Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 07:49
Static task
static1
Behavioral task
behavioral1
Sample
1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe
Resource
win10v2004-20240508-en
General
-
Target
1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe
-
Size
1.8MB
-
MD5
aded0ea77937d828064a3bc9f571b17e
-
SHA1
84b4d02c22bc1fc40c547bfa99781ff17cc9a0bd
-
SHA256
1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089
-
SHA512
bb95f4f76b6524c0aba46c1d047b0905e5c71cea54285b263514012e7289c4230f5f4d81f332168dc7accab3166c9b97c175585d387fbd46bb68bdd1b254d835
-
SSDEEP
24576:4ZuaWDCrQcQ9mLYIm1GFaLi83AQq5HD7PGSXKhlFsd51mfjeLqcHC8/d2+egm:MuaWDvY0GFEi8wQqN7PP6jFK/H/Ijgm
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
risepro
77.91.77.66:58709
Extracted
stealc
default
http://85.28.47.4
-
url_path
/920475a59bac849d.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ abfd42ad88.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1f1b5e3a60.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1f1b5e3a60.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1f1b5e3a60.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion abfd42ad88.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion abfd42ad88.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation explortu.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 1f1b5e3a60.exe -
Executes dropped EXE 6 IoCs
pid Process 3636 explortu.exe 3156 abfd42ad88.exe 3792 1f1b5e3a60.exe 2156 num.exe 2284 explortu.exe 316 explortu.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine 1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine abfd42ad88.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine 1f1b5e3a60.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine explortu.exe -
Loads dropped DLL 2 IoCs
pid Process 2156 num.exe 2156 num.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\abfd42ad88.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000016001\\abfd42ad88.exe" explortu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/3792-198-0x0000000000010000-0x000000000055E000-memory.dmp autoit_exe behavioral1/memory/3792-226-0x0000000000010000-0x000000000055E000-memory.dmp autoit_exe behavioral1/memory/3792-234-0x0000000000010000-0x000000000055E000-memory.dmp autoit_exe behavioral1/memory/3792-235-0x0000000000010000-0x000000000055E000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4824 1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe 3636 explortu.exe 3156 abfd42ad88.exe 3792 1f1b5e3a60.exe 2156 num.exe 2156 num.exe 2284 explortu.exe 316 explortu.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explortu.job 1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 num.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString num.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133637753707508609" chrome.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4824 1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe 4824 1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe 3636 explortu.exe 3636 explortu.exe 3156 abfd42ad88.exe 3156 abfd42ad88.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 2956 chrome.exe 2956 chrome.exe 2156 num.exe 2156 num.exe 2156 num.exe 2156 num.exe 2284 explortu.exe 2284 explortu.exe 316 explortu.exe 316 explortu.exe 5076 chrome.exe 5076 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe Token: SeShutdownPrivilege 2956 chrome.exe Token: SeCreatePagefilePrivilege 2956 chrome.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 3792 1f1b5e3a60.exe 2956 chrome.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe -
Suspicious use of SendNotifyMessage 60 IoCs
pid Process 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 2956 chrome.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe 3792 1f1b5e3a60.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2156 num.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4824 wrote to memory of 3636 4824 1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe 81 PID 4824 wrote to memory of 3636 4824 1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe 81 PID 4824 wrote to memory of 3636 4824 1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe 81 PID 3636 wrote to memory of 3364 3636 explortu.exe 86 PID 3636 wrote to memory of 3364 3636 explortu.exe 86 PID 3636 wrote to memory of 3364 3636 explortu.exe 86 PID 3636 wrote to memory of 3156 3636 explortu.exe 88 PID 3636 wrote to memory of 3156 3636 explortu.exe 88 PID 3636 wrote to memory of 3156 3636 explortu.exe 88 PID 3636 wrote to memory of 3792 3636 explortu.exe 90 PID 3636 wrote to memory of 3792 3636 explortu.exe 90 PID 3636 wrote to memory of 3792 3636 explortu.exe 90 PID 3792 wrote to memory of 2956 3792 1f1b5e3a60.exe 92 PID 3792 wrote to memory of 2956 3792 1f1b5e3a60.exe 92 PID 2956 wrote to memory of 2548 2956 chrome.exe 94 PID 2956 wrote to memory of 2548 2956 chrome.exe 94 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 4256 2956 chrome.exe 95 PID 2956 wrote to memory of 2556 2956 chrome.exe 96 PID 2956 wrote to memory of 2556 2956 chrome.exe 96 PID 2956 wrote to memory of 2844 2956 chrome.exe 97 PID 2956 wrote to memory of 2844 2956 chrome.exe 97 PID 2956 wrote to memory of 2844 2956 chrome.exe 97 PID 2956 wrote to memory of 2844 2956 chrome.exe 97 PID 2956 wrote to memory of 2844 2956 chrome.exe 97 PID 2956 wrote to memory of 2844 2956 chrome.exe 97 PID 2956 wrote to memory of 2844 2956 chrome.exe 97 PID 2956 wrote to memory of 2844 2956 chrome.exe 97 PID 2956 wrote to memory of 2844 2956 chrome.exe 97 PID 2956 wrote to memory of 2844 2956 chrome.exe 97 PID 2956 wrote to memory of 2844 2956 chrome.exe 97 PID 2956 wrote to memory of 2844 2956 chrome.exe 97 PID 2956 wrote to memory of 2844 2956 chrome.exe 97 PID 2956 wrote to memory of 2844 2956 chrome.exe 97 PID 2956 wrote to memory of 2844 2956 chrome.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe"C:\Users\Admin\AppData\Local\Temp\1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵PID:3364
-
-
C:\Users\Admin\AppData\Local\Temp\1000016001\abfd42ad88.exe"C:\Users\Admin\AppData\Local\Temp\1000016001\abfd42ad88.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
-
C:\Users\Admin\AppData\Local\Temp\1000017001\1f1b5e3a60.exe"C:\Users\Admin\AppData\Local\Temp\1000017001\1f1b5e3a60.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffccbdbab58,0x7ffccbdbab68,0x7ffccbdbab785⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1724 --field-trial-handle=1856,i,15062175322248157108,4752346308515740050,131072 /prefetch:25⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1856,i,15062175322248157108,4752346308515740050,131072 /prefetch:85⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2188 --field-trial-handle=1856,i,15062175322248157108,4752346308515740050,131072 /prefetch:85⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1856,i,15062175322248157108,4752346308515740050,131072 /prefetch:15⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3092 --field-trial-handle=1856,i,15062175322248157108,4752346308515740050,131072 /prefetch:15⤵PID:3292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4260 --field-trial-handle=1856,i,15062175322248157108,4752346308515740050,131072 /prefetch:15⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3084 --field-trial-handle=1856,i,15062175322248157108,4752346308515740050,131072 /prefetch:85⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4548 --field-trial-handle=1856,i,15062175322248157108,4752346308515740050,131072 /prefetch:85⤵PID:3260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4560 --field-trial-handle=1856,i,15062175322248157108,4752346308515740050,131072 /prefetch:85⤵PID:3212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2676 --field-trial-handle=1856,i,15062175322248157108,4752346308515740050,131072 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000020001\num.exe"C:\Users\Admin\AppData\Local\Temp\1000020001\num.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2156
-
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2284
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
216B
MD5031bb1b2cda117024bb2223c17f96f94
SHA1e67cd81dc113c2dc132f383d83bff0b921f1a4d4
SHA2561c5510381ef4b5a6ba79e35b3212d9d3f4e93c03e4dc3ea41bf7663783936995
SHA512df1a6e130cc1e31fad66b3084a8f9a9bb877317518827144e195910624cc91c4b2b8f92718951afc562ca94f9e8f0e61e243080254418689584207e25ded6041
-
Filesize
2KB
MD50f60044147142c32aec2d9e9769dca05
SHA1e2693c9fcb4cf6c96f34244a626c16e8b5ea5060
SHA2569e1b9871f0bdca7c12d29b9278e6a645f57b5420872246720edd5cdef52f9a51
SHA512fc24928f0f0ab26f490e5956c75d5b5213381a681b39d5ff9c0d0096e7e67eceb4bb589291450cb6669fabca4785513cede9319ffcd6f648d7ebb29576701eca
-
Filesize
2KB
MD539fd47147b5785bbc7e7f93f314a9315
SHA1917a47bc63f3eec066338d2a5c395575e61e1745
SHA256be0354ad0c33ef22e9feaef9fc1e16d95f98a2c4e7f6589f943e53db047cf2f6
SHA51257660cb0c6dd53f0a0c3c5a8048a9efdb67025a1ca888de5a6a6bd2053c8348d215289c1870aa5c130d7489ef566e0f7dde882e8c4ecf88ab6f4e464b7b18510
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD5c87cb7681f42d8e1da085c240db6e82e
SHA16f9f2794948be25b5c337832120191524b628ca1
SHA2566833de7f31b93f694012132e062130c23673d2ab62326a4578105d4a84335aa7
SHA5126441e4c7770e65fb7afebdd9c20497892d76603f6e88c75d4e17eaaeb13a14f0b164c16da0b4019d8ccdf84b1998e6c64a0b7845f3faceceb1abd57ee4e1bd04
-
Filesize
7KB
MD51ffa68b105e1824939d90c43f8df9b4c
SHA1e500e708bf1b527c681b4cfdcfce0d5633fd968a
SHA256556eccc1fd402c615d1a8abcba6bbd58578763f6f0be11ec7e08f62b9a1be1fe
SHA512d2ff68776f9a3a3a688060ccf35c859ed3f480881fc7a9a9dc8e503a7c84d05d0dcfc19fdccc18b5c85b7bc9966b2338d43afd195eeea9540f2150829c96a07e
-
Filesize
16KB
MD58de8057b398529fbedcea01817743c72
SHA17fbd6381a8205df9fda478de0f1a1b351fc363ff
SHA25677e431c03f1ed7dbf67920815629f2e0822560f87ebca7ecacf35dc63f5e9036
SHA512091b7c10cded5c40221c95441f9501dbcca6d6e5a58f58dee1d09a63d865571ee67bed31492d44926971cc0d8d6433147a43340515474cdb96a9ad5638195f2a
-
Filesize
272KB
MD56fbc78351222ba6dcd788e4c9586c8fe
SHA1b499429a36460f170488501906ed7aeb3592f45a
SHA256b0b195e1eec166fbb35a6690a8136eac117d4b2c593e01df196d0e9e6dcf368f
SHA512d97372ca0214a4e4304dba8f20e3f515f40383b03dade34c6a1826a84b6ce3d632a334eb4c7dd3a63bd69df01997e592f0fe4936db0ea9ec8e2e57279b622259
-
Filesize
2.3MB
MD5045525cf53d5d0ca74784e9a5d51066a
SHA1a20672e35bc028d18f44d2b0b5cba753c55a2143
SHA2568db28ae04a8e6f3daeb956527165369c3411fcede7a2eefb686754203a53becd
SHA512244a5816ea0aab7d49e93f0f3721466fdae565bedd3dd6a2bf06059e665cb1206fe9226b030ccb365e0801dd6624b9167ced91e894f9136785a4fca54414d1c1
-
Filesize
2.3MB
MD583a0c98ee5d11719c57bf474a5b7a47b
SHA1a057d921b14012061c36e0a7eeba5f2d7a7c8147
SHA2563023b41b4d3a47b962c555b3c92699888cb25abdb54df09cf71ae57c2fa847f3
SHA51241a2c9486bc65bb140bc3a399f26dc110bd1b57553589d1681d56b9b585e63bed91e3c36d96a1add2b0eeb7eb22bb82cde0a833bd351b0978e42df78fe9b8471
-
Filesize
2.4MB
MD526a77a61fb964d82c815da952ebedb23
SHA18d9100fcc2e55df7c20954d459c1a6c5861228a1
SHA2562e1662bc8b93a8cea652f916afa628ce5646e3b62d15cf584188f7df066dca73
SHA512793a6dcd9d3eae88b25a24895f0cf2b23060e8b59788b0bbf357a8fd7df0f536301912dcdd8c2ccf08313f89322a350c5bbc0bdce08a44bedd862cf8d421ab9a
-
Filesize
1.8MB
MD5aded0ea77937d828064a3bc9f571b17e
SHA184b4d02c22bc1fc40c547bfa99781ff17cc9a0bd
SHA2561b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089
SHA512bb95f4f76b6524c0aba46c1d047b0905e5c71cea54285b263514012e7289c4230f5f4d81f332168dc7accab3166c9b97c175585d387fbd46bb68bdd1b254d835