Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/06/2024, 07:49
Static task
static1
Behavioral task
behavioral1
Sample
1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe
Resource
win10v2004-20240508-en
General
-
Target
1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe
-
Size
1.8MB
-
MD5
aded0ea77937d828064a3bc9f571b17e
-
SHA1
84b4d02c22bc1fc40c547bfa99781ff17cc9a0bd
-
SHA256
1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089
-
SHA512
bb95f4f76b6524c0aba46c1d047b0905e5c71cea54285b263514012e7289c4230f5f4d81f332168dc7accab3166c9b97c175585d387fbd46bb68bdd1b254d835
-
SSDEEP
24576:4ZuaWDCrQcQ9mLYIm1GFaLi83AQq5HD7PGSXKhlFsd51mfjeLqcHC8/d2+egm:MuaWDvY0GFEi8wQqN7PP6jFK/H/Ijgm
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
stealc
default
http://85.28.47.4
-
url_path
/920475a59bac849d.php
Extracted
risepro
77.91.77.66:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1f1b5e3a60.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8c8ba2bfa4.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1f1b5e3a60.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8c8ba2bfa4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1f1b5e3a60.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8c8ba2bfa4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe -
Executes dropped EXE 6 IoCs
pid Process 1776 explortu.exe 1808 1f1b5e3a60.exe 1116 8c8ba2bfa4.exe 2892 num.exe 2872 explortu.exe 4416 explortu.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Wine 1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Wine 1f1b5e3a60.exe Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Wine 8c8ba2bfa4.exe Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Wine explortu.exe -
Loads dropped DLL 2 IoCs
pid Process 2892 num.exe 2892 num.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Microsoft\Windows\CurrentVersion\Run\1f1b5e3a60.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000016001\\1f1b5e3a60.exe" explortu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1116-201-0x00000000005F0000-0x0000000000B3E000-memory.dmp autoit_exe behavioral2/memory/1116-229-0x00000000005F0000-0x0000000000B3E000-memory.dmp autoit_exe behavioral2/memory/1116-235-0x00000000005F0000-0x0000000000B3E000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4464 1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe 1776 explortu.exe 1808 1f1b5e3a60.exe 1116 8c8ba2bfa4.exe 2892 num.exe 2892 num.exe 2872 explortu.exe 4416 explortu.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explortu.job 1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 num.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString num.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133637753766556015" chrome.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4464 1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe 4464 1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe 1776 explortu.exe 1776 explortu.exe 1808 1f1b5e3a60.exe 1808 1f1b5e3a60.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 2832 chrome.exe 2832 chrome.exe 2892 num.exe 2892 num.exe 2892 num.exe 2892 num.exe 2872 explortu.exe 2872 explortu.exe 4416 explortu.exe 4416 explortu.exe 2292 chrome.exe 2292 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe Token: SeShutdownPrivilege 2832 chrome.exe Token: SeCreatePagefilePrivilege 2832 chrome.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 1116 8c8ba2bfa4.exe 2832 chrome.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 2832 chrome.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe 1116 8c8ba2bfa4.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2892 num.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4464 wrote to memory of 1776 4464 1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe 78 PID 4464 wrote to memory of 1776 4464 1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe 78 PID 4464 wrote to memory of 1776 4464 1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe 78 PID 1776 wrote to memory of 2068 1776 explortu.exe 79 PID 1776 wrote to memory of 2068 1776 explortu.exe 79 PID 1776 wrote to memory of 2068 1776 explortu.exe 79 PID 1776 wrote to memory of 1808 1776 explortu.exe 80 PID 1776 wrote to memory of 1808 1776 explortu.exe 80 PID 1776 wrote to memory of 1808 1776 explortu.exe 80 PID 1776 wrote to memory of 1116 1776 explortu.exe 81 PID 1776 wrote to memory of 1116 1776 explortu.exe 81 PID 1776 wrote to memory of 1116 1776 explortu.exe 81 PID 1116 wrote to memory of 2832 1116 8c8ba2bfa4.exe 82 PID 1116 wrote to memory of 2832 1116 8c8ba2bfa4.exe 82 PID 2832 wrote to memory of 3620 2832 chrome.exe 85 PID 2832 wrote to memory of 3620 2832 chrome.exe 85 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 4824 2832 chrome.exe 86 PID 2832 wrote to memory of 2896 2832 chrome.exe 87 PID 2832 wrote to memory of 2896 2832 chrome.exe 87 PID 2832 wrote to memory of 3956 2832 chrome.exe 88 PID 2832 wrote to memory of 3956 2832 chrome.exe 88 PID 2832 wrote to memory of 3956 2832 chrome.exe 88 PID 2832 wrote to memory of 3956 2832 chrome.exe 88 PID 2832 wrote to memory of 3956 2832 chrome.exe 88 PID 2832 wrote to memory of 3956 2832 chrome.exe 88 PID 2832 wrote to memory of 3956 2832 chrome.exe 88 PID 2832 wrote to memory of 3956 2832 chrome.exe 88 PID 2832 wrote to memory of 3956 2832 chrome.exe 88 PID 2832 wrote to memory of 3956 2832 chrome.exe 88 PID 2832 wrote to memory of 3956 2832 chrome.exe 88 PID 2832 wrote to memory of 3956 2832 chrome.exe 88 PID 2832 wrote to memory of 3956 2832 chrome.exe 88 PID 2832 wrote to memory of 3956 2832 chrome.exe 88 PID 2832 wrote to memory of 3956 2832 chrome.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe"C:\Users\Admin\AppData\Local\Temp\1b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\1000016001\1f1b5e3a60.exe"C:\Users\Admin\AppData\Local\Temp\1000016001\1f1b5e3a60.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\1000017001\8c8ba2bfa4.exe"C:\Users\Admin\AppData\Local\Temp\1000017001\8c8ba2bfa4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe6d29ab58,0x7ffe6d29ab68,0x7ffe6d29ab785⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1600,i,5023484370073860852,9785284479294585651,131072 /prefetch:25⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1912 --field-trial-handle=1600,i,5023484370073860852,9785284479294585651,131072 /prefetch:85⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2200 --field-trial-handle=1600,i,5023484370073860852,9785284479294585651,131072 /prefetch:85⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1600,i,5023484370073860852,9785284479294585651,131072 /prefetch:15⤵PID:3468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3200 --field-trial-handle=1600,i,5023484370073860852,9785284479294585651,131072 /prefetch:15⤵PID:2804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3820 --field-trial-handle=1600,i,5023484370073860852,9785284479294585651,131072 /prefetch:15⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4020 --field-trial-handle=1600,i,5023484370073860852,9785284479294585651,131072 /prefetch:85⤵PID:984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4048 --field-trial-handle=1600,i,5023484370073860852,9785284479294585651,131072 /prefetch:85⤵PID:3564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4356 --field-trial-handle=1600,i,5023484370073860852,9785284479294585651,131072 /prefetch:85⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1600,i,5023484370073860852,9785284479294585651,131072 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2292
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000020001\num.exe"C:\Users\Admin\AppData\Local\Temp\1000020001\num.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2892
-
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
216B
MD53db270dc25a66c1cedfd66b0cdd4ae12
SHA101052c343f717a0bd4f58263712162f8ed66ebcb
SHA256a0cf4f205c2e0c30bc4fd540849c3857a54cf737e840b0053c78ddc277b33c27
SHA512e79d890abba6b4d08d92e5a3a314f80ad68d920c0a0c2054e1726edf2c96b59fc1c8e5df79a6334f90bff002514e0fe81a9f560a619cfc02744c252ce3d01b17
-
Filesize
2KB
MD567b576bc037ff85b28ae1ec26c9d5504
SHA161446e6b35b2eb43b578926e18188136de902d5d
SHA256c25eabd9c3e9bc820a2a131af6ed39eaba76ece56a31a354d8c3346e2e22a1ad
SHA512fa206a55f575777f51ff52dab97c9757eb949334952ad2ed66d24575886e33b4b8c1923272468ba3fc6c7867c2d95ba61fc3cdfb67c1dd79cbc9d37ed1589267
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD51b863d10af0f9e9d34604f2e312ae220
SHA179e2f1a29c7eee395b1946d63a2f88ba3164c3fa
SHA2561a4f30aee1b7c24e6eaf5b41d797c4d300b039cd2371c3383085028d6cc74c22
SHA5126ee484e5e9335c2457088b327dc1ffe708c1bd73e49e40cfe4c29394ca217d6ea4dda6c03520d8a939a8e6085f6afbf44abd40bec3bdfce4091f8bfad89eb7b7
-
Filesize
7KB
MD5b3d41bffddafaf7985c9223bfe9a2668
SHA159865bc07a94825a5957237325325c53c6a4860e
SHA256523c326595178fd7e68e1c4ef880545605f2dd2c2983d03d1fe6491b49ddf518
SHA51293d0eb19bf65269fe00a5c0379186687f45e9f7840c7e70370ff975ce9872781ae6262180bea984cc3f0f2a620cff4177aee52446ad8e4f70352d5dfbb45e28c
-
Filesize
16KB
MD563e65321fa7633b33922e1db249c98d0
SHA15f82b69a1081101c61f58efeffb93e93b8ef6cff
SHA256f8b8b724f5f54d7b67e4db24b13ffdbfbbaccf502e5f551eec0b574fc3c535db
SHA51242fc6e43c2b048f9228635bccb3bb22b8626848600a3f88ac60dbe45d1290ec4287a19761cae7c941ea108872844fc250d923b9bb5b0c82d7409931af3ce9af7
-
Filesize
272KB
MD5d6b43872902dd4c6a73c4bc0a2a2c8a8
SHA143a617f0d2e2f527a22e0a092c04668c798b00ec
SHA2562efa98615132ed07e2454191e9cf6d32f78f3c254292f0955db6c25c1a5e89e4
SHA51200c02a62b121b0ce0a1d95a688b55c298e059a3ceeb09ea7e33035dfe5ca419cae7a05fd285b2e6e845c3017289a231e7277c16f3c0aad17b13408522f142da6
-
Filesize
2.3MB
MD5045525cf53d5d0ca74784e9a5d51066a
SHA1a20672e35bc028d18f44d2b0b5cba753c55a2143
SHA2568db28ae04a8e6f3daeb956527165369c3411fcede7a2eefb686754203a53becd
SHA512244a5816ea0aab7d49e93f0f3721466fdae565bedd3dd6a2bf06059e665cb1206fe9226b030ccb365e0801dd6624b9167ced91e894f9136785a4fca54414d1c1
-
Filesize
2.3MB
MD583a0c98ee5d11719c57bf474a5b7a47b
SHA1a057d921b14012061c36e0a7eeba5f2d7a7c8147
SHA2563023b41b4d3a47b962c555b3c92699888cb25abdb54df09cf71ae57c2fa847f3
SHA51241a2c9486bc65bb140bc3a399f26dc110bd1b57553589d1681d56b9b585e63bed91e3c36d96a1add2b0eeb7eb22bb82cde0a833bd351b0978e42df78fe9b8471
-
Filesize
2.4MB
MD526a77a61fb964d82c815da952ebedb23
SHA18d9100fcc2e55df7c20954d459c1a6c5861228a1
SHA2562e1662bc8b93a8cea652f916afa628ce5646e3b62d15cf584188f7df066dca73
SHA512793a6dcd9d3eae88b25a24895f0cf2b23060e8b59788b0bbf357a8fd7df0f536301912dcdd8c2ccf08313f89322a350c5bbc0bdce08a44bedd862cf8d421ab9a
-
Filesize
1.8MB
MD5aded0ea77937d828064a3bc9f571b17e
SHA184b4d02c22bc1fc40c547bfa99781ff17cc9a0bd
SHA2561b1ba4d3b0ca9fdd56a35e1060fef717ca4104ca7421ab072d2f90aee9d90089
SHA512bb95f4f76b6524c0aba46c1d047b0905e5c71cea54285b263514012e7289c4230f5f4d81f332168dc7accab3166c9b97c175585d387fbd46bb68bdd1b254d835