Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 00:49
Static task
static1
Behavioral task
behavioral1
Sample
2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exe
Resource
win10v2004-20240508-en
General
-
Target
2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exe
-
Size
1.8MB
-
MD5
fcfdedde2ecdd0399f36409e57f1e0e9
-
SHA1
40178bf761e6bbb3ca612a72f0ec9da52c7cc396
-
SHA256
2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80
-
SHA512
22d17e254fe7cee5be31117ea53414136053f18cca6f07b47943a7ed17f068696cb23e86bb48a40ac4d4cd1de9445858240624ed76350f6ff7b72af8030a92a5
-
SSDEEP
24576:QwuLVBVFjxHEjTylTbccv5Z+TA+3rIaI0qI5E0hEKiqaYex9Br8hw+EJ9Iew4fY7:QLpnDEvyluA+URXEWhwEJ9Iebhu
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
amadey
4.21
49e482
http://147.45.47.70
-
install_dir
1b29d73536
-
install_file
axplont.exe
-
strings_key
4d31dd1a190d9879c21fac6d87dc0043
-
url_paths
/tr8nomy/index.php
Extracted
risepro
147.45.47.126:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exeaxplont.exeaxplont.exeaxplont.exeexplortu.exee9c9b1a164.exec0e1c1c4d4.exeexplortu.exeexplortu.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e9c9b1a164.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c0e1c1c4d4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exeaxplont.exeaxplont.exee9c9b1a164.exec0e1c1c4d4.exeexplortu.exeaxplont.exeexplortu.exeexplortu.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e9c9b1a164.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c0e1c1c4d4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e9c9b1a164.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c0e1c1c4d4.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
axplont.exeriff.exelgodjadrg.exework.exeriff.exe2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exeexplortu.exee9c9b1a164.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation axplont.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation riff.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation lgodjadrg.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation work.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation riff.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation explortu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation e9c9b1a164.exe -
Executes dropped EXE 18 IoCs
Processes:
explortu.exee9c9b1a164.exeaxplont.exec0e1c1c4d4.exeriff.exelgodjadrg.exework.exelgors.exeriff.exetor-real.exepfcwtdp.exeaxplont.exeexplortu.exeriff.exepfcwtdp.exeaxplont.exeexplortu.exeriff.exepid process 1692 explortu.exe 2880 e9c9b1a164.exe 2872 axplont.exe 4508 c0e1c1c4d4.exe 4800 riff.exe 4416 lgodjadrg.exe 3592 work.exe 4300 lgors.exe 2488 riff.exe 3964 tor-real.exe 4468 pfcwtdp.exe 3036 axplont.exe 5084 explortu.exe 884 riff.exe 4468 pfcwtdp.exe 1056 axplont.exe 5056 explortu.exe 3952 riff.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
c0e1c1c4d4.exeexplortu.exeexplortu.exe2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exeexplortu.exeaxplont.exee9c9b1a164.exeaxplont.exeaxplont.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Wine c0e1c1c4d4.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Wine 2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Wine e9c9b1a164.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Wine axplont.exe -
Loads dropped DLL 9 IoCs
Processes:
tor-real.exepid process 3964 tor-real.exe 3964 tor-real.exe 3964 tor-real.exe 3964 tor-real.exe 3964 tor-real.exe 3964 tor-real.exe 3964 tor-real.exe 3964 tor-real.exe 3964 tor-real.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
riff.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 riff.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 riff.exe Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 riff.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explortu.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c0e1c1c4d4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000005001\\c0e1c1c4d4.exe" explortu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 41 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exeexplortu.exee9c9b1a164.exeaxplont.exec0e1c1c4d4.exeaxplont.exeexplortu.exeexplortu.exeaxplont.exepid process 1512 2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exe 1692 explortu.exe 2880 e9c9b1a164.exe 2872 axplont.exe 4508 c0e1c1c4d4.exe 3036 axplont.exe 5084 explortu.exe 5056 explortu.exe 1056 axplont.exe -
Drops file in Windows directory 4 IoCs
Processes:
2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exee9c9b1a164.exelgors.exedescription ioc process File created C:\Windows\Tasks\explortu.job 2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exe File created C:\Windows\Tasks\axplont.job e9c9b1a164.exe File created C:\Windows\Tasks\pfcwtdp.job lgors.exe File opened for modification C:\Windows\Tasks\pfcwtdp.job lgors.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3792 timeout.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
Processes:
2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exeexplortu.exee9c9b1a164.exeaxplont.exec0e1c1c4d4.exeriff.exelgors.exeaxplont.exeexplortu.exeriff.exeexplortu.exeaxplont.exeriff.exepid process 1512 2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exe 1512 2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exe 1692 explortu.exe 1692 explortu.exe 2880 e9c9b1a164.exe 2880 e9c9b1a164.exe 2872 axplont.exe 2872 axplont.exe 4508 c0e1c1c4d4.exe 4508 c0e1c1c4d4.exe 2488 riff.exe 2488 riff.exe 2488 riff.exe 4300 lgors.exe 4300 lgors.exe 2488 riff.exe 2488 riff.exe 3036 axplont.exe 3036 axplont.exe 5084 explortu.exe 5084 explortu.exe 884 riff.exe 884 riff.exe 5056 explortu.exe 5056 explortu.exe 1056 axplont.exe 1056 axplont.exe 3952 riff.exe 3952 riff.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
riff.exeriff.exeriff.exeriff.exedescription pid process Token: SeDebugPrivilege 4800 riff.exe Token: SeDebugPrivilege 2488 riff.exe Token: SeDebugPrivilege 884 riff.exe Token: SeDebugPrivilege 3952 riff.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
riff.exeriff.exeriff.exepid process 2488 riff.exe 884 riff.exe 3952 riff.exe -
Suspicious use of WriteProcessMemory 58 IoCs
Processes:
2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exeexplortu.exee9c9b1a164.exeaxplont.exeriff.execmd.exelgodjadrg.execmd.exework.exeriff.execmd.execmd.exedescription pid process target process PID 1512 wrote to memory of 1692 1512 2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exe explortu.exe PID 1512 wrote to memory of 1692 1512 2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exe explortu.exe PID 1512 wrote to memory of 1692 1512 2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exe explortu.exe PID 1692 wrote to memory of 4524 1692 explortu.exe explortu.exe PID 1692 wrote to memory of 4524 1692 explortu.exe explortu.exe PID 1692 wrote to memory of 4524 1692 explortu.exe explortu.exe PID 1692 wrote to memory of 2880 1692 explortu.exe e9c9b1a164.exe PID 1692 wrote to memory of 2880 1692 explortu.exe e9c9b1a164.exe PID 1692 wrote to memory of 2880 1692 explortu.exe e9c9b1a164.exe PID 2880 wrote to memory of 2872 2880 e9c9b1a164.exe axplont.exe PID 2880 wrote to memory of 2872 2880 e9c9b1a164.exe axplont.exe PID 2880 wrote to memory of 2872 2880 e9c9b1a164.exe axplont.exe PID 1692 wrote to memory of 4508 1692 explortu.exe c0e1c1c4d4.exe PID 1692 wrote to memory of 4508 1692 explortu.exe c0e1c1c4d4.exe PID 1692 wrote to memory of 4508 1692 explortu.exe c0e1c1c4d4.exe PID 2872 wrote to memory of 4800 2872 axplont.exe riff.exe PID 2872 wrote to memory of 4800 2872 axplont.exe riff.exe PID 4800 wrote to memory of 3568 4800 riff.exe cmd.exe PID 4800 wrote to memory of 3568 4800 riff.exe cmd.exe PID 3568 wrote to memory of 4088 3568 cmd.exe chcp.com PID 3568 wrote to memory of 4088 3568 cmd.exe chcp.com PID 3568 wrote to memory of 3792 3568 cmd.exe timeout.exe PID 3568 wrote to memory of 3792 3568 cmd.exe timeout.exe PID 2872 wrote to memory of 4416 2872 axplont.exe lgodjadrg.exe PID 2872 wrote to memory of 4416 2872 axplont.exe lgodjadrg.exe PID 2872 wrote to memory of 4416 2872 axplont.exe lgodjadrg.exe PID 4416 wrote to memory of 5056 4416 lgodjadrg.exe cmd.exe PID 4416 wrote to memory of 5056 4416 lgodjadrg.exe cmd.exe PID 4416 wrote to memory of 5056 4416 lgodjadrg.exe cmd.exe PID 5056 wrote to memory of 3592 5056 cmd.exe work.exe PID 5056 wrote to memory of 3592 5056 cmd.exe work.exe PID 5056 wrote to memory of 3592 5056 cmd.exe work.exe PID 3592 wrote to memory of 4300 3592 work.exe lgors.exe PID 3592 wrote to memory of 4300 3592 work.exe lgors.exe PID 3592 wrote to memory of 4300 3592 work.exe lgors.exe PID 3568 wrote to memory of 4200 3568 cmd.exe schtasks.exe PID 3568 wrote to memory of 4200 3568 cmd.exe schtasks.exe PID 3568 wrote to memory of 2488 3568 cmd.exe riff.exe PID 3568 wrote to memory of 2488 3568 cmd.exe riff.exe PID 2488 wrote to memory of 3964 2488 riff.exe tor-real.exe PID 2488 wrote to memory of 3964 2488 riff.exe tor-real.exe PID 2488 wrote to memory of 3964 2488 riff.exe tor-real.exe PID 2488 wrote to memory of 876 2488 riff.exe cmd.exe PID 2488 wrote to memory of 876 2488 riff.exe cmd.exe PID 876 wrote to memory of 3612 876 cmd.exe chcp.com PID 876 wrote to memory of 3612 876 cmd.exe chcp.com PID 876 wrote to memory of 3036 876 cmd.exe netsh.exe PID 876 wrote to memory of 3036 876 cmd.exe netsh.exe PID 876 wrote to memory of 3868 876 cmd.exe findstr.exe PID 876 wrote to memory of 3868 876 cmd.exe findstr.exe PID 2488 wrote to memory of 3092 2488 riff.exe cmd.exe PID 2488 wrote to memory of 3092 2488 riff.exe cmd.exe PID 3092 wrote to memory of 3220 3092 cmd.exe chcp.com PID 3092 wrote to memory of 3220 3092 cmd.exe chcp.com PID 3092 wrote to memory of 5064 3092 cmd.exe netsh.exe PID 3092 wrote to memory of 5064 3092 cmd.exe netsh.exe PID 3092 wrote to memory of 4044 3092 cmd.exe findstr.exe PID 3092 wrote to memory of 4044 3092 cmd.exe findstr.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
Processes:
riff.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 riff.exe -
outlook_win_path 1 IoCs
Processes:
riff.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 riff.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exe"C:\Users\Admin\AppData\Local\Temp\2e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵PID:4524
-
-
C:\Users\Admin\1000004002\e9c9b1a164.exe"C:\Users\Admin\1000004002\e9c9b1a164.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\1000053001\riff.exe"C:\Users\Admin\AppData\Local\Temp\1000053001\riff.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && timeout /t 3 > NUL && schtasks /create /tn "riff" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\RobloxSecurity\riff.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\1000053001\riff.exe" &&START "" "C:\Users\Admin\AppData\Local\RobloxSecurity\riff.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:4088
-
-
C:\Windows\system32\timeout.exetimeout /t 37⤵
- Delays execution with timeout.exe
PID:3792
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "riff" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\RobloxSecurity\riff.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
PID:4200
-
-
C:\Users\Admin\AppData\Local\RobloxSecurity\riff.exe"C:\Users\Admin\AppData\Local\RobloxSecurity\riff.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2488 -
C:\Users\Admin\AppData\Local\zxqaiiy6en\tor\tor-real.exe"C:\Users\Admin\AppData\Local\zxqaiiy6en\tor\tor-real.exe" -f "C:\Users\Admin\AppData\Local\zxqaiiy6en\tor\torrc.txt"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3964
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"8⤵
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\system32\chcp.comchcp 650019⤵PID:3612
-
-
C:\Windows\system32\netsh.exenetsh wlan show profiles9⤵PID:3036
-
-
C:\Windows\system32\findstr.exefindstr /R /C:"[ ]:[ ]"9⤵PID:3868
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"8⤵
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\system32\chcp.comchcp 650019⤵PID:3220
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid9⤵PID:5064
-
-
C:\Windows\system32\findstr.exefindstr "SSID BSSID Signal"9⤵PID:4044
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000054001\lgodjadrg.exe"C:\Users\Admin\AppData\Local\Temp\1000054001\lgodjadrg.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exework.exe -priverdD7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\lgors.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\lgors.exe"8⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\c0e1c1c4d4.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\c0e1c1c4d4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
-
C:\ProgramData\abinb\pfcwtdp.exeC:\ProgramData\abinb\pfcwtdp.exe start21⤵
- Executes dropped EXE
PID:4468
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3036
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5084
-
C:\Users\Admin\AppData\Local\RobloxSecurity\riff.exeC:\Users\Admin\AppData\Local\RobloxSecurity\riff.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:884
-
C:\ProgramData\abinb\pfcwtdp.exeC:\ProgramData\abinb\pfcwtdp.exe start21⤵
- Executes dropped EXE
PID:4468
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5056
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
C:\Users\Admin\AppData\Local\RobloxSecurity\riff.exeC:\Users\Admin\AppData\Local\RobloxSecurity\riff.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3952
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Credential Access
Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD51fd9bdf457110fc9c0b6a5eaca7b6e7f
SHA1c3bde60ebe8b2b068db21e3084a5ef17fa852de3
SHA256ddb8629348893cc8e5d8dcdcbf280fb404a8bb61650000e7f89b8d3a54c7eee3
SHA51284e4edd1480435dd53b50e48c521c23b0fb4a2925eb123abf6dc76bb8f173635b4a810446f50aa99ba5c21d1ba369eb995d16d2b090999044e36264671e79586
-
Filesize
1KB
MD5fc1be6f3f52d5c841af91f8fc3f790cb
SHA1ac79b4229e0a0ce378ae22fc6104748c5f234511
SHA2566da862f7c7feffca99cd58712ece93928c6ca6aed617f5d8c10a4718eaa2a910
SHA5122f46165017309ee1a0c1b23e30a71e52e86ad8933e2649bf58c3f4628c5aa75659f5b8f6be32c2882f220b2f3ff2fd50d8766bf0a3708c94c2c634c051a05ea6
-
Filesize
2.3MB
MD514aca070e2756b27dd4fcb8a33c9b50f
SHA139afe979af25afc0547f1d864f5622207804a528
SHA2563ebbe88713c293d699058b87334e720697f3265964afb15e88b25705dee0c731
SHA512f894073e1b69195cf3cdc5a6713a05f91b93b958f842facf33c0ca240c1e8558857bcaf7d64aeb27505c9db52718de0b357b4628921cdb5a1fe2129c73c83488
-
Filesize
119KB
MD5b37058a1a6fa72cf11d4bda54e15790a
SHA1b8663b93cac0b88168d207fd648da5c2f9b775de
SHA25685b1ce3f619ebeb3799acff17ee1356a7f3911e0b95f29b24111ae03fa2a03a0
SHA5124848057ad580943a96e57713ca721ad3052001e8fd428651b08034592596f14e9396d0de970bdbffc552e104189aa81dfe7723bd13003637659198ec38fed818
-
Filesize
613KB
MD5a1ad149a4d2a04338fd9a0d902410daf
SHA1d43db08458ea4a81cd32926a402d8a5d12728a2f
SHA2566e9f1c1298419230dbc24cfe76a8d64c8094e9d1335a0cef567042b3250e565a
SHA512cef534d0233f47048d6b80c49c4b44570fc436b90904ea84f03c24106ecb785802c424e1241ebd70b9a85f09b77f7c0322927c57a9d65959da4a425149e04128
-
Filesize
1.8MB
MD5fcfdedde2ecdd0399f36409e57f1e0e9
SHA140178bf761e6bbb3ca612a72f0ec9da52c7cc396
SHA2562e116b2262973c14b37cce08265b2c0d1f6b8f3ae9c47f8b9e5c2ffedac5fa80
SHA51222d17e254fe7cee5be31117ea53414136053f18cca6f07b47943a7ed17f068696cb23e86bb48a40ac4d4cd1de9445858240624ed76350f6ff7b72af8030a92a5
-
Filesize
35B
MD5ff59d999beb970447667695ce3273f75
SHA1316fa09f467ba90ac34a054daf2e92e6e2854ff8
SHA256065d2b17ad499587dc9de7ee9ecda4938b45da1df388bc72e6627dff220f64d2
SHA512d5ac72cb065a3cd3cb118a69a2f356314eeed24dcb4880751e1a3683895e66cedc62607967e29f77a0c27adf1c9fe0efd86e804f693f0a63a5b51b0bf0056b5d
-
Filesize
294KB
MD5372b142bdf88cc3175d31b48a650955d
SHA1515f9a1e5c954cd849bacd19291534c50201ac49
SHA256e3873f55cd848b37d6897b3851a21aa6c17b3d74d94ea2adcd076cf3eb3f4121
SHA512cff5c69e361d4975f6b10000d5d53ccd0853503f585842ac3422131cf8313195ab8720b65e291c27fc12875b584129069b8548823774320ded37403cc64d8d11
-
Filesize
16KB
MD54f01c3d7439dde153ff0110a26e2a71c
SHA140d7203ad4e1fd40e13a56e6f747ee480740873c
SHA256cfb1fd0adf528fcf14647cf3fcd85fb7e4fddd2167b36f9e8b2424b62453df28
SHA512513d09b80e1ac80813bc691e71cdf5348478157350e43b9daed27741b7f5a7a16b2ae4d88ee9951395747c7f2a93ff0c1f2c3753a9e3bad2e2607767a1e3d28e
-
Filesize
4B
MD5e7a0ac723159df05cb1edaa7683e1a53
SHA19cab2d02817e2ac9d27c48c2a09edb901e5abf1e
SHA2560aa87b8bdb3232d735bf0d7af483d370929809e7b30f6e693b09a99353a9ab13
SHA512a224e6db9bcb3a926f053591e863c66f5b2ccae17fc8cff680a2db6d78b4d35bb7811305ed292fa4ffeae531e517dbb5e114352188f1c0de9487a99e9bfcbca2
-
Filesize
2.5MB
MD542ec7882d8d517ad5216713ccb2b384a
SHA12a6cf9b89fd09d7d36f52925534b8c296ffedda5
SHA256d448c740b305c7f302fe6434bef95628d6b8c786dd48fbf4e84c6a951981d0ff
SHA512a8efb6d3e9f4324fffdac7c0c75cf92b4a236684d77b9d5642cb3868a0d09703eaa866114ae02cb372cb1adf373e8c9a5b81b62fa8a721bbb3126a7f9d9fd64e
-
Filesize
5.9MB
MD5df2c3cc2618306c553ba937e96ce3d6c
SHA19a9e8b07f001d16df899e735f6eb2ba87c62cbc8
SHA256c6be452c50e1245ee5be5e5bf3ea453c58ff71da8c52f6af8a37041ec0ef84ba
SHA512c32fe1103f1389ae80c3e381ebdb350a618da5acc420732b1387c626e8a865fa48f8c0be889b93c4391510125600fa9fe70333c7951452fec86cb9ca8e0201ec
-
Filesize
64B
MD525494f441471ebf59c298c7125228e23
SHA1856cea02de33d8cdf212322aa0d2d56561dcae01
SHA25646c72f046e8690ca1d221fd67fcb69ff14f3b79373942e24c426e24b3176e951
SHA5128df3f6c58492478d94a73d6a8230a4f70fedbfe281dfdb03b2120f3844dbc63b2ad3d05a5cc0ddba15fe1e8d70406223900a5f8d30bd3dfd6e330f44ece22b6f
-
Filesize
3.5MB
MD56d48d76a4d1c9b0ff49680349c4d28ae
SHA11bb3666c16e11eff8f9c3213b20629f02d6a66cb
SHA2563f08728c7a67e4998fbdc7a7cb556d8158efdcdaf0acf75b7789dccace55662d
SHA51209a4fd7b37cf52f6a0c3bb0a7517e2d2439f4af8e03130aed3296d7448585ea5e3c0892e1e1202f658ef2d083ce13c436779e202c39620a70a17b026705c65c9
-
Filesize
1.1MB
MD5a3bf8e33948d94d490d4613441685eee
SHA175ed7f6e2855a497f45b15270c3ad4aed6ad02e2
SHA25691c812a33871e40b264761f1418e37ebfeb750fe61ca00cbcbe9f3769a8bf585
SHA512c20ef2efcacb5f8c7e2464de7fde68bf610ab2e0608ff4daed9bf676996375db99bee7e3f26c5bd6cca63f9b2d889ed5460ec25004130887cd1a90b892be2b28
-
Filesize
1.0MB
MD5bd40ff3d0ce8d338a1fe4501cd8e9a09
SHA13aae8c33bf0ec9adf5fbf8a361445969de409b49
SHA256ebda776a2a353f8f0690b1c7706b0cdaff3d23e1618515d45e451fc19440501c
SHA512404fb3c107006b832b8e900f6e27873324cd0a7946cdccf4ffeea365a725892d929e8b160379af9782bcd6cfeb4c3c805740e21280b42bb2ce8f39f26792e5a1
-
Filesize
1.1MB
MD5945d225539becc01fbca32e9ff6464f0
SHA1a614eb470defeab01317a73380f44db669100406
SHA256c697434857a039bf27238c105be0487a0c6c611dd36cb1587c3c6b3bf582718a
SHA512409f8f1e6d683a3cbe7954bce37013316dee086cdbd7ecda88acb5d94031cff6166a93b641875116327151823cce747bcf254c0185e0770e2b74b7c5e067bc4a
-
Filesize
246KB
MD5b77328da7cead5f4623748a70727860d
SHA113b33722c55cca14025b90060e3227db57bf5327
SHA25646541d9e28c18bc11267630920b97c42f104c258b55e2f62e4a02bcd5f03e0e7
SHA5122f1bd13357078454203092ed5ddc23a8baa5e64202fba1e4f98eacf1c3c184616e527468a96ff36d98b9324426dddfa20b62b38cf95c6f5c0dc32513ebace9e2
-
Filesize
512KB
MD519d7cc4377f3c09d97c6da06fbabc7dc
SHA13a3ba8f397fb95ed5df22896b2c53a326662fcc9
SHA256228fcfe9ed0574b8da32dd26eaf2f5dbaef0e1bd2535cb9b1635212ccdcbf84d
SHA51223711285352cdec6815b5dd6e295ec50568fab7614706bc8d5328a4a0b62991c54b16126ed9e522471d2367b6f32fa35feb41bfa77b3402680d9a69f53962a4a
-
Filesize
4.0MB
MD507244a2c002ffdf1986b454429eace0b
SHA1d7cd121caac2f5989aa68a052f638f82d4566328
SHA256e9522e6912a0124c0a8c9ff9bb3712b474971376a4eb4ca614bb1664a2b4abcf
SHA5124a09db85202723a73703c5926921fef60c3dddae21528a01936987306c5e7937463f94a2f4a922811de1f76621def2a8a597a8b38a719dd24e6ff3d4e07492ca
-
Filesize
226B
MD5b4ae31c07b18d0d7fda6b6156f611312
SHA1f1182ffcdfaeeb998cea80b768aa66cdd0924dea
SHA256f6577d49fbc32be805b13c652226b1a63cab90202ad5829f5ab6d2b7b9116be8
SHA512666c931ae72ad621a16fc94108f28ae477df5f1aa407b44323f86f09bcf1d894138398fdd04b314a22cc1e0a3350a591dce5720f765663a6daf9cac13ff1c48f
-
Filesize
121KB
MD56f98da9e33cd6f3dd60950413d3638ac
SHA1e630bdf8cebc165aa81464ff20c1d55272d05675
SHA256219d9d5bf0de4c2251439c89dd5f2959ee582e7f9f7d5ff66a29c88753a3a773
SHA5122983faaf7f47a8f79a38122aa617e65e7deddd19ba9a98b62acf17b48e5308099b852f21aaf8ca6fe11e2cc76c36eed7ffa3307877d4e67b1659fe6e4475205c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e