Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
18/06/2024, 08:53
Static task
static1
Behavioral task
behavioral1
Sample
c24f9d80e670d4169c613e292077e9c00ec2eecb21dac08f4fc60be23883b16d.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
c24f9d80e670d4169c613e292077e9c00ec2eecb21dac08f4fc60be23883b16d.exe
Resource
win11-20240611-en
General
-
Target
c24f9d80e670d4169c613e292077e9c00ec2eecb21dac08f4fc60be23883b16d.exe
-
Size
1.8MB
-
MD5
dc055f00148e6bdf3dfb821a495e7456
-
SHA1
d2a72cb1d50ba76e2dff13bdc81e11d2631efe25
-
SHA256
c24f9d80e670d4169c613e292077e9c00ec2eecb21dac08f4fc60be23883b16d
-
SHA512
5495a7d7ea9492fb06da64593fed1ddd99d0acbd0d248f1ece11abe5fea77f340c6f9014ef0fb2a4ede89f527e45b894d08f409f16f55c9b742b7f275e4f6606
-
SSDEEP
49152:C+zTSO4GCP0vi3D/gPfpR/Q0SrWzugQi2U4lkVVrb:C+zOPsvh5BSgu/in4lSx
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
amadey
8254624243
e76b71
http://77.91.77.81
-
install_dir
8254624243
-
install_file
axplong.exe
-
strings_key
90049e51fabf09df0d6748e0b271922e
-
url_paths
/Kiru9gu/index.php
Extracted
risepro
147.45.47.126:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c24f9d80e670d4169c613e292077e9c00ec2eecb21dac08f4fc60be23883b16d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 74b3e77e5e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c24f9d80e670d4169c613e292077e9c00ec2eecb21dac08f4fc60be23883b16d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 74b3e77e5e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c24f9d80e670d4169c613e292077e9c00ec2eecb21dac08f4fc60be23883b16d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 74b3e77e5e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation c24f9d80e670d4169c613e292077e9c00ec2eecb21dac08f4fc60be23883b16d.exe Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation explortu.exe Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation 74b3e77e5e.exe Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation 658a738ebe.exe -
Executes dropped EXE 9 IoCs
pid Process 220 explortu.exe 2020 74b3e77e5e.exe 3916 88518f63ae.exe 848 axplong.exe 2200 658a738ebe.exe 3084 axplong.exe 3848 explortu.exe 2464 axplong.exe 1352 explortu.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Wine c24f9d80e670d4169c613e292077e9c00ec2eecb21dac08f4fc60be23883b16d.exe Key opened \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Wine 74b3e77e5e.exe Key opened \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Software\Wine explortu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\88518f63ae.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000016001\\88518f63ae.exe" explortu.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023433-76.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 22 IoCs
pid Process 752 c24f9d80e670d4169c613e292077e9c00ec2eecb21dac08f4fc60be23883b16d.exe 220 explortu.exe 2020 74b3e77e5e.exe 3916 88518f63ae.exe 848 axplong.exe 3916 88518f63ae.exe 3916 88518f63ae.exe 3848 explortu.exe 3084 axplong.exe 3916 88518f63ae.exe 3916 88518f63ae.exe 3916 88518f63ae.exe 3916 88518f63ae.exe 3916 88518f63ae.exe 3916 88518f63ae.exe 1352 explortu.exe 2464 axplong.exe 3916 88518f63ae.exe 3916 88518f63ae.exe 3916 88518f63ae.exe 3916 88518f63ae.exe 3916 88518f63ae.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\explortu.job c24f9d80e670d4169c613e292077e9c00ec2eecb21dac08f4fc60be23883b16d.exe File created C:\Windows\Tasks\axplong.job 74b3e77e5e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133631744247047906" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2447855248-390457009-3660902674-1000\{3EF32B17-EDDF-4880-83F4-879D20F5A8AD} chrome.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 752 c24f9d80e670d4169c613e292077e9c00ec2eecb21dac08f4fc60be23883b16d.exe 752 c24f9d80e670d4169c613e292077e9c00ec2eecb21dac08f4fc60be23883b16d.exe 220 explortu.exe 220 explortu.exe 2020 74b3e77e5e.exe 2020 74b3e77e5e.exe 848 axplong.exe 848 axplong.exe 2732 chrome.exe 2732 chrome.exe 3084 axplong.exe 3084 axplong.exe 3848 explortu.exe 3848 explortu.exe 2464 axplong.exe 2464 axplong.exe 1352 explortu.exe 1352 explortu.exe 3560 chrome.exe 3560 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe Token: SeShutdownPrivilege 2732 chrome.exe Token: SeCreatePagefilePrivilege 2732 chrome.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 2200 658a738ebe.exe 2200 658a738ebe.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2200 658a738ebe.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2200 658a738ebe.exe 2732 chrome.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe -
Suspicious use of SendNotifyMessage 60 IoCs
pid Process 2200 658a738ebe.exe 2200 658a738ebe.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2200 658a738ebe.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2732 chrome.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe 2200 658a738ebe.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3916 88518f63ae.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 752 wrote to memory of 220 752 c24f9d80e670d4169c613e292077e9c00ec2eecb21dac08f4fc60be23883b16d.exe 85 PID 752 wrote to memory of 220 752 c24f9d80e670d4169c613e292077e9c00ec2eecb21dac08f4fc60be23883b16d.exe 85 PID 752 wrote to memory of 220 752 c24f9d80e670d4169c613e292077e9c00ec2eecb21dac08f4fc60be23883b16d.exe 85 PID 220 wrote to memory of 2628 220 explortu.exe 88 PID 220 wrote to memory of 2628 220 explortu.exe 88 PID 220 wrote to memory of 2628 220 explortu.exe 88 PID 220 wrote to memory of 2020 220 explortu.exe 89 PID 220 wrote to memory of 2020 220 explortu.exe 89 PID 220 wrote to memory of 2020 220 explortu.exe 89 PID 220 wrote to memory of 3916 220 explortu.exe 90 PID 220 wrote to memory of 3916 220 explortu.exe 90 PID 220 wrote to memory of 3916 220 explortu.exe 90 PID 2020 wrote to memory of 848 2020 74b3e77e5e.exe 91 PID 2020 wrote to memory of 848 2020 74b3e77e5e.exe 91 PID 2020 wrote to memory of 848 2020 74b3e77e5e.exe 91 PID 220 wrote to memory of 2200 220 explortu.exe 92 PID 220 wrote to memory of 2200 220 explortu.exe 92 PID 220 wrote to memory of 2200 220 explortu.exe 92 PID 2200 wrote to memory of 2732 2200 658a738ebe.exe 93 PID 2200 wrote to memory of 2732 2200 658a738ebe.exe 93 PID 2732 wrote to memory of 1360 2732 chrome.exe 95 PID 2732 wrote to memory of 1360 2732 chrome.exe 95 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 4528 2732 chrome.exe 96 PID 2732 wrote to memory of 2128 2732 chrome.exe 97 PID 2732 wrote to memory of 2128 2732 chrome.exe 97 PID 2732 wrote to memory of 2236 2732 chrome.exe 98 PID 2732 wrote to memory of 2236 2732 chrome.exe 98 PID 2732 wrote to memory of 2236 2732 chrome.exe 98 PID 2732 wrote to memory of 2236 2732 chrome.exe 98 PID 2732 wrote to memory of 2236 2732 chrome.exe 98 PID 2732 wrote to memory of 2236 2732 chrome.exe 98 PID 2732 wrote to memory of 2236 2732 chrome.exe 98 PID 2732 wrote to memory of 2236 2732 chrome.exe 98 PID 2732 wrote to memory of 2236 2732 chrome.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\c24f9d80e670d4169c613e292077e9c00ec2eecb21dac08f4fc60be23883b16d.exe"C:\Users\Admin\AppData\Local\Temp\c24f9d80e670d4169c613e292077e9c00ec2eecb21dac08f4fc60be23883b16d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵PID:2628
-
-
C:\Users\Admin\1000015002\74b3e77e5e.exe"C:\Users\Admin\1000015002\74b3e77e5e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:848
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000016001\88518f63ae.exe"C:\Users\Admin\AppData\Local\Temp\1000016001\88518f63ae.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:3916
-
-
C:\Users\Admin\AppData\Local\Temp\1000017001\658a738ebe.exe"C:\Users\Admin\AppData\Local\Temp\1000017001\658a738ebe.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffed0acab58,0x7ffed0acab68,0x7ffed0acab785⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1900,i,13701143605517516555,6824987240625284479,131072 /prefetch:25⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1900,i,13701143605517516555,6824987240625284479,131072 /prefetch:85⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2236 --field-trial-handle=1900,i,13701143605517516555,6824987240625284479,131072 /prefetch:85⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3068 --field-trial-handle=1900,i,13701143605517516555,6824987240625284479,131072 /prefetch:15⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3080 --field-trial-handle=1900,i,13701143605517516555,6824987240625284479,131072 /prefetch:15⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4352 --field-trial-handle=1900,i,13701143605517516555,6824987240625284479,131072 /prefetch:15⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4536 --field-trial-handle=1900,i,13701143605517516555,6824987240625284479,131072 /prefetch:15⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4696 --field-trial-handle=1900,i,13701143605517516555,6824987240625284479,131072 /prefetch:85⤵PID:372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 --field-trial-handle=1900,i,13701143605517516555,6824987240625284479,131072 /prefetch:85⤵
- Modifies registry class
PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4496 --field-trial-handle=1900,i,13701143605517516555,6824987240625284479,131072 /prefetch:85⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4704 --field-trial-handle=1900,i,13701143605517516555,6824987240625284479,131072 /prefetch:85⤵PID:516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 --field-trial-handle=1900,i,13701143605517516555,6824987240625284479,131072 /prefetch:85⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2436 --field-trial-handle=1900,i,13701143605517516555,6824987240625284479,131072 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3560
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeC:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3084
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3848
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1352
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeC:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD544b7981e2942e199e3d0645357fe48ee
SHA1c381f56a98f824c72c40bb2258ea664c722126f9
SHA2563938991e87587e220f62d938222c637e5363d9f194cabd431404c064eeadb1ea
SHA512a0f8316077cce63a2cb9285e39999ed63d0b3f126dc0c8403eb48d35367d4e8e3f9e25944a5a09d5dab70a65bb0876a3d2fc4fb5c2a3c4e06b59de27fe97e5fb
-
Filesize
336B
MD5d89d4e1a5aa681b78bb7752d7a956ec8
SHA1d0ee871b09789b7e4a569116d5b389d406287dc0
SHA2565a761dadd010f5399915cc03562ed8c74c0787f412a25c5cc47e38c3c18f7431
SHA5127eaa2286cfb359e102827fa905e5457e0400f3f99a07172ae5d58d6cc9fa03c92a83043d1f6ba166e3486161de5e00be510f7e6ad9430e0da2192228402e52ee
-
Filesize
3KB
MD5da28e192d3618053bb1b08b2f6f9384d
SHA143ece3290d765c2b24c58034e693d2bfa6a74a4c
SHA256080975311a732bc344b94d8512a410a54db132806a0ddd51dd97cb38ff0584e1
SHA51251028cfeffa6483ba067e7f662d31f00437fec999996db4c2ffa696dfc8a413a4a2c2d07aa28544be46414b039ca72d3e5fbdb049c618dc2fc14e72aaf97f003
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5ec5493dcda65b1e920b9b377a9e3ea97
SHA12ef9e2b8ab3780710f7be9a134bf3d437c1a2d4b
SHA256d11d8274dc28d606526125f6d0401d8012f3aaad7556cdd3fd284436fb7f0db8
SHA51268359744d0af12f839a714549a298ddf936f4350d52793c11d993b8d8887c41330239a12e124ee107313e42cfd5a4814bed94ce633fe63a677b16ae58525711b
-
Filesize
524B
MD5422768c6671a46213a49ac371d7c812b
SHA144f6c0bbaffa3feb30214acf893d9d33c3ac6ef2
SHA2564c3e38264328ab8617f80c9cb0f33c28623e3ff542c34a4cb19c5df35549ce0f
SHA512645bf64068b626edcb5f92afde387383e2a99752fea679f2492db1a64cbafa0ddda647c22619381dec8d5688650dc51d79fd1dd2cff2652533a4424326e5568f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\ca6a11fe-2667-467f-a4aa-5acbd73ea416.tmp
Filesize2KB
MD557830144d6dd8dcce8511504e9382ffe
SHA148f9c2e1ccbcfa60b7b22f22e4e2c95220365d36
SHA256b16d9c2d9ccf86e7842c28dd35a1727eb4155e91a1ebb82cacf2cff16e34447c
SHA51237b43ca65aaa0b74bd9e52f43dde2b8518c810a6711ff3043385203ee69abc71077f3873d7b816d1062bdf63e5aced13f40b5f9afc4d8f0f4df9c671f35ecf8d
-
Filesize
7KB
MD5c68c59bc1b72fffefc03c8afa7d2b388
SHA180fec107c558359595791c21298c658fcacbc918
SHA256aa7b3d01103a4d7c849227444149362cf12bee590874005ea47c34f4972f956b
SHA512a0eac3fa01fa009a0f80893d3869ddc941d3a79d858b3c6e58749f9792090859c0ef75186bf45eaf69287114604a17c31f74192484c684e4d8eeb3792153bd38
-
Filesize
16KB
MD57fbf097f143ab32033d584a928e741c3
SHA1dde17b57a05675505f4825d1dce845fbca61c6eb
SHA2568de1f71f79fb1c494a0c8bff33260c0dce0915787f5fc11dd3ae37fc820cf616
SHA5122e7166647e1f62008f0608eb5d9609ee53395fbf697c4d9125bcba44a666c1796768bb00b41f5290100f3823a761ca36a47d348af3ff20c455600b1469830d00
-
Filesize
277KB
MD5e0e22f7c5eb55f534cd7804a40727e1e
SHA10497614a98224dc105a949437a5caa175dc85c21
SHA256c8af0499732b3a1c7845a67a69886c70067ffba2a8a15a8d03ad451e4a8393f0
SHA51202686147be96de8c302b96589c4d2704eea86a50b9cad9f8c3bd860adf048b9b197fed79539042052b5ff374cc2cecbaed56e21890ad7b6443c08e480ee255f7
-
Filesize
1.3MB
MD55dad96e324086d28b5d49e38bca6a6ea
SHA1caf51e8150d2b55004f531f90503b59b271156bf
SHA256c9c6e4e66bb7618354883874097271af9e42352a057d8577a9a702807c478150
SHA5120196cb6ab816c95ad3240335565c4809b37c89e9294b9a1c3d78af5320047a43b3c4d45196d439fbd955ad824b30f6c1580757892536a6adc854f949ddaa4374
-
Filesize
1.1MB
MD5118c05280dcd14b661e26e548da209cf
SHA1354324378890aa4bdb4ea2aaeaa055b9c48cb321
SHA2565a969a43307eb00fbe5f7166d1de10762050d9709700c68fdc2ec9ff61284e47
SHA512f10ae138ea95d2cc4ca74512b4d30c0c36eda53280df9b501b8f60cb53e2aedf521c234d2182cd02ba59a9b851b9b70dfcd9473f5d3cf9f4b50b7285ab1951fb
-
Filesize
1.8MB
MD5dc055f00148e6bdf3dfb821a495e7456
SHA1d2a72cb1d50ba76e2dff13bdc81e11d2631efe25
SHA256c24f9d80e670d4169c613e292077e9c00ec2eecb21dac08f4fc60be23883b16d
SHA5125495a7d7ea9492fb06da64593fed1ddd99d0acbd0d248f1ece11abe5fea77f340c6f9014ef0fb2a4ede89f527e45b894d08f409f16f55c9b742b7f275e4f6606