Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-06-2024 08:53
Static task
static1
Behavioral task
behavioral1
Sample
cba553f0592bc873c466c947d2c73117862811183c49807ceb7ed8c4101ab4fc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
cba553f0592bc873c466c947d2c73117862811183c49807ceb7ed8c4101ab4fc.exe
Resource
win11-20240611-en
General
-
Target
cba553f0592bc873c466c947d2c73117862811183c49807ceb7ed8c4101ab4fc.exe
-
Size
1.8MB
-
MD5
1f74c5bc020be64593b9d846005fab2f
-
SHA1
d20742d8eaeec9cd73f7a3c896a8178e6001e7e7
-
SHA256
cba553f0592bc873c466c947d2c73117862811183c49807ceb7ed8c4101ab4fc
-
SHA512
a70b778b532c96c01c08523496491f29fd8006274b53d93351683a816865f7d44c465dc21303de66c5709b5a770a49d78b1d5eb4d286470d854f305656b5184e
-
SSDEEP
24576:RLQq4LuGg+NoHMlY+zH3QpmGZjhqbVwStecAMxL8UCkdAN2Z+BqCdrwnQJtlED:9kNTl/1saVjHvdKlqomi2
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
risepro
147.45.47.126:58709
Extracted
amadey
8254624243
e76b71
http://77.91.77.81
-
install_dir
8254624243
-
install_file
axplong.exe
-
strings_key
90049e51fabf09df0d6748e0b271922e
-
url_paths
/Kiru9gu/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cba553f0592bc873c466c947d2c73117862811183c49807ceb7ed8c4101ab4fc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8e9578b405.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cba553f0592bc873c466c947d2c73117862811183c49807ceb7ed8c4101ab4fc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8e9578b405.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8e9578b405.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cba553f0592bc873c466c947d2c73117862811183c49807ceb7ed8c4101ab4fc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation cba553f0592bc873c466c947d2c73117862811183c49807ceb7ed8c4101ab4fc.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation explortu.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 8e9578b405.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation e1b62a4aed.exe -
Executes dropped EXE 10 IoCs
pid Process 3956 explortu.exe 1996 explortu.exe 1216 8e9578b405.exe 1480 3d0d938a0b.exe 2768 axplong.exe 2328 e1b62a4aed.exe 3188 explortu.exe 1828 axplong.exe 5916 axplong.exe 5868 explortu.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine cba553f0592bc873c466c947d2c73117862811183c49807ceb7ed8c4101ab4fc.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine 8e9578b405.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3d0d938a0b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000016001\\3d0d938a0b.exe" explortu.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000700000002360e-87.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 36 IoCs
pid Process 4548 cba553f0592bc873c466c947d2c73117862811183c49807ceb7ed8c4101ab4fc.exe 3956 explortu.exe 1216 8e9578b405.exe 2768 axplong.exe 1996 explortu.exe 1480 3d0d938a0b.exe 1996 explortu.exe 1480 3d0d938a0b.exe 1996 explortu.exe 1480 3d0d938a0b.exe 1996 explortu.exe 1480 3d0d938a0b.exe 1996 explortu.exe 1480 3d0d938a0b.exe 3188 explortu.exe 1828 axplong.exe 1996 explortu.exe 1480 3d0d938a0b.exe 1996 explortu.exe 1480 3d0d938a0b.exe 1996 explortu.exe 1480 3d0d938a0b.exe 1996 explortu.exe 1480 3d0d938a0b.exe 1996 explortu.exe 1480 3d0d938a0b.exe 1996 explortu.exe 1480 3d0d938a0b.exe 5868 explortu.exe 5916 axplong.exe 1996 explortu.exe 1480 3d0d938a0b.exe 1996 explortu.exe 1480 3d0d938a0b.exe 1996 explortu.exe 1480 3d0d938a0b.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3956 set thread context of 1996 3956 explortu.exe 96 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\explortu.job cba553f0592bc873c466c947d2c73117862811183c49807ceb7ed8c4101ab4fc.exe File created C:\Windows\Tasks\axplong.job 8e9578b405.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133632608020262188" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1181767204-2009306918-3718769404-1000\{785323AF-A61B-40F7-A3AC-CCA6B01DFE6A} chrome.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4548 cba553f0592bc873c466c947d2c73117862811183c49807ceb7ed8c4101ab4fc.exe 4548 cba553f0592bc873c466c947d2c73117862811183c49807ceb7ed8c4101ab4fc.exe 3956 explortu.exe 3956 explortu.exe 1216 8e9578b405.exe 1216 8e9578b405.exe 2768 axplong.exe 2768 axplong.exe 376 chrome.exe 376 chrome.exe 3188 explortu.exe 3188 explortu.exe 1828 axplong.exe 1828 axplong.exe 5868 explortu.exe 5868 explortu.exe 5916 axplong.exe 5916 axplong.exe 5752 chrome.exe 5752 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe Token: SeShutdownPrivilege 376 chrome.exe Token: SeCreatePagefilePrivilege 376 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1216 8e9578b405.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 2328 e1b62a4aed.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 376 chrome.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe -
Suspicious use of SendNotifyMessage 60 IoCs
pid Process 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 2328 e1b62a4aed.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 376 chrome.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe 2328 e1b62a4aed.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1996 explortu.exe 1480 3d0d938a0b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4548 wrote to memory of 3956 4548 cba553f0592bc873c466c947d2c73117862811183c49807ceb7ed8c4101ab4fc.exe 92 PID 4548 wrote to memory of 3956 4548 cba553f0592bc873c466c947d2c73117862811183c49807ceb7ed8c4101ab4fc.exe 92 PID 4548 wrote to memory of 3956 4548 cba553f0592bc873c466c947d2c73117862811183c49807ceb7ed8c4101ab4fc.exe 92 PID 3956 wrote to memory of 1996 3956 explortu.exe 96 PID 3956 wrote to memory of 1996 3956 explortu.exe 96 PID 3956 wrote to memory of 1996 3956 explortu.exe 96 PID 3956 wrote to memory of 1996 3956 explortu.exe 96 PID 3956 wrote to memory of 1996 3956 explortu.exe 96 PID 3956 wrote to memory of 1996 3956 explortu.exe 96 PID 3956 wrote to memory of 1996 3956 explortu.exe 96 PID 3956 wrote to memory of 1996 3956 explortu.exe 96 PID 3956 wrote to memory of 1996 3956 explortu.exe 96 PID 3956 wrote to memory of 1996 3956 explortu.exe 96 PID 3956 wrote to memory of 1996 3956 explortu.exe 96 PID 3956 wrote to memory of 1996 3956 explortu.exe 96 PID 3956 wrote to memory of 1996 3956 explortu.exe 96 PID 3956 wrote to memory of 1216 3956 explortu.exe 100 PID 3956 wrote to memory of 1216 3956 explortu.exe 100 PID 3956 wrote to memory of 1216 3956 explortu.exe 100 PID 3956 wrote to memory of 1480 3956 explortu.exe 103 PID 3956 wrote to memory of 1480 3956 explortu.exe 103 PID 3956 wrote to memory of 1480 3956 explortu.exe 103 PID 1216 wrote to memory of 2768 1216 8e9578b405.exe 104 PID 1216 wrote to memory of 2768 1216 8e9578b405.exe 104 PID 1216 wrote to memory of 2768 1216 8e9578b405.exe 104 PID 3956 wrote to memory of 2328 3956 explortu.exe 105 PID 3956 wrote to memory of 2328 3956 explortu.exe 105 PID 3956 wrote to memory of 2328 3956 explortu.exe 105 PID 2328 wrote to memory of 376 2328 e1b62a4aed.exe 106 PID 2328 wrote to memory of 376 2328 e1b62a4aed.exe 106 PID 376 wrote to memory of 4240 376 chrome.exe 108 PID 376 wrote to memory of 4240 376 chrome.exe 108 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 396 376 chrome.exe 109 PID 376 wrote to memory of 748 376 chrome.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\cba553f0592bc873c466c947d2c73117862811183c49807ceb7ed8c4101ab4fc.exe"C:\Users\Admin\AppData\Local\Temp\cba553f0592bc873c466c947d2c73117862811183c49807ceb7ed8c4101ab4fc.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:1996
-
-
C:\Users\Admin\1000015002\8e9578b405.exe"C:\Users\Admin\1000015002\8e9578b405.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000016001\3d0d938a0b.exe"C:\Users\Admin\AppData\Local\Temp\1000016001\3d0d938a0b.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:1480
-
-
C:\Users\Admin\AppData\Local\Temp\1000017001\e1b62a4aed.exe"C:\Users\Admin\AppData\Local\Temp\1000017001\e1b62a4aed.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffcc29cab58,0x7ffcc29cab68,0x7ffcc29cab785⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 --field-trial-handle=1856,i,12771265870378996316,10197626197365891552,131072 /prefetch:25⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1856,i,12771265870378996316,10197626197365891552,131072 /prefetch:85⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2256 --field-trial-handle=1856,i,12771265870378996316,10197626197365891552,131072 /prefetch:85⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3116 --field-trial-handle=1856,i,12771265870378996316,10197626197365891552,131072 /prefetch:15⤵PID:1052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3124 --field-trial-handle=1856,i,12771265870378996316,10197626197365891552,131072 /prefetch:15⤵PID:5132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3940 --field-trial-handle=1856,i,12771265870378996316,10197626197365891552,131072 /prefetch:15⤵PID:5548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4224 --field-trial-handle=1856,i,12771265870378996316,10197626197365891552,131072 /prefetch:15⤵PID:5648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4672 --field-trial-handle=1856,i,12771265870378996316,10197626197365891552,131072 /prefetch:85⤵PID:5792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4460 --field-trial-handle=1856,i,12771265870378996316,10197626197365891552,131072 /prefetch:85⤵
- Modifies registry class
PID:5800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3300 --field-trial-handle=1856,i,12771265870378996316,10197626197365891552,131072 /prefetch:85⤵PID:6008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3340 --field-trial-handle=1856,i,12771265870378996316,10197626197365891552,131072 /prefetch:85⤵PID:6028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3332 --field-trial-handle=1856,i,12771265870378996316,10197626197365891552,131072 /prefetch:85⤵PID:6124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=584 --field-trial-handle=1856,i,12771265870378996316,10197626197365891552,131072 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:5752
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3988,i,18168883380598738769,14202261231630113808,262144 --variations-seed-version --mojo-platform-channel-handle=4300 /prefetch:81⤵PID:3868
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5300
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeC:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1828
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3188
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeC:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5916
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5e99899a83a65c110ade22ce6ab9209bb
SHA11b94c6591a41a961464019ba1b58933e81efdf81
SHA25618acc669afcf042645e8beadf99cc1fd87b3491cf384719300a7f794064240d3
SHA51231cf09e56eaeced3e43dd099956b0a18646991febe4fc5ef55635e06e22cb1d880d11ff9700644613c2300bf1ce34336a036e215104695a8ad25d0ddffb6bd12
-
Filesize
336B
MD5a7d38305f5b3bf9435385f8d1ade5b2a
SHA13bb623443ce7247b41b516fa0610090343f947f2
SHA256035322ae664520fa5819602aedd207510b7c5324a3c3ddc4cc728c44e7117b53
SHA512ff66955ed22ad85b12586431d1d4f6ef1e76f610ef919ad3d304675b70b6085508a4da432cfc78032b60b7ab34492ba27141d627517b0a5a82b319dd05850f9c
-
Filesize
2KB
MD5df117a32f02342e9d2ceafa683ca956a
SHA106a2cdd9ed543b6f0a23fe1bcac9af00edd87e0f
SHA256bad14f9a6b3364773537e0b59cf12b1a3c79dadb9ae04c1854daf311e43d977a
SHA512fbe8131d33a7b358a86335f787cd69cf1ee467e3affb8e00f073d75bea8f2f8b5d91b0e04fc0fa2e39966241464930ed5f96fefcfd9098ee8779f0a26570a22d
-
Filesize
2KB
MD52074bee9a8179bc38501f1fc2a9bed83
SHA15b6cd757494a7f68e1fdf74672a1afe2d0499ce1
SHA25698b236fc19b0ec580fa1cdd62d7b9bd9e716a68871cfbaea8de9297946c70e6b
SHA5121b6f8e91afb50039d14ce6333164920500c06d1b8e79a6a2d0c8f347618110db097f5664945315c1df0236cafd02faa6f37056fa4e609fc229d7a2abaa47cc76
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD55969552f9ae404bf6edd75f5aa2ebe2c
SHA14715e0c9246191555974a0d89035c545e250f759
SHA25649c08f818f0af56afcd43feb6243357d321677335bdf6e27bf4957f530b25cef
SHA512ab865af11babf57f1215989761d605bdabdb6c34a7e6299a098e0e3c5a782c92976222d9b34c6e9ba1d1929b4970818b8420e25067f7134708a3470a5517e80a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\efd8f6f7-bb81-4cf5-ad64-4bed844387f0.tmp
Filesize524B
MD54d392493e08ad43b9c0f58cdb29ec3b6
SHA146552ddcc19e8f00aa687b2e00358ee88f4cbfd0
SHA256343ad9b1a3fa943f4e3326dad1a6506c44a7884dd210db576170afa3ddf69e91
SHA512146dbb315e044c9f88b54521033f4a2048306533074b4b8b628923d328a6ef9137084258856f687f89bc7d269f2cce7484c4c5fc066bd6cb24c00e497582ea1e
-
Filesize
7KB
MD5c7a05a5768c8d7517ba2b76140bc8d07
SHA11d36234556db259729ea87a9905c20106cb84b52
SHA256744622e796961753ae81247d1773a0d3e5f1d21a45586c761f2ea7da7f64fa29
SHA5126e9630decccc644c610ab2ce1f104eb9694f483f8d2270fce7798596e1b13c1a22d32f93cd1abd8a5985d56262151d8a1fead477d991977fbab1cb98a416c1f6
-
Filesize
16KB
MD5faf9faaae72cc1b0a174d2342d5241bc
SHA10836315a6f14c8f3dbe467c3685152d871526b3f
SHA25686ee2b98e23949bed4ce392be267159b31fc3dc6cb4bfbcfd22814da88a50b79
SHA51220154d4b81bcd8666a7d40b8a38a52bffc942f940568a128325bc897bbaced15d7d990acd5e2715b971f3558e9c6db3fa003679b2b3f093a1d5545d5182e9321
-
Filesize
269KB
MD5e0b0cc0714e0fa42c0da38724785a226
SHA1e7c5264ee4555676e409180ce427a3727a26e214
SHA256f6c038269f71e592f76061e256d75863d26834112035db63e5bf7efda28dc7e4
SHA5125cb974ca5423fd26ec0c681889b46f541bf70f6a46fed05aef388b1b42f755797ec197eda7827994982ee36a61b72d769babd4f0e4e8d45a618cfac8a5add5ea
-
Filesize
1.3MB
MD52281e063c8c7053c23e2ed987c4ca07f
SHA1133d951e92c7809f44e8d64e8914a8bd0e65a957
SHA2564681a49ac033d089d416f604aadd4c8a85f58b89a481c35d207a22f29d305bfb
SHA512d493e6a7cf4496a1d5ea021000b4ac43d038a2697206f37f7728ebe4346390b348cd6d457e4a197b88042e50b31b2da78b02456a74d2564d235b3b6ba1e47ca1
-
Filesize
1.1MB
MD57be9782300da12d9ed2aa37f45d25152
SHA19bcf07dfe6bb3d2b17ad4b8fdc1f24c534cabe63
SHA256285e7b318613f30b5ec97e3aaf3ec5282963250672c70f8699b559cc3bc14c86
SHA51292aeefddb01e0883644b4a204839da877212efbdec32a6574133ff43fb22791e20fe0d2cf09cea8b545f14ac9a685634cc7e74cb9d36454c2e46b48559f607ce
-
Filesize
1.8MB
MD51f74c5bc020be64593b9d846005fab2f
SHA1d20742d8eaeec9cd73f7a3c896a8178e6001e7e7
SHA256cba553f0592bc873c466c947d2c73117862811183c49807ceb7ed8c4101ab4fc
SHA512a70b778b532c96c01c08523496491f29fd8006274b53d93351683a816865f7d44c465dc21303de66c5709b5a770a49d78b1d5eb4d286470d854f305656b5184e
-
Filesize
14B
MD5479533c7f2a532c9a0a6235463338a8d
SHA118e48801106a8050f217b8e4539b8644aaaa0c03
SHA25671d53367617b0751b25a908ba6dc8bc04bb1f810f586bc1bd330bb038b18afe9
SHA5127631e171a0ddc996797c8e5172d288eedb114790640d6ffe8cd46b50694631b14c054903f5ec6b1a1fe9e08f36df305116dbdf78915cbede1d99a6c896729dad