Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 05:00
Static task
static1
Behavioral task
behavioral1
Sample
c2801fdac6d49469b959c56e9642c08d7d3a628d59e254e4e0545e8ba0feb7e9.exe
Resource
win10v2004-20240611-en
General
-
Target
c2801fdac6d49469b959c56e9642c08d7d3a628d59e254e4e0545e8ba0feb7e9.exe
-
Size
1.8MB
-
MD5
008d0257b482aecba908044672385f3b
-
SHA1
15fc3638c4a90fe34c7772de535c27f1659fccf5
-
SHA256
c2801fdac6d49469b959c56e9642c08d7d3a628d59e254e4e0545e8ba0feb7e9
-
SHA512
4183b2ffe8744df9ae010db8ea36b29466827c211bcf485a2da6ce2ed3a0c831c8d24bd7670da0323a71302793fce4b3316e0f25b0f0597eaf796a90360246d5
-
SSDEEP
49152:mWFL6nYkIL1hXmoP1oREopBau/EUqrsb45FqW0URmcd5And5:NL4HIL1hXmyyEUZ45BRmcEn
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
risepro
77.91.77.66:58709
Extracted
stealc
default
http://85.28.47.4
-
url_path
/920475a59bac849d.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c2801fdac6d49469b959c56e9642c08d7d3a628d59e254e4e0545e8ba0feb7e9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2523c4a65f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d521dce802.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c2801fdac6d49469b959c56e9642c08d7d3a628d59e254e4e0545e8ba0feb7e9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d521dce802.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2523c4a65f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2523c4a65f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d521dce802.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c2801fdac6d49469b959c56e9642c08d7d3a628d59e254e4e0545e8ba0feb7e9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation explortu.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation d521dce802.exe Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation c2801fdac6d49469b959c56e9642c08d7d3a628d59e254e4e0545e8ba0feb7e9.exe -
Executes dropped EXE 7 IoCs
pid Process 4744 explortu.exe 1696 2523c4a65f.exe 752 d521dce802.exe 3776 num.exe 5204 explortu.exe 5508 explortu.exe 5268 explortu.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine c2801fdac6d49469b959c56e9642c08d7d3a628d59e254e4e0545e8ba0feb7e9.exe Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine 2523c4a65f.exe Key opened \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Software\Wine d521dce802.exe -
Loads dropped DLL 2 IoCs
pid Process 3776 num.exe 3776 num.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2523c4a65f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000016001\\2523c4a65f.exe" explortu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/752-190-0x00000000006D0000-0x0000000000C29000-memory.dmp autoit_exe behavioral1/memory/752-235-0x00000000006D0000-0x0000000000C29000-memory.dmp autoit_exe behavioral1/memory/752-241-0x00000000006D0000-0x0000000000C29000-memory.dmp autoit_exe behavioral1/memory/752-243-0x00000000006D0000-0x0000000000C29000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 632 c2801fdac6d49469b959c56e9642c08d7d3a628d59e254e4e0545e8ba0feb7e9.exe 4744 explortu.exe 1696 2523c4a65f.exe 752 d521dce802.exe 3776 num.exe 5204 explortu.exe 3776 num.exe 5508 explortu.exe 5268 explortu.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explortu.job c2801fdac6d49469b959c56e9642c08d7d3a628d59e254e4e0545e8ba0feb7e9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 num.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString num.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133637652585910384" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 632 c2801fdac6d49469b959c56e9642c08d7d3a628d59e254e4e0545e8ba0feb7e9.exe 632 c2801fdac6d49469b959c56e9642c08d7d3a628d59e254e4e0545e8ba0feb7e9.exe 4744 explortu.exe 4744 explortu.exe 1696 2523c4a65f.exe 1696 2523c4a65f.exe 752 d521dce802.exe 752 d521dce802.exe 4248 chrome.exe 4248 chrome.exe 3776 num.exe 3776 num.exe 5204 explortu.exe 5204 explortu.exe 3776 num.exe 3776 num.exe 5508 explortu.exe 5508 explortu.exe 5380 chrome.exe 5380 chrome.exe 5268 explortu.exe 5268 explortu.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe Token: SeShutdownPrivilege 4248 chrome.exe Token: SeCreatePagefilePrivilege 4248 chrome.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 752 d521dce802.exe 752 d521dce802.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 752 d521dce802.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 752 d521dce802.exe 4248 chrome.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe -
Suspicious use of SendNotifyMessage 60 IoCs
pid Process 752 d521dce802.exe 752 d521dce802.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 752 d521dce802.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 4248 chrome.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe 752 d521dce802.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3776 num.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 632 wrote to memory of 4744 632 c2801fdac6d49469b959c56e9642c08d7d3a628d59e254e4e0545e8ba0feb7e9.exe 85 PID 632 wrote to memory of 4744 632 c2801fdac6d49469b959c56e9642c08d7d3a628d59e254e4e0545e8ba0feb7e9.exe 85 PID 632 wrote to memory of 4744 632 c2801fdac6d49469b959c56e9642c08d7d3a628d59e254e4e0545e8ba0feb7e9.exe 85 PID 4744 wrote to memory of 4684 4744 explortu.exe 91 PID 4744 wrote to memory of 4684 4744 explortu.exe 91 PID 4744 wrote to memory of 4684 4744 explortu.exe 91 PID 4744 wrote to memory of 1696 4744 explortu.exe 92 PID 4744 wrote to memory of 1696 4744 explortu.exe 92 PID 4744 wrote to memory of 1696 4744 explortu.exe 92 PID 4744 wrote to memory of 752 4744 explortu.exe 94 PID 4744 wrote to memory of 752 4744 explortu.exe 94 PID 4744 wrote to memory of 752 4744 explortu.exe 94 PID 752 wrote to memory of 4248 752 d521dce802.exe 96 PID 752 wrote to memory of 4248 752 d521dce802.exe 96 PID 4248 wrote to memory of 2628 4248 chrome.exe 98 PID 4248 wrote to memory of 2628 4248 chrome.exe 98 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 4412 4248 chrome.exe 99 PID 4248 wrote to memory of 3388 4248 chrome.exe 100 PID 4248 wrote to memory of 3388 4248 chrome.exe 100 PID 4248 wrote to memory of 4440 4248 chrome.exe 101 PID 4248 wrote to memory of 4440 4248 chrome.exe 101 PID 4248 wrote to memory of 4440 4248 chrome.exe 101 PID 4248 wrote to memory of 4440 4248 chrome.exe 101 PID 4248 wrote to memory of 4440 4248 chrome.exe 101 PID 4248 wrote to memory of 4440 4248 chrome.exe 101 PID 4248 wrote to memory of 4440 4248 chrome.exe 101 PID 4248 wrote to memory of 4440 4248 chrome.exe 101 PID 4248 wrote to memory of 4440 4248 chrome.exe 101 PID 4248 wrote to memory of 4440 4248 chrome.exe 101 PID 4248 wrote to memory of 4440 4248 chrome.exe 101 PID 4248 wrote to memory of 4440 4248 chrome.exe 101 PID 4248 wrote to memory of 4440 4248 chrome.exe 101 PID 4248 wrote to memory of 4440 4248 chrome.exe 101 PID 4248 wrote to memory of 4440 4248 chrome.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2801fdac6d49469b959c56e9642c08d7d3a628d59e254e4e0545e8ba0feb7e9.exe"C:\Users\Admin\AppData\Local\Temp\c2801fdac6d49469b959c56e9642c08d7d3a628d59e254e4e0545e8ba0feb7e9.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\1000016001\2523c4a65f.exe"C:\Users\Admin\AppData\Local\Temp\1000016001\2523c4a65f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\1000017001\d521dce802.exe"C:\Users\Admin\AppData\Local\Temp\1000017001\d521dce802.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6fc9ab58,0x7ffa6fc9ab68,0x7ffa6fc9ab785⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1980,i,15755999572220690448,3432153982489402905,131072 /prefetch:25⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2072 --field-trial-handle=1980,i,15755999572220690448,3432153982489402905,131072 /prefetch:85⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2268 --field-trial-handle=1980,i,15755999572220690448,3432153982489402905,131072 /prefetch:85⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3084 --field-trial-handle=1980,i,15755999572220690448,3432153982489402905,131072 /prefetch:15⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3092 --field-trial-handle=1980,i,15755999572220690448,3432153982489402905,131072 /prefetch:15⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4352 --field-trial-handle=1980,i,15755999572220690448,3432153982489402905,131072 /prefetch:15⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3312 --field-trial-handle=1980,i,15755999572220690448,3432153982489402905,131072 /prefetch:85⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4656 --field-trial-handle=1980,i,15755999572220690448,3432153982489402905,131072 /prefetch:85⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4676 --field-trial-handle=1980,i,15755999572220690448,3432153982489402905,131072 /prefetch:85⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1900 --field-trial-handle=1980,i,15755999572220690448,3432153982489402905,131072 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:5380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000020001\num.exe"C:\Users\Admin\AppData\Local\Temp\1000020001\num.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3776
-
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5204
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5508
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
216B
MD51aa49d5a432dce6324f496f327492e4e
SHA133b0023fa692a7cac5b8c114f0af72d911c7925e
SHA2567019a4ea5731633ef882f81ad366819579514f92d3f629ebece0cf31d22240f7
SHA51223691e53a8ec34d9bfadb640f7106d5cf9f5db13b296ee793917166f8c1f6c4aee8cb9af926faa49af535526cf68ee9a7920baeb311f2d1be1e1a6ff128df2b8
-
Filesize
2KB
MD51c4570e53570e44940bd8895241a2958
SHA1b9d85c4992193f2bb50068f75e8db523129e8648
SHA256a300195465f1624ef3ae228f0d2b462793da3263ede765879d311c35c5885ccc
SHA512ff41de8ef64f964c643556d3f9994f165d3f1147a80785cf45fe0610fc1aeea3b296b06062060a5fc1228d98f7eccd7daccca30a21355244f9fa64c8dace70bc
-
Filesize
2KB
MD50c321e15eb4b29913fa0f163cd4a1a43
SHA125aa5ca4f50dfb326c176f85c69a2be88dacab84
SHA256c92a6abb6da33c4c40b23c147f0977ca59e14a3fd0b54459dec4be370daf45d0
SHA5125926e42635a8372cae25215b8e70f0d6ad04e05ff829304a7ebda05fec4c743a932be84b14ee014c8892e05db98f6c9e69ce0f33e6e2fe1c5faabe7d695369c5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD551997286c0965e91b31e83b64ff44c48
SHA140537ed7bfaea7d5a61cab5882688f8493503f0b
SHA256aba347b3772188819be0f5682df8655e859376a626bf12f5843b40f8eb8083ab
SHA5128d9e69d372216e3c9e8f583a98bbe91bdcdaf3c4c1b94d6ff34f27187f558b6a62852a2c4cadaa3d87676f7ff390967594d2747d81a34d955ad9be3e4f59d177
-
Filesize
7KB
MD5d236710081fc4697f397c24ed045fbb8
SHA1cabd3498a728ba2fc56b236a0e9aef0c85eccae8
SHA256b30d377ca1666099540eae2c2a98cff686ed63e645d569e1b0e46e12b7169d7a
SHA512c4f8ab30451862310e43b3303857e6f44a7c6853624d67e58df2505ef22f841541bba35cb9e08d4f1b44d49bf75c697624df7ab6e1d1958d83e896492596f7ec
-
Filesize
16KB
MD51819ab14d90f8f2b8c728f2eb9023fe0
SHA1cd1561324382c4314401c8e5ad3b0ae132e499ba
SHA2560d8d847644c65209468dd671af9fcd1366151394b3ba868300afdaef47e3ff0e
SHA5127017c391c3952af5b328719e3e6698179a7ca4ce2ecd656f53d0e37053eb7ce32792db61cb69858854da696a37ab48b6dc544d23a3701e9009b2ab14b410b173
-
Filesize
280KB
MD59c6be5c42d10028583cc8aa431b328ac
SHA1f6ab206d86a53b561cb909f29c3fc1c724838b89
SHA2569fe52c611e71866dc52c301d37b0c8beb6e0f86ce31c629dfef044fc7d8b3d77
SHA5129150466388f9b13cbcaf35bf99cbb70c002a73038e5d57d8822443fbd3ca93cfeaf3a0e6721e7b1751b920336b2b62c7c38ced1042dc6dc7cf4c55e6dd4c3344
-
Filesize
2.4MB
MD500072d93d706be1f20656d1fda4850a2
SHA10dbe64da685cb764db425b111a6286fbc26d0e5f
SHA256d8fe9b68fd5a35e2b8d45fdea730a8e5e0b507fa54a87615af66417f6eb4c0f6
SHA512c975fae999b52c3adc9222ed7799958235e87584c1a8c4f68d551b5a7df68addf607456956e771d90d68010819db327870d96ea4fcf3a178be74464738c7b4a6
-
Filesize
2.3MB
MD5ca83e611f4555e200b44875b082160b3
SHA1361efad33136bcd59e3bc122eb263909c516a24c
SHA2561f359a772a6471445164646fb645d172ee0ff5f33f67b400650335245ba696de
SHA51257c9806befa44508b78a2bd589119c458c4f063c31c29c384f2d1e5f2e24da14dc9f17a4ba8b9d52b3d1627311121c2640b06887b568e693c845f4c6a8791478
-
Filesize
2.4MB
MD526a77a61fb964d82c815da952ebedb23
SHA18d9100fcc2e55df7c20954d459c1a6c5861228a1
SHA2562e1662bc8b93a8cea652f916afa628ce5646e3b62d15cf584188f7df066dca73
SHA512793a6dcd9d3eae88b25a24895f0cf2b23060e8b59788b0bbf357a8fd7df0f536301912dcdd8c2ccf08313f89322a350c5bbc0bdce08a44bedd862cf8d421ab9a
-
Filesize
1.8MB
MD5008d0257b482aecba908044672385f3b
SHA115fc3638c4a90fe34c7772de535c27f1659fccf5
SHA256c2801fdac6d49469b959c56e9642c08d7d3a628d59e254e4e0545e8ba0feb7e9
SHA5124183b2ffe8744df9ae010db8ea36b29466827c211bcf485a2da6ce2ed3a0c831c8d24bd7670da0323a71302793fce4b3316e0f25b0f0597eaf796a90360246d5