Analysis
-
max time kernel
145s -
max time network
158s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
02-06-2024 15:53
Static task
static1
Behavioral task
behavioral1
Sample
92647857b90a85cccd32392699cd0c3246acfc49c19abe65c7b5f44ddd5e9fe6.exe
Resource
win10v2004-20240426-en
General
-
Target
92647857b90a85cccd32392699cd0c3246acfc49c19abe65c7b5f44ddd5e9fe6.exe
-
Size
1.8MB
-
MD5
5ed4045ee1ca643d36022cd3ac520dc5
-
SHA1
a313a4c69e6ecbaebd2e2545f6181855acfb0843
-
SHA256
92647857b90a85cccd32392699cd0c3246acfc49c19abe65c7b5f44ddd5e9fe6
-
SHA512
72217bc080ed9dc29a0964b9ba7fcfc62dbfc14bc1fb2d08f8937b10ef621043bef662857b807abed51adb1cda85dd7a8e6b89d5655383ace63dfb9ae7eb3fc9
-
SSDEEP
49152:zPJArkrfVDbs47xZjdA0F57cZWWCc5Mpxa3:bJAyvHGy5YCfa
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
amadey
4.21
49e482
http://147.45.47.70
-
install_dir
1b29d73536
-
install_file
axplont.exe
-
strings_key
4d31dd1a190d9879c21fac6d87dc0043
-
url_paths
/tr8nomy/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 92647857b90a85cccd32392699cd0c3246acfc49c19abe65c7b5f44ddd5e9fe6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b3c8f64990.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 92647857b90a85cccd32392699cd0c3246acfc49c19abe65c7b5f44ddd5e9fe6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b3c8f64990.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b3c8f64990.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 92647857b90a85cccd32392699cd0c3246acfc49c19abe65c7b5f44ddd5e9fe6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe -
Executes dropped EXE 15 IoCs
pid Process 4052 explortu.exe 1964 b3c8f64990.exe 4600 axplont.exe 2028 riff.exe 3524 riff.exe 3084 tor-real.exe 5104 axplont.exe 1800 explortu.exe 4160 riff.exe 5092 axplont.exe 428 riff.exe 3132 explortu.exe 648 axplont.exe 4252 riff.exe 4680 explortu.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine b3c8f64990.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine 92647857b90a85cccd32392699cd0c3246acfc49c19abe65c7b5f44ddd5e9fe6.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine axplont.exe -
Loads dropped DLL 9 IoCs
pid Process 3084 tor-real.exe 3084 tor-real.exe 3084 tor-real.exe 3084 tor-real.exe 3084 tor-real.exe 3084 tor-real.exe 3084 tor-real.exe 3084 tor-real.exe 3084 tor-real.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 riff.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 riff.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 riff.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 4636 92647857b90a85cccd32392699cd0c3246acfc49c19abe65c7b5f44ddd5e9fe6.exe 4052 explortu.exe 1964 b3c8f64990.exe 4600 axplont.exe 5104 axplont.exe 1800 explortu.exe 5092 axplont.exe 3132 explortu.exe 648 axplont.exe 4680 explortu.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\explortu.job 92647857b90a85cccd32392699cd0c3246acfc49c19abe65c7b5f44ddd5e9fe6.exe File created C:\Windows\Tasks\axplont.job b3c8f64990.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3812 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1920 timeout.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4636 92647857b90a85cccd32392699cd0c3246acfc49c19abe65c7b5f44ddd5e9fe6.exe 4636 92647857b90a85cccd32392699cd0c3246acfc49c19abe65c7b5f44ddd5e9fe6.exe 4052 explortu.exe 4052 explortu.exe 1964 b3c8f64990.exe 1964 b3c8f64990.exe 4600 axplont.exe 4600 axplont.exe 5104 axplont.exe 5104 axplont.exe 3524 riff.exe 3524 riff.exe 1800 explortu.exe 1800 explortu.exe 3524 riff.exe 3524 riff.exe 5092 axplont.exe 5092 axplont.exe 3132 explortu.exe 3132 explortu.exe 648 axplont.exe 648 axplont.exe 4680 explortu.exe 4680 explortu.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2028 riff.exe Token: SeDebugPrivilege 3524 riff.exe Token: SeDebugPrivilege 4160 riff.exe Token: SeDebugPrivilege 428 riff.exe Token: SeDebugPrivilege 4252 riff.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3524 riff.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 4636 wrote to memory of 4052 4636 92647857b90a85cccd32392699cd0c3246acfc49c19abe65c7b5f44ddd5e9fe6.exe 80 PID 4636 wrote to memory of 4052 4636 92647857b90a85cccd32392699cd0c3246acfc49c19abe65c7b5f44ddd5e9fe6.exe 80 PID 4636 wrote to memory of 4052 4636 92647857b90a85cccd32392699cd0c3246acfc49c19abe65c7b5f44ddd5e9fe6.exe 80 PID 4052 wrote to memory of 2224 4052 explortu.exe 81 PID 4052 wrote to memory of 2224 4052 explortu.exe 81 PID 4052 wrote to memory of 2224 4052 explortu.exe 81 PID 4052 wrote to memory of 1964 4052 explortu.exe 82 PID 4052 wrote to memory of 1964 4052 explortu.exe 82 PID 4052 wrote to memory of 1964 4052 explortu.exe 82 PID 1964 wrote to memory of 4600 1964 b3c8f64990.exe 83 PID 1964 wrote to memory of 4600 1964 b3c8f64990.exe 83 PID 1964 wrote to memory of 4600 1964 b3c8f64990.exe 83 PID 4600 wrote to memory of 2028 4600 axplont.exe 84 PID 4600 wrote to memory of 2028 4600 axplont.exe 84 PID 2028 wrote to memory of 1904 2028 riff.exe 86 PID 2028 wrote to memory of 1904 2028 riff.exe 86 PID 1904 wrote to memory of 2284 1904 cmd.exe 88 PID 1904 wrote to memory of 2284 1904 cmd.exe 88 PID 1904 wrote to memory of 1920 1904 cmd.exe 89 PID 1904 wrote to memory of 1920 1904 cmd.exe 89 PID 1904 wrote to memory of 3812 1904 cmd.exe 90 PID 1904 wrote to memory of 3812 1904 cmd.exe 90 PID 1904 wrote to memory of 3524 1904 cmd.exe 91 PID 1904 wrote to memory of 3524 1904 cmd.exe 91 PID 3524 wrote to memory of 3084 3524 riff.exe 92 PID 3524 wrote to memory of 3084 3524 riff.exe 92 PID 3524 wrote to memory of 3084 3524 riff.exe 92 PID 3524 wrote to memory of 4416 3524 riff.exe 97 PID 3524 wrote to memory of 4416 3524 riff.exe 97 PID 4416 wrote to memory of 3420 4416 cmd.exe 99 PID 4416 wrote to memory of 3420 4416 cmd.exe 99 PID 4416 wrote to memory of 4352 4416 cmd.exe 100 PID 4416 wrote to memory of 4352 4416 cmd.exe 100 PID 4416 wrote to memory of 4688 4416 cmd.exe 101 PID 4416 wrote to memory of 4688 4416 cmd.exe 101 PID 3524 wrote to memory of 916 3524 riff.exe 102 PID 3524 wrote to memory of 916 3524 riff.exe 102 PID 916 wrote to memory of 3136 916 cmd.exe 104 PID 916 wrote to memory of 3136 916 cmd.exe 104 PID 916 wrote to memory of 1792 916 cmd.exe 105 PID 916 wrote to memory of 1792 916 cmd.exe 105 PID 916 wrote to memory of 2012 916 cmd.exe 106 PID 916 wrote to memory of 2012 916 cmd.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 riff.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 riff.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\92647857b90a85cccd32392699cd0c3246acfc49c19abe65c7b5f44ddd5e9fe6.exe"C:\Users\Admin\AppData\Local\Temp\92647857b90a85cccd32392699cd0c3246acfc49c19abe65c7b5f44ddd5e9fe6.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵PID:2224
-
-
C:\Users\Admin\1000004002\b3c8f64990.exe"C:\Users\Admin\1000004002\b3c8f64990.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\1000053001\riff.exe"C:\Users\Admin\AppData\Local\Temp\1000053001\riff.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && timeout /t 3 > NUL && schtasks /create /tn "riff" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\RobloxSecurity\riff.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\1000053001\riff.exe" &&START "" "C:\Users\Admin\AppData\Local\RobloxSecurity\riff.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:2284
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:1920
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "riff" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\RobloxSecurity\riff.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
PID:3812
-
-
C:\Users\Admin\AppData\Local\RobloxSecurity\riff.exe"C:\Users\Admin\AppData\Local\RobloxSecurity\riff.exe"7⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:3524 -
C:\Users\Admin\AppData\Local\zxqaiiy6en\tor\tor-real.exe"C:\Users\Admin\AppData\Local\zxqaiiy6en\tor\tor-real.exe" -f "C:\Users\Admin\AppData\Local\zxqaiiy6en\tor\torrc.txt"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3084
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"8⤵
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\system32\chcp.comchcp 650019⤵PID:3420
-
-
C:\Windows\system32\netsh.exenetsh wlan show profiles9⤵PID:4352
-
-
C:\Windows\system32\findstr.exefindstr /R /C:"[ ]:[ ]"9⤵PID:4688
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"8⤵
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\system32\chcp.comchcp 650019⤵PID:3136
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid9⤵PID:1792
-
-
C:\Windows\system32\findstr.exefindstr "SSID BSSID Signal"9⤵PID:2012
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1800
-
C:\Users\Admin\AppData\Local\RobloxSecurity\riff.exeC:\Users\Admin\AppData\Local\RobloxSecurity\riff.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
C:\Users\Admin\AppData\Local\RobloxSecurity\riff.exeC:\Users\Admin\AppData\Local\RobloxSecurity\riff.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:428
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3132
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:648
-
C:\Users\Admin\AppData\Local\RobloxSecurity\riff.exeC:\Users\Admin\AppData\Local\RobloxSecurity\riff.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5122fad17c6aff4733e392eca0386a7b4
SHA10be0d823262772d257a99b453d71f87fc3f255c8
SHA256a4e6e73fee309c3d0479dda205af2805244cdbcd05593b8fc1b79d824aa2d60b
SHA512dd3a8b8a699c977d6683d5a17e51826a738b64ae170ecc455ec02821eff490619b3709a10347ccf83764dad48ad392e6e43d85db772b585dad07aad24aa86153
-
Filesize
1KB
MD5081b644082c51f2ff0f00087877003b5
SHA12eeb0a8a592e5327873f5a6704031c1ff6d0bd31
SHA256cc427c714517dd0a3c96354869ce1bb300bf4935006fc628ceb28e2f040197ac
SHA51295621587e55a5f5111aea05cadbaf56429adde2de0c41c9de8e74c03d31116edf72b63d76f65af45e4b14b68fe214926425581f77113d332eb91b0b6a5598eff
-
Filesize
119KB
MD5b37058a1a6fa72cf11d4bda54e15790a
SHA1b8663b93cac0b88168d207fd648da5c2f9b775de
SHA25685b1ce3f619ebeb3799acff17ee1356a7f3911e0b95f29b24111ae03fa2a03a0
SHA5124848057ad580943a96e57713ca721ad3052001e8fd428651b08034592596f14e9396d0de970bdbffc552e104189aa81dfe7723bd13003637659198ec38fed818
-
Filesize
1.8MB
MD55ed4045ee1ca643d36022cd3ac520dc5
SHA1a313a4c69e6ecbaebd2e2545f6181855acfb0843
SHA25692647857b90a85cccd32392699cd0c3246acfc49c19abe65c7b5f44ddd5e9fe6
SHA51272217bc080ed9dc29a0964b9ba7fcfc62dbfc14bc1fb2d08f8937b10ef621043bef662857b807abed51adb1cda85dd7a8e6b89d5655383ace63dfb9ae7eb3fc9
-
Filesize
4B
MD528bda53c86d37e275a3ebfdc113b1f59
SHA14cc2d3140df4087004975296e7560c6e4089585c
SHA256f1c903c71329dc7ade2902a003269c3409117b4642e13ddc41d509c97b4db603
SHA512013ca55650aa53916fc98cafd993b3af7da559daa1a4d16cf09a65d56276b469d50987844bddc1aec663d595b03476efce735294a56f3dfcf01cbee1e60400f6
-
Filesize
2.5MB
MD59a127ffb339b9b4a3ea6a6c0400a2f59
SHA17e6b769f84ef1fffbff6fb700d7018831c1ab21e
SHA256da23077c5bb32647554f1a2c1ea04ffc79f3443c6b4e4a4a832e51dd0a2a9e9d
SHA512e44bf4404562ec24b0c63304c20f09666ffdf271c006779ae52a5552e88c1a2a919d00f4d0a6f0416cd1ce6343c581ac472cb095629e7180006f99d02602acb1
-
Filesize
11.7MB
MD50dd36b4a15c00c38f0d7192f4e520d7c
SHA15ad9181e8a221ff32b59efb35f9914ac0eae2d49
SHA256a8c198b1207d9b97d084de43d3f9d8347350b420f29f5d07299d5b3aab6ff137
SHA51291961bf326bb71283dfa3af5842889c7faeb84d6dfebd439f113b98b344ccd4b3f2d830c802799e452fe7c9298030b990a2fc5525a08d6cfafd5157a210b3a54
-
Filesize
64B
MD53d85a36bcd5f74a2dd2ae940fd759ace
SHA1a32fad1542f441897b83e27edb796a1ababd7d92
SHA256015c58d92160ce64275967382b0c3c1014e790ef269a8c8e26856a4434278d17
SHA5129b6e2298d337433a9e98680dfb13e73ac2b91d842d0db0b483a2c513043f7579b5844fba3e1ceabdfbe3c4b95f562a8c08415e1d8b173f53aa1a3ada928d2eb3
-
Filesize
3.5MB
MD56d48d76a4d1c9b0ff49680349c4d28ae
SHA11bb3666c16e11eff8f9c3213b20629f02d6a66cb
SHA2563f08728c7a67e4998fbdc7a7cb556d8158efdcdaf0acf75b7789dccace55662d
SHA51209a4fd7b37cf52f6a0c3bb0a7517e2d2439f4af8e03130aed3296d7448585ea5e3c0892e1e1202f658ef2d083ce13c436779e202c39620a70a17b026705c65c9
-
Filesize
1.1MB
MD5a3bf8e33948d94d490d4613441685eee
SHA175ed7f6e2855a497f45b15270c3ad4aed6ad02e2
SHA25691c812a33871e40b264761f1418e37ebfeb750fe61ca00cbcbe9f3769a8bf585
SHA512c20ef2efcacb5f8c7e2464de7fde68bf610ab2e0608ff4daed9bf676996375db99bee7e3f26c5bd6cca63f9b2d889ed5460ec25004130887cd1a90b892be2b28
-
Filesize
1.0MB
MD5bd40ff3d0ce8d338a1fe4501cd8e9a09
SHA13aae8c33bf0ec9adf5fbf8a361445969de409b49
SHA256ebda776a2a353f8f0690b1c7706b0cdaff3d23e1618515d45e451fc19440501c
SHA512404fb3c107006b832b8e900f6e27873324cd0a7946cdccf4ffeea365a725892d929e8b160379af9782bcd6cfeb4c3c805740e21280b42bb2ce8f39f26792e5a1
-
Filesize
1.1MB
MD5945d225539becc01fbca32e9ff6464f0
SHA1a614eb470defeab01317a73380f44db669100406
SHA256c697434857a039bf27238c105be0487a0c6c611dd36cb1587c3c6b3bf582718a
SHA512409f8f1e6d683a3cbe7954bce37013316dee086cdbd7ecda88acb5d94031cff6166a93b641875116327151823cce747bcf254c0185e0770e2b74b7c5e067bc4a
-
Filesize
246KB
MD5b77328da7cead5f4623748a70727860d
SHA113b33722c55cca14025b90060e3227db57bf5327
SHA25646541d9e28c18bc11267630920b97c42f104c258b55e2f62e4a02bcd5f03e0e7
SHA5122f1bd13357078454203092ed5ddc23a8baa5e64202fba1e4f98eacf1c3c184616e527468a96ff36d98b9324426dddfa20b62b38cf95c6f5c0dc32513ebace9e2
-
Filesize
512KB
MD519d7cc4377f3c09d97c6da06fbabc7dc
SHA13a3ba8f397fb95ed5df22896b2c53a326662fcc9
SHA256228fcfe9ed0574b8da32dd26eaf2f5dbaef0e1bd2535cb9b1635212ccdcbf84d
SHA51223711285352cdec6815b5dd6e295ec50568fab7614706bc8d5328a4a0b62991c54b16126ed9e522471d2367b6f32fa35feb41bfa77b3402680d9a69f53962a4a
-
Filesize
4.0MB
MD507244a2c002ffdf1986b454429eace0b
SHA1d7cd121caac2f5989aa68a052f638f82d4566328
SHA256e9522e6912a0124c0a8c9ff9bb3712b474971376a4eb4ca614bb1664a2b4abcf
SHA5124a09db85202723a73703c5926921fef60c3dddae21528a01936987306c5e7937463f94a2f4a922811de1f76621def2a8a597a8b38a719dd24e6ff3d4e07492ca
-
Filesize
226B
MD5f6f7bdf304f3388112649dc1a2ac3202
SHA1c8a5d30aafd249dba37ff7e2d5ded49b49e58b42
SHA256a2820688710990e44a7214178fac7e7d021acd8969ea9880d661cf6d70e05e59
SHA512f72836bf44841024b235f913bed9dcd2117f3d2eca5d004ba2da222a65d1810723428556b5d263fc614412822ef78d15952b20200af667b01a88fa43ed7eaf0f
-
Filesize
121KB
MD56f98da9e33cd6f3dd60950413d3638ac
SHA1e630bdf8cebc165aa81464ff20c1d55272d05675
SHA256219d9d5bf0de4c2251439c89dd5f2959ee582e7f9f7d5ff66a29c88753a3a773
SHA5122983faaf7f47a8f79a38122aa617e65e7deddd19ba9a98b62acf17b48e5308099b852f21aaf8ca6fe11e2cc76c36eed7ffa3307877d4e67b1659fe6e4475205c