Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
02-06-2024 20:54
Static task
static1
Behavioral task
behavioral1
Sample
c35b5b25d5f84d8306128cc099dd47338d677dc60650c9b7b414283540d566ef.exe
Resource
win10v2004-20240426-en
General
-
Target
c35b5b25d5f84d8306128cc099dd47338d677dc60650c9b7b414283540d566ef.exe
-
Size
1.8MB
-
MD5
15121746d7746e33b9842d48a3781dfd
-
SHA1
e0d34fb2ac9852acddaf7895f3489f96d6418504
-
SHA256
c35b5b25d5f84d8306128cc099dd47338d677dc60650c9b7b414283540d566ef
-
SHA512
2fd5082ad39d06cc436b232e06875f5f33677967179691707e5877243932475350093f2f60b99815b6e95db8cd1a492f7547e1abfa7930c68632ae01731297eb
-
SSDEEP
49152:slFeXi8SY24/vOT6f9uq1A5xTp/ZFYb3lz39O4/ogqc+v:slFeS8SY24OG9umA5dVo3d3g4Lqc+v
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
amadey
4.21
49e482
http://147.45.47.70
-
install_dir
1b29d73536
-
install_file
axplont.exe
-
strings_key
4d31dd1a190d9879c21fac6d87dc0043
-
url_paths
/tr8nomy/index.php
Extracted
risepro
147.45.47.126:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2c0e5569b6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d5e428bc0b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c35b5b25d5f84d8306128cc099dd47338d677dc60650c9b7b414283540d566ef.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d5e428bc0b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c35b5b25d5f84d8306128cc099dd47338d677dc60650c9b7b414283540d566ef.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c35b5b25d5f84d8306128cc099dd47338d677dc60650c9b7b414283540d566ef.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d5e428bc0b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2c0e5569b6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2c0e5569b6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe -
Executes dropped EXE 18 IoCs
pid Process 4508 explortu.exe 4860 2c0e5569b6.exe 2276 axplont.exe 4120 d5e428bc0b.exe 2640 riff.exe 2340 lgodjadrg.exe 3468 work.exe 1512 lgors.exe 644 riff.exe 4616 tor-real.exe 2464 mfwqj.exe 3980 axplont.exe 2076 explortu.exe 2108 riff.exe 4688 mfwqj.exe 4880 riff.exe 3604 axplont.exe 4536 explortu.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Wine c35b5b25d5f84d8306128cc099dd47338d677dc60650c9b7b414283540d566ef.exe Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Wine d5e428bc0b.exe Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Wine 2c0e5569b6.exe Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Wine explortu.exe -
Loads dropped DLL 10 IoCs
pid Process 4616 tor-real.exe 4616 tor-real.exe 4616 tor-real.exe 4616 tor-real.exe 4616 tor-real.exe 4616 tor-real.exe 4616 tor-real.exe 4616 tor-real.exe 4616 tor-real.exe 4616 tor-real.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 riff.exe Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 riff.exe Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 riff.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Microsoft\Windows\CurrentVersion\Run\d5e428bc0b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000005001\\d5e428bc0b.exe" explortu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 2720 c35b5b25d5f84d8306128cc099dd47338d677dc60650c9b7b414283540d566ef.exe 4508 explortu.exe 4860 2c0e5569b6.exe 2276 axplont.exe 4120 d5e428bc0b.exe 3980 axplont.exe 2076 explortu.exe 3604 axplont.exe 4536 explortu.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\axplont.job 2c0e5569b6.exe File created C:\Windows\Tasks\mfwqj.job lgors.exe File opened for modification C:\Windows\Tasks\mfwqj.job lgors.exe File created C:\Windows\Tasks\explortu.job c35b5b25d5f84d8306128cc099dd47338d677dc60650c9b7b414283540d566ef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 716 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3960 timeout.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2720 c35b5b25d5f84d8306128cc099dd47338d677dc60650c9b7b414283540d566ef.exe 2720 c35b5b25d5f84d8306128cc099dd47338d677dc60650c9b7b414283540d566ef.exe 4508 explortu.exe 4508 explortu.exe 4860 2c0e5569b6.exe 4860 2c0e5569b6.exe 2276 axplont.exe 2276 axplont.exe 4120 d5e428bc0b.exe 4120 d5e428bc0b.exe 644 riff.exe 644 riff.exe 1512 lgors.exe 1512 lgors.exe 644 riff.exe 644 riff.exe 3980 axplont.exe 3980 axplont.exe 2076 explortu.exe 2076 explortu.exe 2108 riff.exe 3604 axplont.exe 3604 axplont.exe 4536 explortu.exe 4536 explortu.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2640 riff.exe Token: SeDebugPrivilege 644 riff.exe Token: SeDebugPrivilege 2108 riff.exe Token: SeDebugPrivilege 4880 riff.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 644 riff.exe 2108 riff.exe -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 2720 wrote to memory of 4508 2720 c35b5b25d5f84d8306128cc099dd47338d677dc60650c9b7b414283540d566ef.exe 77 PID 2720 wrote to memory of 4508 2720 c35b5b25d5f84d8306128cc099dd47338d677dc60650c9b7b414283540d566ef.exe 77 PID 2720 wrote to memory of 4508 2720 c35b5b25d5f84d8306128cc099dd47338d677dc60650c9b7b414283540d566ef.exe 77 PID 4508 wrote to memory of 1132 4508 explortu.exe 78 PID 4508 wrote to memory of 1132 4508 explortu.exe 78 PID 4508 wrote to memory of 1132 4508 explortu.exe 78 PID 4508 wrote to memory of 4860 4508 explortu.exe 79 PID 4508 wrote to memory of 4860 4508 explortu.exe 79 PID 4508 wrote to memory of 4860 4508 explortu.exe 79 PID 4860 wrote to memory of 2276 4860 2c0e5569b6.exe 80 PID 4860 wrote to memory of 2276 4860 2c0e5569b6.exe 80 PID 4860 wrote to memory of 2276 4860 2c0e5569b6.exe 80 PID 4508 wrote to memory of 4120 4508 explortu.exe 81 PID 4508 wrote to memory of 4120 4508 explortu.exe 81 PID 4508 wrote to memory of 4120 4508 explortu.exe 81 PID 2276 wrote to memory of 2640 2276 axplont.exe 82 PID 2276 wrote to memory of 2640 2276 axplont.exe 82 PID 2640 wrote to memory of 4932 2640 riff.exe 84 PID 2640 wrote to memory of 4932 2640 riff.exe 84 PID 4932 wrote to memory of 3716 4932 cmd.exe 86 PID 4932 wrote to memory of 3716 4932 cmd.exe 86 PID 4932 wrote to memory of 3960 4932 cmd.exe 87 PID 4932 wrote to memory of 3960 4932 cmd.exe 87 PID 2276 wrote to memory of 2340 2276 axplont.exe 88 PID 2276 wrote to memory of 2340 2276 axplont.exe 88 PID 2276 wrote to memory of 2340 2276 axplont.exe 88 PID 2340 wrote to memory of 2252 2340 lgodjadrg.exe 89 PID 2340 wrote to memory of 2252 2340 lgodjadrg.exe 89 PID 2340 wrote to memory of 2252 2340 lgodjadrg.exe 89 PID 2252 wrote to memory of 3468 2252 cmd.exe 93 PID 2252 wrote to memory of 3468 2252 cmd.exe 93 PID 2252 wrote to memory of 3468 2252 cmd.exe 93 PID 3468 wrote to memory of 1512 3468 work.exe 94 PID 3468 wrote to memory of 1512 3468 work.exe 94 PID 3468 wrote to memory of 1512 3468 work.exe 94 PID 4932 wrote to memory of 716 4932 cmd.exe 95 PID 4932 wrote to memory of 716 4932 cmd.exe 95 PID 4932 wrote to memory of 644 4932 cmd.exe 96 PID 4932 wrote to memory of 644 4932 cmd.exe 96 PID 644 wrote to memory of 4616 644 riff.exe 97 PID 644 wrote to memory of 4616 644 riff.exe 97 PID 644 wrote to memory of 4616 644 riff.exe 97 PID 644 wrote to memory of 4000 644 riff.exe 99 PID 644 wrote to memory of 4000 644 riff.exe 99 PID 4000 wrote to memory of 3108 4000 cmd.exe 101 PID 4000 wrote to memory of 3108 4000 cmd.exe 101 PID 4000 wrote to memory of 4408 4000 cmd.exe 102 PID 4000 wrote to memory of 4408 4000 cmd.exe 102 PID 4000 wrote to memory of 4256 4000 cmd.exe 103 PID 4000 wrote to memory of 4256 4000 cmd.exe 103 PID 644 wrote to memory of 3840 644 riff.exe 104 PID 644 wrote to memory of 3840 644 riff.exe 104 PID 3840 wrote to memory of 4688 3840 cmd.exe 106 PID 3840 wrote to memory of 4688 3840 cmd.exe 106 PID 3840 wrote to memory of 3328 3840 cmd.exe 107 PID 3840 wrote to memory of 3328 3840 cmd.exe 107 PID 3840 wrote to memory of 3352 3840 cmd.exe 108 PID 3840 wrote to memory of 3352 3840 cmd.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 riff.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 riff.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c35b5b25d5f84d8306128cc099dd47338d677dc60650c9b7b414283540d566ef.exe"C:\Users\Admin\AppData\Local\Temp\c35b5b25d5f84d8306128cc099dd47338d677dc60650c9b7b414283540d566ef.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵PID:1132
-
-
C:\Users\Admin\1000004002\2c0e5569b6.exe"C:\Users\Admin\1000004002\2c0e5569b6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\1000053001\riff.exe"C:\Users\Admin\AppData\Local\Temp\1000053001\riff.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && timeout /t 3 > NUL && schtasks /create /tn "riff" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\RobloxSecurity\riff.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\1000053001\riff.exe" &&START "" "C:\Users\Admin\AppData\Local\RobloxSecurity\riff.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:3716
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:3960
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "riff" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\RobloxSecurity\riff.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
PID:716
-
-
C:\Users\Admin\AppData\Local\RobloxSecurity\riff.exe"C:\Users\Admin\AppData\Local\RobloxSecurity\riff.exe"7⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:644 -
C:\Users\Admin\AppData\Local\zxqaiiy6en\tor\tor-real.exe"C:\Users\Admin\AppData\Local\zxqaiiy6en\tor\tor-real.exe" -f "C:\Users\Admin\AppData\Local\zxqaiiy6en\tor\torrc.txt"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4616
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"8⤵
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\system32\chcp.comchcp 650019⤵PID:3108
-
-
C:\Windows\system32\netsh.exenetsh wlan show profiles9⤵PID:4408
-
-
C:\Windows\system32\findstr.exefindstr /R /C:"[ ]:[ ]"9⤵PID:4256
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"8⤵
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\system32\chcp.comchcp 650019⤵PID:4688
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid9⤵PID:3328
-
-
C:\Windows\system32\findstr.exefindstr "SSID BSSID Signal"9⤵PID:3352
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000054001\lgodjadrg.exe"C:\Users\Admin\AppData\Local\Temp\1000054001\lgodjadrg.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exework.exe -priverdD7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\lgors.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\lgors.exe"8⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\d5e428bc0b.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\d5e428bc0b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4120
-
-
-
C:\ProgramData\enwilrc\mfwqj.exeC:\ProgramData\enwilrc\mfwqj.exe start21⤵
- Executes dropped EXE
PID:2464
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3980
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2076
-
C:\Users\Admin\AppData\Local\RobloxSecurity\riff.exeC:\Users\Admin\AppData\Local\RobloxSecurity\riff.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2108
-
C:\ProgramData\enwilrc\mfwqj.exeC:\ProgramData\enwilrc\mfwqj.exe start21⤵
- Executes dropped EXE
PID:4688
-
C:\Users\Admin\AppData\Local\RobloxSecurity\riff.exeC:\Users\Admin\AppData\Local\RobloxSecurity\riff.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4880
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3604
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4536
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Credential Access
Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5589dd545867e563db22bbc5f7c912c65
SHA1dcc152fe817a434612622e4e435b048a1cbc08de
SHA2562ce0dc290da1b20ede6beb2da4ce7896dce5e60a9afdfea68652544f58496488
SHA512e61ad0a316ae4f508243d7a70e87f597f812b5cf0985e5440a460de0be7be3f728bf8f148acec293394574205d44cc9de8f85ee65fe74ac13eb94e58ed066e7f
-
Filesize
1KB
MD5081b644082c51f2ff0f00087877003b5
SHA12eeb0a8a592e5327873f5a6704031c1ff6d0bd31
SHA256cc427c714517dd0a3c96354869ce1bb300bf4935006fc628ceb28e2f040197ac
SHA51295621587e55a5f5111aea05cadbaf56429adde2de0c41c9de8e74c03d31116edf72b63d76f65af45e4b14b68fe214926425581f77113d332eb91b0b6a5598eff
-
Filesize
2.3MB
MD50f311db18a1c0a5c583aba1420ea3c0e
SHA1ed2f4f9773756fbe1978483d32e20fe82b93c6e6
SHA256c10deb8daff6e148d81d8481e503fa23400534233fd2535604c8703d89ade1e4
SHA512dc680d0829ed5c533b72a6e76dfab8ecc033a09fdad6c72ace096825cd7e17413e30b6ad4b6ec08270cf1b290ec7b76451c4177545ea11f89f2a10cadc59c64c
-
Filesize
119KB
MD5b37058a1a6fa72cf11d4bda54e15790a
SHA1b8663b93cac0b88168d207fd648da5c2f9b775de
SHA25685b1ce3f619ebeb3799acff17ee1356a7f3911e0b95f29b24111ae03fa2a03a0
SHA5124848057ad580943a96e57713ca721ad3052001e8fd428651b08034592596f14e9396d0de970bdbffc552e104189aa81dfe7723bd13003637659198ec38fed818
-
Filesize
613KB
MD5a1ad149a4d2a04338fd9a0d902410daf
SHA1d43db08458ea4a81cd32926a402d8a5d12728a2f
SHA2566e9f1c1298419230dbc24cfe76a8d64c8094e9d1335a0cef567042b3250e565a
SHA512cef534d0233f47048d6b80c49c4b44570fc436b90904ea84f03c24106ecb785802c424e1241ebd70b9a85f09b77f7c0322927c57a9d65959da4a425149e04128
-
Filesize
1.8MB
MD515121746d7746e33b9842d48a3781dfd
SHA1e0d34fb2ac9852acddaf7895f3489f96d6418504
SHA256c35b5b25d5f84d8306128cc099dd47338d677dc60650c9b7b414283540d566ef
SHA5122fd5082ad39d06cc436b232e06875f5f33677967179691707e5877243932475350093f2f60b99815b6e95db8cd1a492f7547e1abfa7930c68632ae01731297eb
-
Filesize
35B
MD5ff59d999beb970447667695ce3273f75
SHA1316fa09f467ba90ac34a054daf2e92e6e2854ff8
SHA256065d2b17ad499587dc9de7ee9ecda4938b45da1df388bc72e6627dff220f64d2
SHA512d5ac72cb065a3cd3cb118a69a2f356314eeed24dcb4880751e1a3683895e66cedc62607967e29f77a0c27adf1c9fe0efd86e804f693f0a63a5b51b0bf0056b5d
-
Filesize
294KB
MD5372b142bdf88cc3175d31b48a650955d
SHA1515f9a1e5c954cd849bacd19291534c50201ac49
SHA256e3873f55cd848b37d6897b3851a21aa6c17b3d74d94ea2adcd076cf3eb3f4121
SHA512cff5c69e361d4975f6b10000d5d53ccd0853503f585842ac3422131cf8313195ab8720b65e291c27fc12875b584129069b8548823774320ded37403cc64d8d11
-
Filesize
16KB
MD54f01c3d7439dde153ff0110a26e2a71c
SHA140d7203ad4e1fd40e13a56e6f747ee480740873c
SHA256cfb1fd0adf528fcf14647cf3fcd85fb7e4fddd2167b36f9e8b2424b62453df28
SHA512513d09b80e1ac80813bc691e71cdf5348478157350e43b9daed27741b7f5a7a16b2ae4d88ee9951395747c7f2a93ff0c1f2c3753a9e3bad2e2607767a1e3d28e
-
Filesize
4B
MD56e4621af9a4da94a7c85d7ecd19b1271
SHA1925339909868812bbc5604cd6e0e53b6c19b7b70
SHA256ae77e4efc3d1e69d6e14f7f826f171412d38895fb3d804aaa46e233bbf70249a
SHA51276f872e3d12f0def622c04e89c35390c4d712481a3259f9071c63ca68f9e05449ee881a779e73c9eb7929aef8975a0578445d519025a34d088ab7876432edff9
-
Filesize
2.5MB
MD595f0512d0c2f7cfc35a0d90e406917de
SHA1af7cd4f66cbcdf24a69ebcaba1a83997c1323a1e
SHA2566b7b7cfff9edbde3c959c23cbde9c22daa9b2e71b7e995684b42cf1e48efcae3
SHA512a688ff00c424ec47166c0b1f14b7a3f4cb99b9c13528051c5dac022140f840452a3f3a3315bc67e842e018a407793b4de61da72376494e17a18c6e2aab0362d8
-
Filesize
6.5MB
MD513b4542dc00d212f030248761185d863
SHA1af6f920696548bb4e8caa7012517ccc9296bcf3b
SHA25652aa165c20b221c46db7c743125c55c8310621c28cc921060f7c80a6f20fcac4
SHA5127571942b15819a7af7907a0f24a0a8182cf65f7c5985d4bd2164c46c0d9c465c293fc7edffcb05d7e6d21f22b12a8a4247106bd861b28259c771ff432af97368
-
Filesize
64B
MD5133488c5d0801db8a4bbe99996aa6fe7
SHA10677e1eabb44dfa801925af867dc6b2286c441cc
SHA2563ccba7ee5d6a96cd033bebce8f2175e12cc6b4b93f93f3d11ace925e579f9f24
SHA512ed8c2bdd3e64ed083ad2278bccf22be5c582b301be751b1ae7c7f292fc6f035f937ad62fb212538b73c92e6c4ae8d88354a0bd03721ea8ecee637211dd8b4ae8
-
Filesize
3.5MB
MD56d48d76a4d1c9b0ff49680349c4d28ae
SHA11bb3666c16e11eff8f9c3213b20629f02d6a66cb
SHA2563f08728c7a67e4998fbdc7a7cb556d8158efdcdaf0acf75b7789dccace55662d
SHA51209a4fd7b37cf52f6a0c3bb0a7517e2d2439f4af8e03130aed3296d7448585ea5e3c0892e1e1202f658ef2d083ce13c436779e202c39620a70a17b026705c65c9
-
Filesize
1.1MB
MD5a3bf8e33948d94d490d4613441685eee
SHA175ed7f6e2855a497f45b15270c3ad4aed6ad02e2
SHA25691c812a33871e40b264761f1418e37ebfeb750fe61ca00cbcbe9f3769a8bf585
SHA512c20ef2efcacb5f8c7e2464de7fde68bf610ab2e0608ff4daed9bf676996375db99bee7e3f26c5bd6cca63f9b2d889ed5460ec25004130887cd1a90b892be2b28
-
Filesize
1.0MB
MD5bd40ff3d0ce8d338a1fe4501cd8e9a09
SHA13aae8c33bf0ec9adf5fbf8a361445969de409b49
SHA256ebda776a2a353f8f0690b1c7706b0cdaff3d23e1618515d45e451fc19440501c
SHA512404fb3c107006b832b8e900f6e27873324cd0a7946cdccf4ffeea365a725892d929e8b160379af9782bcd6cfeb4c3c805740e21280b42bb2ce8f39f26792e5a1
-
Filesize
1.1MB
MD5945d225539becc01fbca32e9ff6464f0
SHA1a614eb470defeab01317a73380f44db669100406
SHA256c697434857a039bf27238c105be0487a0c6c611dd36cb1587c3c6b3bf582718a
SHA512409f8f1e6d683a3cbe7954bce37013316dee086cdbd7ecda88acb5d94031cff6166a93b641875116327151823cce747bcf254c0185e0770e2b74b7c5e067bc4a
-
Filesize
246KB
MD5b77328da7cead5f4623748a70727860d
SHA113b33722c55cca14025b90060e3227db57bf5327
SHA25646541d9e28c18bc11267630920b97c42f104c258b55e2f62e4a02bcd5f03e0e7
SHA5122f1bd13357078454203092ed5ddc23a8baa5e64202fba1e4f98eacf1c3c184616e527468a96ff36d98b9324426dddfa20b62b38cf95c6f5c0dc32513ebace9e2
-
Filesize
512KB
MD519d7cc4377f3c09d97c6da06fbabc7dc
SHA13a3ba8f397fb95ed5df22896b2c53a326662fcc9
SHA256228fcfe9ed0574b8da32dd26eaf2f5dbaef0e1bd2535cb9b1635212ccdcbf84d
SHA51223711285352cdec6815b5dd6e295ec50568fab7614706bc8d5328a4a0b62991c54b16126ed9e522471d2367b6f32fa35feb41bfa77b3402680d9a69f53962a4a
-
Filesize
4.0MB
MD507244a2c002ffdf1986b454429eace0b
SHA1d7cd121caac2f5989aa68a052f638f82d4566328
SHA256e9522e6912a0124c0a8c9ff9bb3712b474971376a4eb4ca614bb1664a2b4abcf
SHA5124a09db85202723a73703c5926921fef60c3dddae21528a01936987306c5e7937463f94a2f4a922811de1f76621def2a8a597a8b38a719dd24e6ff3d4e07492ca
-
Filesize
226B
MD5f9bcf0832050dd11d77da7c003d9139e
SHA169949f661f5e99e3db0dfaf9a20e37a6102eedaf
SHA25630cdfced91444e53128f0971bbce77ec300566a89005ae902670b17d4156fabe
SHA51279885b48c7354e88e565f7108f177f35d0605189df0b6517e761f5cc00d5e66bac2c34996e57a214dbb519e9d49820e6c3ac6588cb4d5fe7a758e559f3bb7b9d
-
Filesize
121KB
MD56f98da9e33cd6f3dd60950413d3638ac
SHA1e630bdf8cebc165aa81464ff20c1d55272d05675
SHA256219d9d5bf0de4c2251439c89dd5f2959ee582e7f9f7d5ff66a29c88753a3a773
SHA5122983faaf7f47a8f79a38122aa617e65e7deddd19ba9a98b62acf17b48e5308099b852f21aaf8ca6fe11e2cc76c36eed7ffa3307877d4e67b1659fe6e4475205c