Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
17/06/2024, 07:50
Static task
static1
Behavioral task
behavioral1
Sample
3177c3d56784a2891745cc94a8c5cdad3559d26144bc1d77c27fca92cc1f4824.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
3177c3d56784a2891745cc94a8c5cdad3559d26144bc1d77c27fca92cc1f4824.exe
Resource
win11-20240611-en
General
-
Target
3177c3d56784a2891745cc94a8c5cdad3559d26144bc1d77c27fca92cc1f4824.exe
-
Size
1.8MB
-
MD5
225e2cfed94c572d0da09d491a743b0d
-
SHA1
d32c83283147a4592fc6b5472e760fa8190a7c73
-
SHA256
3177c3d56784a2891745cc94a8c5cdad3559d26144bc1d77c27fca92cc1f4824
-
SHA512
9ce8be822f835fa77602624e617f70d63e05c4f471e366f74a3265d66f2cc48e6e63e144294f5c1562bf2c23d24145ea0eb867f626c53f97878b1c7871522a72
-
SSDEEP
49152:L19O3NmtKDggACReVxlgTdnMhOEKH6/BKx5yZ:L19emtKrACRkxKtEZ2
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
amadey
8254624243
e76b71
http://77.91.77.81
-
install_dir
8254624243
-
install_file
axplong.exe
-
strings_key
90049e51fabf09df0d6748e0b271922e
-
url_paths
/Kiru9gu/index.php
Extracted
risepro
147.45.47.126:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ce27514798.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3177c3d56784a2891745cc94a8c5cdad3559d26144bc1d77c27fca92cc1f4824.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ce27514798.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3177c3d56784a2891745cc94a8c5cdad3559d26144bc1d77c27fca92cc1f4824.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3177c3d56784a2891745cc94a8c5cdad3559d26144bc1d77c27fca92cc1f4824.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ce27514798.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 3177c3d56784a2891745cc94a8c5cdad3559d26144bc1d77c27fca92cc1f4824.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation explortu.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation ce27514798.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation bb5cbc6eb9.exe -
Executes dropped EXE 9 IoCs
pid Process 4880 explortu.exe 1660 ce27514798.exe 2472 caa528fdcb.exe 2036 axplong.exe 64 bb5cbc6eb9.exe 3944 axplong.exe 3316 explortu.exe 1968 explortu.exe 2772 axplong.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine 3177c3d56784a2891745cc94a8c5cdad3559d26144bc1d77c27fca92cc1f4824.exe Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine ce27514798.exe Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine axplong.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caa528fdcb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000016001\\caa528fdcb.exe" explortu.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000700000002343a-76.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 22 IoCs
pid Process 856 3177c3d56784a2891745cc94a8c5cdad3559d26144bc1d77c27fca92cc1f4824.exe 4880 explortu.exe 1660 ce27514798.exe 2036 axplong.exe 2472 caa528fdcb.exe 2472 caa528fdcb.exe 2472 caa528fdcb.exe 2472 caa528fdcb.exe 2472 caa528fdcb.exe 3316 explortu.exe 3944 axplong.exe 2472 caa528fdcb.exe 2472 caa528fdcb.exe 2472 caa528fdcb.exe 2472 caa528fdcb.exe 2472 caa528fdcb.exe 2472 caa528fdcb.exe 1968 explortu.exe 2772 axplong.exe 2472 caa528fdcb.exe 2472 caa528fdcb.exe 2472 caa528fdcb.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\explortu.job 3177c3d56784a2891745cc94a8c5cdad3559d26144bc1d77c27fca92cc1f4824.exe File created C:\Windows\Tasks\axplong.job ce27514798.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133630842237699184" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2080292272-204036150-2159171770-1000\{7BC82309-00D1-4862-96AA-7174A11A6261} chrome.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 856 3177c3d56784a2891745cc94a8c5cdad3559d26144bc1d77c27fca92cc1f4824.exe 856 3177c3d56784a2891745cc94a8c5cdad3559d26144bc1d77c27fca92cc1f4824.exe 4880 explortu.exe 4880 explortu.exe 1660 ce27514798.exe 1660 ce27514798.exe 2036 axplong.exe 2036 axplong.exe 2500 chrome.exe 2500 chrome.exe 3316 explortu.exe 3316 explortu.exe 3944 axplong.exe 3944 axplong.exe 1968 explortu.exe 1968 explortu.exe 2772 axplong.exe 2772 axplong.exe 1364 chrome.exe 1364 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe Token: SeShutdownPrivilege 2500 chrome.exe Token: SeCreatePagefilePrivilege 2500 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1660 ce27514798.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 2500 chrome.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe -
Suspicious use of SendNotifyMessage 60 IoCs
pid Process 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 2500 chrome.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe 64 bb5cbc6eb9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2472 caa528fdcb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 856 wrote to memory of 4880 856 3177c3d56784a2891745cc94a8c5cdad3559d26144bc1d77c27fca92cc1f4824.exe 84 PID 856 wrote to memory of 4880 856 3177c3d56784a2891745cc94a8c5cdad3559d26144bc1d77c27fca92cc1f4824.exe 84 PID 856 wrote to memory of 4880 856 3177c3d56784a2891745cc94a8c5cdad3559d26144bc1d77c27fca92cc1f4824.exe 84 PID 4880 wrote to memory of 1876 4880 explortu.exe 85 PID 4880 wrote to memory of 1876 4880 explortu.exe 85 PID 4880 wrote to memory of 1876 4880 explortu.exe 85 PID 4880 wrote to memory of 1660 4880 explortu.exe 86 PID 4880 wrote to memory of 1660 4880 explortu.exe 86 PID 4880 wrote to memory of 1660 4880 explortu.exe 86 PID 4880 wrote to memory of 2472 4880 explortu.exe 87 PID 4880 wrote to memory of 2472 4880 explortu.exe 87 PID 4880 wrote to memory of 2472 4880 explortu.exe 87 PID 1660 wrote to memory of 2036 1660 ce27514798.exe 88 PID 1660 wrote to memory of 2036 1660 ce27514798.exe 88 PID 1660 wrote to memory of 2036 1660 ce27514798.exe 88 PID 4880 wrote to memory of 64 4880 explortu.exe 89 PID 4880 wrote to memory of 64 4880 explortu.exe 89 PID 4880 wrote to memory of 64 4880 explortu.exe 89 PID 64 wrote to memory of 2500 64 bb5cbc6eb9.exe 90 PID 64 wrote to memory of 2500 64 bb5cbc6eb9.exe 90 PID 2500 wrote to memory of 3364 2500 chrome.exe 92 PID 2500 wrote to memory of 3364 2500 chrome.exe 92 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 2968 2500 chrome.exe 93 PID 2500 wrote to memory of 3100 2500 chrome.exe 94 PID 2500 wrote to memory of 3100 2500 chrome.exe 94 PID 2500 wrote to memory of 4256 2500 chrome.exe 95 PID 2500 wrote to memory of 4256 2500 chrome.exe 95 PID 2500 wrote to memory of 4256 2500 chrome.exe 95 PID 2500 wrote to memory of 4256 2500 chrome.exe 95 PID 2500 wrote to memory of 4256 2500 chrome.exe 95 PID 2500 wrote to memory of 4256 2500 chrome.exe 95 PID 2500 wrote to memory of 4256 2500 chrome.exe 95 PID 2500 wrote to memory of 4256 2500 chrome.exe 95 PID 2500 wrote to memory of 4256 2500 chrome.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\3177c3d56784a2891745cc94a8c5cdad3559d26144bc1d77c27fca92cc1f4824.exe"C:\Users\Admin\AppData\Local\Temp\3177c3d56784a2891745cc94a8c5cdad3559d26144bc1d77c27fca92cc1f4824.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵PID:1876
-
-
C:\Users\Admin\1000015002\ce27514798.exe"C:\Users\Admin\1000015002\ce27514798.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000016001\caa528fdcb.exe"C:\Users\Admin\AppData\Local\Temp\1000016001\caa528fdcb.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\1000017001\bb5cbc6eb9.exe"C:\Users\Admin\AppData\Local\Temp\1000017001\bb5cbc6eb9.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff5606ab58,0x7fff5606ab68,0x7fff5606ab785⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1676 --field-trial-handle=1904,i,717281911482717400,10811024804865824459,131072 /prefetch:25⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1904,i,717281911482717400,10811024804865824459,131072 /prefetch:85⤵PID:3100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2196 --field-trial-handle=1904,i,717281911482717400,10811024804865824459,131072 /prefetch:85⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=1904,i,717281911482717400,10811024804865824459,131072 /prefetch:15⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3104 --field-trial-handle=1904,i,717281911482717400,10811024804865824459,131072 /prefetch:15⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4024 --field-trial-handle=1904,i,717281911482717400,10811024804865824459,131072 /prefetch:15⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3312 --field-trial-handle=1904,i,717281911482717400,10811024804865824459,131072 /prefetch:15⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4548 --field-trial-handle=1904,i,717281911482717400,10811024804865824459,131072 /prefetch:85⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4572 --field-trial-handle=1904,i,717281911482717400,10811024804865824459,131072 /prefetch:85⤵
- Modifies registry class
PID:888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 --field-trial-handle=1904,i,717281911482717400,10811024804865824459,131072 /prefetch:85⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5084 --field-trial-handle=1904,i,717281911482717400,10811024804865824459,131072 /prefetch:85⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 --field-trial-handle=1904,i,717281911482717400,10811024804865824459,131072 /prefetch:85⤵PID:3636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2356 --field-trial-handle=1904,i,717281911482717400,10811024804865824459,131072 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1364
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:748
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeC:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3316
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeC:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5601815e57f7703cd5efed188ba933cf9
SHA1de0270c320b7eff6b836e990a4322424035fd7d8
SHA256219d3d9463820899a59f7a7d158e3fbe45b8901009678f2cfb6ca1578da97fdc
SHA512f975ba7a5f3c4a70782cde089b17d64b888da73744ba4c139db1be1d1d2010857605794c4d6494ac773598a1e3e52b7addad033912ddaccf9f43f239808077aa
-
Filesize
336B
MD54ae023b9469971a05d27e437d483034d
SHA1da71b233b8c2ac0ce4bf6230062e3061acfaa1ba
SHA2562c79fe27ecefdb97d10e281513b1ddf7b4a449bfd13a0052dc0f0a336ccbf747
SHA512d3f878c3e7bc080fdb4f96115df0f2a83d8dd4643a18d48f42117a469e94bfa62332f4c38ff33fd269301909f0cda16ac364b39dc6f4c6459a9cdc1769337952
-
Filesize
2KB
MD5bc28dfea57e9c3406c8ba41228c2f329
SHA1c4a5574f3d0182fe8af2428b5f3b28b5eab0e002
SHA2561bdc5c23fb9d1b9a78e083b21f13bc516ad5db300e1bf4ea93c7cc503fd9ee87
SHA51282d3702ee22c1d0a43eae7b7b9a415e4d378683a6058a2f8deba305fbf23ff3ee3f681fa4f0b73a52c351223a2fcf4f4f4538e0197dfb24d0b2883682a70e737
-
Filesize
2KB
MD5c4be510ee873153aa429a314475b16ab
SHA1c62e199295ecd17bac52412e447ae882b05d0836
SHA256a7af31dda3dd21840fb4473d7987219d4b4d021ac3f0d1ceaeeb581577b836ca
SHA512024afc0ca6c51baef51b0d59b28a0d5b37c9f4e6c48fbcba3159fda8c3b3ae8f61907eb6ddc591dd165b93231a4af47fcc36644bf3f8d179f00898a5d84ce2fc
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
520B
MD52fe24473c99ca71d5d03a86056fc022a
SHA170cc4939c2e9bc701600facb4849e6486c6ed191
SHA2569002ec6b35c4e5d5829cf7146a98167cad40714c69b26eac0d4ee7e301c813f5
SHA512db895e73672e30be045bac9045b49a2e2746a6e9fa774564b794d6163bfd2d6175bf2c2bdf13486bb13f7a9ed9863c58566647aba4ad8d32e177a954cc61156e
-
Filesize
520B
MD5ec872148cf85036a9a4d8b3c86d3dcde
SHA16df72c4bc8ec42f6b9f9096c68c42c118d578b1a
SHA25623d2dd6f84c5f5de79506998b3a6c960d4e1e42f84bf40bd382c34c8e7b66144
SHA512ae480a740b75172b0f8676432f68dab82d7b4f98020bc8b63dff7f3939cef72e5fecaf86234b1f374625845c90627eb46676c4154bbe868883d5a9c5ad6c8407
-
Filesize
7KB
MD51cfb42a1d943c18db39f8e8654f01244
SHA129675a0763f117b78b63c61aa806e87cfdb10a94
SHA2562f7d24ff69507e22689a974cd95f62996213953b6b2bf827f8cbb9b12fe1ed92
SHA512167fb2170c101b55a9dc28a439daa0da25da314edf0a90a5a196d1883786168415fe2b289f3248d6ede3c035974056a73986968b345eaaa0ae5f57987cd4159e
-
Filesize
16KB
MD5edd471dff625136b705f97ca01aab0df
SHA1f81d153273a9299802afbee47ca8f80ece548f2f
SHA25615c0a4d6c992440a657e5389b3a9e0588412cf61fa5964abc8e49dceecc89d77
SHA5125ca52600588297610d77ebe8c7bfe7bc355c4888c25bc5f3dd289d70e1436107a6980e4471fbc5c75488a091fb10d8086a96a7e55cd31c6077d6307ab0e4078c
-
Filesize
276KB
MD57fa47de93e86972d6a30e0c96411e5cc
SHA198780016f18caa9f2f3d002a09e4bbf03217e65c
SHA256bdcdc781546d1999d9d6f5781e9fa8047f51e4543bb0055d47f0e0ec17faf200
SHA51273bc98802da7098ddd762cf1df36fbd9146f6a4a7e583ffe1d2dac35887559f5d0e8611886b89751839e263a9e512231c6bcc17dd0f41e49da3660f91c6a0839
-
Filesize
1.3MB
MD56b7e1481248981ab1d33a3ea22f545e1
SHA16af3019403792793cd5d567ead9aca4d171979bd
SHA256ab3705973cb969522b6e74e4df32ab652677aa495ebe428f8d337cc04a2a8dc4
SHA512e0e58815377d7577915824e67f1f80515a3a487cae8cc233476bddc6a662f5090f83718c0f957e58406f6dd36db625dcdc599dae068a57f99e62487ab8d3f93a
-
Filesize
1.1MB
MD5bdc87c1397fc955da3c0d519058b8d19
SHA1277d2b050c7be1881cabd6889902163c5e7d85f1
SHA25668b292e149dc813e4e449b779dd96462161ac1847de0a2a439d33e98b6feabc6
SHA5126cd66530c627298513ca61e395e8a811ee15775c37358dca9f35de714e24010e336fecfe3c2384ba23150e4121f142ce0adb2ed8a7cb51d2e55e6b4f8007d355
-
Filesize
1.8MB
MD5225e2cfed94c572d0da09d491a743b0d
SHA1d32c83283147a4592fc6b5472e760fa8190a7c73
SHA2563177c3d56784a2891745cc94a8c5cdad3559d26144bc1d77c27fca92cc1f4824
SHA5129ce8be822f835fa77602624e617f70d63e05c4f471e366f74a3265d66f2cc48e6e63e144294f5c1562bf2c23d24145ea0eb867f626c53f97878b1c7871522a72