847a3c27b210d09caf
-
Filesize
518KB
MD5c4ffab152141150528716daa608d5b92
SHA1a48d3aecc0e986b6c4369b9d4cfffb08b53aed89
SHA256c28de1802bdbcf51c88cd1a4ac5c1decb0558fa213d83833cf5dbd990b9ae475
SHA512a225e98f2bc27e2add9d34bd850e0e66a27bd1db757c979639a636a6efe412e638025c6e235c36188a24c9af2bde4b17d1dbaa0707dce11411402cd5de8024e9
-
Filesize
1.2MB
MD50b7e08a8268a6d413a322ff62d389bf9
SHA1e04b849cc01779fe256744ad31562aca833a82c1
SHA256d23a10b3ff0c565ea8ee7f54bcded0582e1e621ebad69d4523d6746f6d8e0e65
SHA5123d226673e30bbbc27e0a5a6c64bf81eca475c697486b20141df7975bef97901d4865b88f41937f5e3dd00b437f24f91493f80cb69aa366b7a49cd17b26197ba4
-
Filesize
778KB
MD505b11e7b711b4aaa512029ffcb529b5a
SHA1a8074cf8a13f21617632951e008cdfdace73bb83
SHA2562aab2ca39749b21877d1c52526009f9f5d251d934205e9f671a9e84cecd55afa
SHA512dde7b561ffb3b9fe71827be9313cd3b83900c3ce76b053d028e84223fba1b06035437b3860a74de7dc2f5d40f0b90bd7d60139701d752c803eb08f362a5d57ff
-
Filesize
579KB
MD5a991da123f34074f2ee8ea0d798990f9
SHA13988195503348626e8f9185747a216c8e7839130
SHA256fd42e618223f510d694c5fb2f8ecbc1a88cabf003bcf20da6227da30a1352a0f
SHA5121f958cacb820833ea8b5ac2d9ca7f596625e688f8f6b6e3ab6f27aa3b25b8c9e5b57e1eed532a8d2519da6c1b41492eb8ac930fc25eaf2be2f344c2f32e81a49
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
1.8MB
MD5e08b5c71e81d980b66f93d6116480147
SHA1b13878de6b3cacb041f805ef0a3e2effd29069cb
SHA2568fd458fee205ff7438f0ee726397e6aa362eb61a0ecbf55329bdbfd25a86a126
SHA51264e52c96b9acda8e0e1a6b74516a0683733f1b2512b46ee692091bc406bdfe1d96141f23ad5148cf386797fc06abdda78d52d7c68b34b0095cf7987070082ab6
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4124900551-4068476067-3491212533-1000\76b53b3ec448f7ccdda2063b15d2bfc3_310807ab-751f-4d81-ae09-b202eaf21e19
Filesize2KB
MD5a16a349bc35874e8eb582eed5bc26692
SHA167791774ec70fd7241d6d030bac69a2b82a46632
SHA256e8cdc44f10c77e268855192e4e0f102c1f24ef87f354516ed962305551e90cf8
SHA5129f35640242da9297513061364cdc6f0ce4ddf2a2106b16e3b1d36ae060c0a02f5e9feb1088768af064081da126e88541a35b98a1870645ff20c73a6cb23de562
-
Filesize
408KB
MD5816df4ac8c796b73a28159a0b17369b6
SHA1db8bbb6f73fab9875de4aaa489c03665d2611558
SHA2567843255bc50ddda8c651f51347313daf07e53a745d39cc61d708c6e7d79b3647
SHA5127dd155346acf611ffaf6399408f6409146fd724d7d382c7e143e3921e3d109563c314a0367a378b0965e427470f36bf6d70e1586d695a266f34aebd789965285
-
Filesize
304KB
MD515a7cae61788e4718d3c33abb7be6436
SHA162dac3a5d50c93c51f2ab4a5ebf78837dc7d3a9f
SHA256bed71147aa297d95d2e2c67352fc06f7f631af3b7871ea148638ae66fc41e200
SHA5125b3e3028523e95452be169bdfb966cd03ea5dbe34b7b98cf7482ca91b8317a0f4de224751d5a530ec23e72cbd6cc8e414d2d3726fefee9c30feab69dc348fa45
-
Filesize
2KB
MD5425d1698cf2c3d8df8b419ca63ad4773
SHA1337d26694ab542d4a075d71b4b14bb23d3cd42d9
SHA256396a476efe715fc3621669f347d7ec6f2a7b2b820dd74bad3bd8a6e973a0911d
SHA5120542a627290dfba6da25482570d87ab4d2b45f5be9a724f7e1e3ddfd87745e6c2543d4a2e48a9de63e7738d84296ab5dc2cb52108a688243ff9306eb2da36339