Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 01:00
Static task
static1
Behavioral task
behavioral1
Sample
e303d2c3cc5b64067ae5b2d5901712f4ea45dfc7cb9b077329934a936ef0b770.exe
Resource
win10v2004-20240611-en
General
-
Target
e303d2c3cc5b64067ae5b2d5901712f4ea45dfc7cb9b077329934a936ef0b770.exe
-
Size
1.8MB
-
MD5
a2d097eb8d28f2d5c1b1cdbec83220f4
-
SHA1
3bb1449483a2c97ff759d51059be98c71d1bb6b5
-
SHA256
e303d2c3cc5b64067ae5b2d5901712f4ea45dfc7cb9b077329934a936ef0b770
-
SHA512
55faec6aec40afa092cd904ae0ddd361d023a7232b37e4e0d7e5f4ffecebbb166e0d3127add2885cb1650de45d8ac2923e8521361fe7ec9c22434e3ed6f8a0d9
-
SSDEEP
49152:PLos/o9N1nYGWxojwYiJ+vdUz643UU7DhVxxRBmQN:Toh1nCozvdUzD3ddVPRBmQ
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
risepro
77.91.77.66:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9b87256fdb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0d12de27bd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e303d2c3cc5b64067ae5b2d5901712f4ea45dfc7cb9b077329934a936ef0b770.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e303d2c3cc5b64067ae5b2d5901712f4ea45dfc7cb9b077329934a936ef0b770.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e303d2c3cc5b64067ae5b2d5901712f4ea45dfc7cb9b077329934a936ef0b770.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9b87256fdb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0d12de27bd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9b87256fdb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0d12de27bd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation e303d2c3cc5b64067ae5b2d5901712f4ea45dfc7cb9b077329934a936ef0b770.exe Key value queried \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation explortu.exe Key value queried \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation 0d12de27bd.exe -
Executes dropped EXE 7 IoCs
pid Process 4772 explortu.exe 3612 explortu.exe 4568 explortu.exe 3816 9b87256fdb.exe 1720 0d12de27bd.exe 5496 explortu.exe 4332 explortu.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Wine 9b87256fdb.exe Key opened \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Wine 0d12de27bd.exe Key opened \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Wine e303d2c3cc5b64067ae5b2d5901712f4ea45dfc7cb9b077329934a936ef0b770.exe Key opened \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Software\Wine explortu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9b87256fdb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000016001\\9b87256fdb.exe" explortu.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1720-155-0x00000000002F0000-0x0000000000839000-memory.dmp autoit_exe behavioral1/memory/1720-182-0x00000000002F0000-0x0000000000839000-memory.dmp autoit_exe behavioral1/memory/1720-189-0x00000000002F0000-0x0000000000839000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 1380 e303d2c3cc5b64067ae5b2d5901712f4ea45dfc7cb9b077329934a936ef0b770.exe 4772 explortu.exe 3612 explortu.exe 4568 explortu.exe 3816 9b87256fdb.exe 1720 0d12de27bd.exe 5496 explortu.exe 4332 explortu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4772 set thread context of 3612 4772 explortu.exe 99 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explortu.job e303d2c3cc5b64067ae5b2d5901712f4ea45dfc7cb9b077329934a936ef0b770.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133636644724313071" chrome.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1380 e303d2c3cc5b64067ae5b2d5901712f4ea45dfc7cb9b077329934a936ef0b770.exe 1380 e303d2c3cc5b64067ae5b2d5901712f4ea45dfc7cb9b077329934a936ef0b770.exe 4772 explortu.exe 4772 explortu.exe 3612 explortu.exe 3612 explortu.exe 4568 explortu.exe 4568 explortu.exe 3816 9b87256fdb.exe 3816 9b87256fdb.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 5060 chrome.exe 5060 chrome.exe 5496 explortu.exe 5496 explortu.exe 4332 explortu.exe 4332 explortu.exe 4816 chrome.exe 4816 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe Token: SeShutdownPrivilege 5060 chrome.exe Token: SeCreatePagefilePrivilege 5060 chrome.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 1720 0d12de27bd.exe 1720 0d12de27bd.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 1720 0d12de27bd.exe 5060 chrome.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 5060 chrome.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe -
Suspicious use of SendNotifyMessage 60 IoCs
pid Process 1720 0d12de27bd.exe 1720 0d12de27bd.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 5060 chrome.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe 1720 0d12de27bd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1380 wrote to memory of 4772 1380 e303d2c3cc5b64067ae5b2d5901712f4ea45dfc7cb9b077329934a936ef0b770.exe 93 PID 1380 wrote to memory of 4772 1380 e303d2c3cc5b64067ae5b2d5901712f4ea45dfc7cb9b077329934a936ef0b770.exe 93 PID 1380 wrote to memory of 4772 1380 e303d2c3cc5b64067ae5b2d5901712f4ea45dfc7cb9b077329934a936ef0b770.exe 93 PID 4772 wrote to memory of 3612 4772 explortu.exe 99 PID 4772 wrote to memory of 3612 4772 explortu.exe 99 PID 4772 wrote to memory of 3612 4772 explortu.exe 99 PID 4772 wrote to memory of 3612 4772 explortu.exe 99 PID 4772 wrote to memory of 3612 4772 explortu.exe 99 PID 4772 wrote to memory of 3612 4772 explortu.exe 99 PID 4772 wrote to memory of 3612 4772 explortu.exe 99 PID 4772 wrote to memory of 3612 4772 explortu.exe 99 PID 4772 wrote to memory of 3612 4772 explortu.exe 99 PID 4772 wrote to memory of 3612 4772 explortu.exe 99 PID 4772 wrote to memory of 3612 4772 explortu.exe 99 PID 4772 wrote to memory of 3612 4772 explortu.exe 99 PID 4772 wrote to memory of 3816 4772 explortu.exe 103 PID 4772 wrote to memory of 3816 4772 explortu.exe 103 PID 4772 wrote to memory of 3816 4772 explortu.exe 103 PID 4772 wrote to memory of 1720 4772 explortu.exe 105 PID 4772 wrote to memory of 1720 4772 explortu.exe 105 PID 4772 wrote to memory of 1720 4772 explortu.exe 105 PID 1720 wrote to memory of 5060 1720 0d12de27bd.exe 106 PID 1720 wrote to memory of 5060 1720 0d12de27bd.exe 106 PID 5060 wrote to memory of 2476 5060 chrome.exe 108 PID 5060 wrote to memory of 2476 5060 chrome.exe 108 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 4388 5060 chrome.exe 109 PID 5060 wrote to memory of 992 5060 chrome.exe 110 PID 5060 wrote to memory of 992 5060 chrome.exe 110 PID 5060 wrote to memory of 5124 5060 chrome.exe 111 PID 5060 wrote to memory of 5124 5060 chrome.exe 111 PID 5060 wrote to memory of 5124 5060 chrome.exe 111 PID 5060 wrote to memory of 5124 5060 chrome.exe 111 PID 5060 wrote to memory of 5124 5060 chrome.exe 111 PID 5060 wrote to memory of 5124 5060 chrome.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\e303d2c3cc5b64067ae5b2d5901712f4ea45dfc7cb9b077329934a936ef0b770.exe"C:\Users\Admin\AppData\Local\Temp\e303d2c3cc5b64067ae5b2d5901712f4ea45dfc7cb9b077329934a936ef0b770.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3612
-
-
C:\Users\Admin\AppData\Local\Temp\1000016001\9b87256fdb.exe"C:\Users\Admin\AppData\Local\Temp\1000016001\9b87256fdb.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3816
-
-
C:\Users\Admin\AppData\Local\Temp\1000017001\0d12de27bd.exe"C:\Users\Admin\AppData\Local\Temp\1000017001\0d12de27bd.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffe405ab58,0x7fffe405ab68,0x7fffe405ab785⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 --field-trial-handle=1932,i,2322480396698526239,15902935995335471332,131072 /prefetch:25⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 --field-trial-handle=1932,i,2322480396698526239,15902935995335471332,131072 /prefetch:85⤵PID:992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2256 --field-trial-handle=1932,i,2322480396698526239,15902935995335471332,131072 /prefetch:85⤵PID:5124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3136 --field-trial-handle=1932,i,2322480396698526239,15902935995335471332,131072 /prefetch:15⤵PID:5224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3164 --field-trial-handle=1932,i,2322480396698526239,15902935995335471332,131072 /prefetch:15⤵PID:5252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4408 --field-trial-handle=1932,i,2322480396698526239,15902935995335471332,131072 /prefetch:15⤵PID:5648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4540 --field-trial-handle=1932,i,2322480396698526239,15902935995335471332,131072 /prefetch:85⤵PID:5880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3524 --field-trial-handle=1932,i,2322480396698526239,15902935995335471332,131072 /prefetch:85⤵PID:5956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4752 --field-trial-handle=1932,i,2322480396698526239,15902935995335471332,131072 /prefetch:85⤵PID:5972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2416 --field-trial-handle=1932,i,2322480396698526239,15902935995335471332,131072 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4084,i,10925946972013221578,8820669985803190952,262144 --variations-seed-version --mojo-platform-channel-handle=3928 /prefetch:81⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5312
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5496
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD55f02d5c993fce135fed791a777420fd4
SHA144c629ed4d9da6668661f10ccf1fd01f3bc22cba
SHA256922add3137191d9b2a720ad5b82a93bbec5b358df4c0f994044f5d398a93344d
SHA512ad431ce0e16755b635ea3a8d3d8ec31459a377cf0996b5db8c6d19b79b9a00199108902516f6c0382e0a59946c1765c1735608e73782ed9416db1eef8c419d4f
-
Filesize
2KB
MD5f01dc9dffa442b0e3cce8e43e80f75dc
SHA1a56507d3a8e88d5d51c546f58cd926bf56f311a3
SHA25603327b020aeffb7950687e75c51eda7811386dd50f7563690ad628027702cffd
SHA5126f1de544c7eea9e8fe6c106c9025d2c5ff556918c9451e87315a1247aeae7cb8a1648bc07f47fb506e0b54f1ab424b261d60a1ae857a9807c1d19e15d0749343
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD5dc66b3002a3036b80e444f34865eacab
SHA194bbbc10d25bd953dce388042fbbda0688700817
SHA2566913b40ac82951826424320dfc2c0543374a28d95acca0dc1103ea8fc1db3b56
SHA512de39146d9cec7d32c773c0201c89f93211043c66cd7eb1de5813f65929de3f3f57d454ddb0443443bfb6ba6b5e44a11af6a8ad0b3dc3044d5db610573a4f58df
-
Filesize
7KB
MD5ba30a27d545573b32bd0ec3a36c3093f
SHA15ff79d21e01f285cdb376ef253f63b1734ca285d
SHA2563993e8a478ad86128a93abc398e025c355f59e033678852eb2f9e8c367da92a5
SHA51247d4c5b3e716fcd01c0e5808d70a2bae3d7ac8c070447a9a12cd8fbc15655a222f6309894360fb3dbafe9a91c7394d2deed36a8df0cc90d3585f2c6a8de2c3cb
-
Filesize
16KB
MD52ded5194cda7be629f939fa2107280c8
SHA19a961c3efa37aa28f75a918a1a9197517a5f44a7
SHA2560dd6a1f92283110dc9ffc7596fd9e2c90fcc73e9ef4bbe9dbe571366857d6e73
SHA512ad0c751e289d3bdf2ba550c6366206391a0ddafccdc287ecdd0c8adcafc03f213b5ddcd6dc6b8943127563cdfb4acadaeb4e58a834970ff56fc92dc6357d7db8
-
Filesize
279KB
MD5f0bf81916e3bcad69de03800e8fd2fd0
SHA18623994115e156953dc99afc01be429799fc4cac
SHA256bcf9a6c442d0cc019d1c50615b6f4015b1d22bff4947deb4bb03b55f067c4b1f
SHA512ca583f31383f7d86a044815eb9d309493956707dd48bb006b32c7533cd24f84a643734d7bb1e296937c1a5a7451dcb32fdeec02c4e95b766465fffe41f411c66
-
Filesize
2.3MB
MD521a7795d5e104aa467feff97c1101232
SHA11e260bed535310421776e546a93b8af866eedbb4
SHA2567fc8460e46b1f7c4ae95d5a16a296039ef598abec1765d9e4ee9377af7ab8c65
SHA5123976db87fffc2bad13b2f485ddd8970092a03e17d68336451bfee558b3dded2e2db91c5a47916fef9f0aaa3128f1c2801d024bd0928f10c8d4a2bd939855cc31
-
Filesize
2.2MB
MD5783d2e1bd21598ace9f11de6a48a87a5
SHA1ebc95ad120a60fa2008336f92c9d4176a4129e89
SHA256e8e886949270adc21171f3da304ce0fd4374ad184af9f72dc63d1bcced3b0bbe
SHA5124fe1e1c40337006349d3c1773c585fe5c7276638f4ee126b1b4f59f79ee9bc0fd3544b7707617d57ed6418a9606bf3e5808c2f8dd20e39bddd1ccf348509a700
-
Filesize
1.8MB
MD5a2d097eb8d28f2d5c1b1cdbec83220f4
SHA13bb1449483a2c97ff759d51059be98c71d1bb6b5
SHA256e303d2c3cc5b64067ae5b2d5901712f4ea45dfc7cb9b077329934a936ef0b770
SHA51255faec6aec40afa092cd904ae0ddd361d023a7232b37e4e0d7e5f4ffecebbb166e0d3127add2885cb1650de45d8ac2923e8521361fe7ec9c22434e3ed6f8a0d9