Analysis
-
max time kernel
53s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2024 10:16
Static task
static1
Behavioral task
behavioral1
Sample
84d35d58bc6e48d4a105a39737e0e19a9cc0f628f80b2c8fc2d8c4161e8182ba.exe
Resource
win7-20240508-en
General
-
Target
84d35d58bc6e48d4a105a39737e0e19a9cc0f628f80b2c8fc2d8c4161e8182ba.exe
-
Size
1.8MB
-
MD5
eae382a2117d11780a3a6afef25ae116
-
SHA1
0b26db66b8ed50aaf3649ddcf0cb30d12b42a831
-
SHA256
84d35d58bc6e48d4a105a39737e0e19a9cc0f628f80b2c8fc2d8c4161e8182ba
-
SHA512
e4145cdc69c7dbf8dc9f375f07100ce1a9d8e7797fd0d60b71ae144f9b27852fbe2d4a87ca5ebff2ab7223731bbb9848dc224d797a6327386c71c5b8f1b554af
-
SSDEEP
24576:UF97iR5o14TYYayiicqK4qBeLLtrgEi8HPwqJgR6ijwzJLQ7QPr7tB4o7Mibjwml:a90jGtFVBeNtvgoLKIt++OMz
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
risepro
147.45.47.126:58709
Extracted
amadey
8254624243
e76b71
http://77.91.77.81
-
install_dir
8254624243
-
install_file
axplong.exe
-
strings_key
90049e51fabf09df0d6748e0b271922e
-
url_paths
/Kiru9gu/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 184f647e1c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 153e9862f8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 84d35d58bc6e48d4a105a39737e0e19a9cc0f628f80b2c8fc2d8c4161e8182ba.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 84d35d58bc6e48d4a105a39737e0e19a9cc0f628f80b2c8fc2d8c4161e8182ba.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 184f647e1c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 84d35d58bc6e48d4a105a39737e0e19a9cc0f628f80b2c8fc2d8c4161e8182ba.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 153e9862f8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 184f647e1c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 153e9862f8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 84d35d58bc6e48d4a105a39737e0e19a9cc0f628f80b2c8fc2d8c4161e8182ba.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation explortu.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 184f647e1c.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation d583acf353.exe -
Executes dropped EXE 7 IoCs
pid Process 3016 explortu.exe 2936 explortu.exe 3324 184f647e1c.exe 644 explortu.exe 4204 153e9862f8.exe 2544 axplong.exe 2980 d583acf353.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Wine 84d35d58bc6e48d4a105a39737e0e19a9cc0f628f80b2c8fc2d8c4161e8182ba.exe Key opened \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Wine 184f647e1c.exe Key opened \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Wine 153e9862f8.exe Key opened \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Wine axplong.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RageMP131 = "C:\\Users\\Admin\\AppData\\Local\\RageMP131\\RageMP131.exe" explortu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\153e9862f8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000012001\\153e9862f8.exe" explortu.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 40 ipinfo.io 41 ipinfo.io -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x00070000000233e2-126.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 4984 84d35d58bc6e48d4a105a39737e0e19a9cc0f628f80b2c8fc2d8c4161e8182ba.exe 3016 explortu.exe 2936 explortu.exe 3324 184f647e1c.exe 644 explortu.exe 4204 153e9862f8.exe 2544 axplong.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3016 set thread context of 2936 3016 explortu.exe 88 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 184f647e1c.exe File created C:\Windows\Tasks\explortu.job 84d35d58bc6e48d4a105a39737e0e19a9cc0f628f80b2c8fc2d8c4161e8182ba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3340 schtasks.exe 5012 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133621426291164277" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2539840389-1261165778-1087677076-1000\{84554D4A-E995-4237-9018-A866FE528264} chrome.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4984 84d35d58bc6e48d4a105a39737e0e19a9cc0f628f80b2c8fc2d8c4161e8182ba.exe 4984 84d35d58bc6e48d4a105a39737e0e19a9cc0f628f80b2c8fc2d8c4161e8182ba.exe 3016 explortu.exe 3016 explortu.exe 2936 explortu.exe 2936 explortu.exe 3324 184f647e1c.exe 3324 184f647e1c.exe 644 explortu.exe 644 explortu.exe 4204 153e9862f8.exe 4204 153e9862f8.exe 2544 axplong.exe 2544 axplong.exe 4572 chrome.exe 4572 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe Token: SeShutdownPrivilege 4572 chrome.exe Token: SeCreatePagefilePrivilege 4572 chrome.exe -
Suspicious use of FindShellTrayWindow 54 IoCs
pid Process 4984 84d35d58bc6e48d4a105a39737e0e19a9cc0f628f80b2c8fc2d8c4161e8182ba.exe 3324 184f647e1c.exe 2980 d583acf353.exe 2980 d583acf353.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 2980 d583acf353.exe 4572 chrome.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 4572 chrome.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe -
Suspicious use of SendNotifyMessage 49 IoCs
pid Process 2980 d583acf353.exe 2980 d583acf353.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 4572 chrome.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe 2980 d583acf353.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4984 wrote to memory of 3016 4984 84d35d58bc6e48d4a105a39737e0e19a9cc0f628f80b2c8fc2d8c4161e8182ba.exe 83 PID 4984 wrote to memory of 3016 4984 84d35d58bc6e48d4a105a39737e0e19a9cc0f628f80b2c8fc2d8c4161e8182ba.exe 83 PID 4984 wrote to memory of 3016 4984 84d35d58bc6e48d4a105a39737e0e19a9cc0f628f80b2c8fc2d8c4161e8182ba.exe 83 PID 3016 wrote to memory of 2936 3016 explortu.exe 88 PID 3016 wrote to memory of 2936 3016 explortu.exe 88 PID 3016 wrote to memory of 2936 3016 explortu.exe 88 PID 3016 wrote to memory of 2936 3016 explortu.exe 88 PID 3016 wrote to memory of 2936 3016 explortu.exe 88 PID 3016 wrote to memory of 2936 3016 explortu.exe 88 PID 3016 wrote to memory of 2936 3016 explortu.exe 88 PID 3016 wrote to memory of 2936 3016 explortu.exe 88 PID 3016 wrote to memory of 2936 3016 explortu.exe 88 PID 3016 wrote to memory of 2936 3016 explortu.exe 88 PID 3016 wrote to memory of 2936 3016 explortu.exe 88 PID 3016 wrote to memory of 2936 3016 explortu.exe 88 PID 3016 wrote to memory of 3324 3016 explortu.exe 92 PID 3016 wrote to memory of 3324 3016 explortu.exe 92 PID 3016 wrote to memory of 3324 3016 explortu.exe 92 PID 2936 wrote to memory of 3340 2936 explortu.exe 94 PID 2936 wrote to memory of 3340 2936 explortu.exe 94 PID 2936 wrote to memory of 3340 2936 explortu.exe 94 PID 3016 wrote to memory of 4204 3016 explortu.exe 96 PID 3016 wrote to memory of 4204 3016 explortu.exe 96 PID 3016 wrote to memory of 4204 3016 explortu.exe 96 PID 2936 wrote to memory of 5012 2936 explortu.exe 97 PID 2936 wrote to memory of 5012 2936 explortu.exe 97 PID 2936 wrote to memory of 5012 2936 explortu.exe 97 PID 3324 wrote to memory of 2544 3324 184f647e1c.exe 98 PID 3324 wrote to memory of 2544 3324 184f647e1c.exe 98 PID 3324 wrote to memory of 2544 3324 184f647e1c.exe 98 PID 3016 wrote to memory of 2980 3016 explortu.exe 100 PID 3016 wrote to memory of 2980 3016 explortu.exe 100 PID 3016 wrote to memory of 2980 3016 explortu.exe 100 PID 2980 wrote to memory of 4572 2980 d583acf353.exe 101 PID 2980 wrote to memory of 4572 2980 d583acf353.exe 101 PID 4572 wrote to memory of 648 4572 chrome.exe 103 PID 4572 wrote to memory of 648 4572 chrome.exe 103 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104 PID 4572 wrote to memory of 4968 4572 chrome.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\84d35d58bc6e48d4a105a39737e0e19a9cc0f628f80b2c8fc2d8c4161e8182ba.exe"C:\Users\Admin\AppData\Local\Temp\84d35d58bc6e48d4a105a39737e0e19a9cc0f628f80b2c8fc2d8c4161e8182ba.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST4⤵
- Creates scheduled task(s)
PID:3340
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST4⤵
- Creates scheduled task(s)
PID:5012
-
-
-
C:\Users\Admin\1000011002\184f647e1c.exe"C:\Users\Admin\1000011002\184f647e1c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2544
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000012001\153e9862f8.exe"C:\Users\Admin\AppData\Local\Temp\1000012001\153e9862f8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Users\Admin\AppData\Local\Temp\1000013001\d583acf353.exe"C:\Users\Admin\AppData\Local\Temp\1000013001\d583acf353.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a440ab58,0x7ff9a440ab68,0x7ff9a440ab785⤵PID:648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1856,i,3472216411176656778,4068401850064137716,131072 /prefetch:25⤵PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=1856,i,3472216411176656778,4068401850064137716,131072 /prefetch:85⤵PID:4356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2272 --field-trial-handle=1856,i,3472216411176656778,4068401850064137716,131072 /prefetch:85⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3032 --field-trial-handle=1856,i,3472216411176656778,4068401850064137716,131072 /prefetch:15⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=1856,i,3472216411176656778,4068401850064137716,131072 /prefetch:15⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4276 --field-trial-handle=1856,i,3472216411176656778,4068401850064137716,131072 /prefetch:15⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4520 --field-trial-handle=1856,i,3472216411176656778,4068401850064137716,131072 /prefetch:15⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4660 --field-trial-handle=1856,i,3472216411176656778,4068401850064137716,131072 /prefetch:85⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4452 --field-trial-handle=1856,i,3472216411176656778,4068401850064137716,131072 /prefetch:85⤵
- Modifies registry class
PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 --field-trial-handle=1856,i,3472216411176656778,4068401850064137716,131072 /prefetch:85⤵PID:5336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3248 --field-trial-handle=1856,i,3472216411176656778,4068401850064137716,131072 /prefetch:85⤵PID:5352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 --field-trial-handle=1856,i,3472216411176656778,4068401850064137716,131072 /prefetch:85⤵PID:5476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 --field-trial-handle=1856,i,3472216411176656778,4068401850064137716,131072 /prefetch:85⤵PID:5800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 --field-trial-handle=1856,i,3472216411176656778,4068401850064137716,131072 /prefetch:85⤵PID:5808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4792 --field-trial-handle=1856,i,3472216411176656778,4068401850064137716,131072 /prefetch:85⤵PID:5916
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:644
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1700
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD54121e3c63faa38dec7b534814e3d76ec
SHA1ac7c9190b2223fa063ceaf7bab0d824dd0ab5052
SHA2564db5e2999dde59db802d2f54d348004f0ecbfc982100e2d2390e264502a9c561
SHA512f75912657e2c0c40ce5ad5c95a2ae01fea3ae6ae0c7c8516e41363f11aaeab8c32467368e2cce9c59c631288d456edc351d009650034375c349f55cd64a87f98
-
Filesize
336B
MD5a0c4d8248ea8ff620ed34544201392ad
SHA154a77e1c1667ffe5b12c103ccdfff66ce6323ed4
SHA256f742aca04f8bd78c9cc728aefc232eef4849a8420f80f976c1e062124ce73f63
SHA512a90b50bcc86b8e4d27070a7d73f943dc9403c4db196fb43a9e17476982ad1f05e5153804f66ab74415b35ef59f18eddd32ddf4880916d424e51a88b3b2a802ed
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD562d78c889cf176e445172b83c041337a
SHA1554abcbd3431de9d2054e08132638cc2f09fce12
SHA2562eca996e1e9dbb564046d75f6ff40af96ed196ad6899cb2a1b81fd92bcba397a
SHA512b9facce40727daf0e0b57eb4b27c24b695809ae7feddb1ccdfe471203b375a3a307f0a221918d748e2dc2365b6c8ab3dd31d3e009621da0c60e48b7a1acfb4b5
-
Filesize
7KB
MD5940e2ea25dd186804c023b494170a01d
SHA17c6dcbe9637af1ebfaabf6f3fe1208113b7a7cfe
SHA2562f4156019cdeca86672c899ca457421acb5a678b6a5d7eb613a7716e4ee5421d
SHA512ba2d662037a9af79a453eb16d31c328b590f3130a4a9288d2e33308c63b90caaec953eab915cd3ee7ce9c3e1de6d44ab9fb1ef6908ae36a2f1662628009eda25
-
Filesize
16KB
MD512a25fb78cb0237edb73564928c212a4
SHA1a4669983b2a4f9d53ce18eeded5204382d6fb9ff
SHA256a39af10d9fa0f7c9018d50b5705813c49b16bd0b0d35ac508d63df6cb900412c
SHA5129e2b2706c2164417c32ba5ff289765f6697ff77826387398c6de32ee6f7562ba2fcd30e76bfcc5ebd78be3e9471cc87b510ba626e01b5f85808bfb1d5a608cd6
-
Filesize
257KB
MD5e8e3de01edfbb34eb5ddcf031c73d7cd
SHA165c8e7056f3870fcbba296ed36440774e97172b1
SHA2569a79d35bff292d989e04e22afc70c526e700ca62a31bcbb7f4619eda320d933f
SHA512b96c6b861b63c2ff24b5928cfcc42bfea7925fda5a8a5d714a796ce45e54737452bb632b6eeb29288b677e89e3c65e1e001c598b43aa59073702a9e6a6721ad4
-
Filesize
264KB
MD5f6b0d06c4cf74f9d6c688520b4e9d41d
SHA1ebc12c21abc0835b3f79fa927779d78c0089e93c
SHA25678437858e24ed58cacdd27248252e02008b63775cd93d8a70e60ef76b1746873
SHA512cd544fd82a92fb9fef1e0f7c29057a2f90489008b52e050378f769eecfcf9ecc135821c5eaac8d3f2c9dd50a319dcb938b94041e68fb47511bf9b294e163ac47
-
Filesize
2.3MB
MD5e6b6d39308b8c418285314b90aa4cd4c
SHA113c819a3cc8fc10e8a058f1ff6b101dab4fa64be
SHA256ce5a1990b7770d0c8041f4e4e0e6179a4e310ee0cf497266c1706e7eb667694d
SHA512c53c9e20b21b76c4590b4d69c9256111986e4857ca4e6f29411f474c16ad07e972cc543f53a20407f0bf266e08576635353c7ec121b92f80d8acfa3ea75f1873
-
Filesize
1.1MB
MD5e31e1c35a9630987b1217082bd052e99
SHA1ee9cc68837769e2f12559ae5cb047bbf3337b943
SHA256602808cd8e44ec2e6d145037cc75024df642e2ae7f476cea09d9c47a38a65495
SHA512627f2566947c45f4a92c9d51d003b55f38a52d2a9efcd66582b664d8d0eb7e6eb93b8339d668f9f34c56d993b96e0f755bf5696ef8922516e52934cdb4bfbf39
-
Filesize
1.8MB
MD5eae382a2117d11780a3a6afef25ae116
SHA10b26db66b8ed50aaf3649ddcf0cb30d12b42a831
SHA25684d35d58bc6e48d4a105a39737e0e19a9cc0f628f80b2c8fc2d8c4161e8182ba
SHA512e4145cdc69c7dbf8dc9f375f07100ce1a9d8e7797fd0d60b71ae144f9b27852fbe2d4a87ca5ebff2ab7223731bbb9848dc224d797a6327386c71c5b8f1b554af
-
Filesize
13B
MD5248c46a79f6ffff8f21792b55e66f5c1
SHA18f1c842fec863ba3bdf29d71f5bd59f2c54aec82
SHA256671335e39bdcc8c7cdf72e0f02fc5c4852e461422d5b0c3d1b433c290b38245a
SHA512a8397f0a250e0c4a214c3e86c16906e109f07edc0fb395a99da99960c77113d94ad0dee9f582fbab69def1c6cff96ac44541ba055dfe9211865c2036837566b5