Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
25-06-2024 16:27
Static task
static1
Behavioral task
behavioral1
Sample
82d87b4dfeac9c8cb9a99f51b60693279dc87bd045133b1e8f15ae1e929b78f3.exe
Resource
win10v2004-20240611-en
General
-
Target
82d87b4dfeac9c8cb9a99f51b60693279dc87bd045133b1e8f15ae1e929b78f3.exe
-
Size
1.8MB
-
MD5
80bb37d0d0b67ac4d218f3563a0cd28a
-
SHA1
9614b6e077ed217946e2c844226f87472a9fad25
-
SHA256
82d87b4dfeac9c8cb9a99f51b60693279dc87bd045133b1e8f15ae1e929b78f3
-
SHA512
c06548970577d6d73921df7a4e84b4dcab89bd056bc80cb51002319b69b341f1c98086dbb9bc7fdd9944cd18bb3dc9bea8ee42d548ed9f637737ed8e0325024e
-
SSDEEP
49152:4VX1i6FMPimUD11GhDPGrElO6jCg7AvNGGpy6ytsJ:yi6F/VyxO8bOUGHm
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
risepro
77.91.77.66:58709
Extracted
stealc
default
http://85.28.47.4
-
url_path
/920475a59bac849d.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bd45bbf8ec.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0ca4a4dc0a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 82d87b4dfeac9c8cb9a99f51b60693279dc87bd045133b1e8f15ae1e929b78f3.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 82d87b4dfeac9c8cb9a99f51b60693279dc87bd045133b1e8f15ae1e929b78f3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 82d87b4dfeac9c8cb9a99f51b60693279dc87bd045133b1e8f15ae1e929b78f3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0ca4a4dc0a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bd45bbf8ec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0ca4a4dc0a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bd45bbf8ec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe -
Executes dropped EXE 7 IoCs
pid Process 3012 explortu.exe 3568 explortu.exe 1180 bd45bbf8ec.exe 796 0ca4a4dc0a.exe 3576 explortu.exe 1424 num.exe 3400 explortu.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1560405787-796225086-678739705-1000\Software\Wine 82d87b4dfeac9c8cb9a99f51b60693279dc87bd045133b1e8f15ae1e929b78f3.exe Key opened \REGISTRY\USER\S-1-5-21-1560405787-796225086-678739705-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1560405787-796225086-678739705-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1560405787-796225086-678739705-1000\Software\Wine bd45bbf8ec.exe Key opened \REGISTRY\USER\S-1-5-21-1560405787-796225086-678739705-1000\Software\Wine 0ca4a4dc0a.exe Key opened \REGISTRY\USER\S-1-5-21-1560405787-796225086-678739705-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1560405787-796225086-678739705-1000\Software\Wine explortu.exe -
Loads dropped DLL 2 IoCs
pid Process 1424 num.exe 1424 num.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1560405787-796225086-678739705-1000\Software\Microsoft\Windows\CurrentVersion\Run\bd45bbf8ec.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000016001\\bd45bbf8ec.exe" explortu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/796-170-0x0000000000BB0000-0x000000000110B000-memory.dmp autoit_exe behavioral2/memory/796-215-0x0000000000BB0000-0x000000000110B000-memory.dmp autoit_exe behavioral2/memory/796-245-0x0000000000BB0000-0x000000000110B000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 4808 82d87b4dfeac9c8cb9a99f51b60693279dc87bd045133b1e8f15ae1e929b78f3.exe 3012 explortu.exe 3568 explortu.exe 1180 bd45bbf8ec.exe 796 0ca4a4dc0a.exe 3576 explortu.exe 1424 num.exe 1424 num.exe 1424 num.exe 1424 num.exe 3400 explortu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3012 set thread context of 3568 3012 explortu.exe 78 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explortu.job 82d87b4dfeac9c8cb9a99f51b60693279dc87bd045133b1e8f15ae1e929b78f3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 num.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString num.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133638064802346623" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4808 82d87b4dfeac9c8cb9a99f51b60693279dc87bd045133b1e8f15ae1e929b78f3.exe 4808 82d87b4dfeac9c8cb9a99f51b60693279dc87bd045133b1e8f15ae1e929b78f3.exe 3012 explortu.exe 3012 explortu.exe 3568 explortu.exe 3568 explortu.exe 1180 bd45bbf8ec.exe 1180 bd45bbf8ec.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 2504 chrome.exe 2504 chrome.exe 3576 explortu.exe 3576 explortu.exe 1424 num.exe 1424 num.exe 1424 num.exe 1424 num.exe 3400 explortu.exe 3400 explortu.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe Token: SeShutdownPrivilege 2504 chrome.exe Token: SeCreatePagefilePrivilege 2504 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4808 82d87b4dfeac9c8cb9a99f51b60693279dc87bd045133b1e8f15ae1e929b78f3.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 2504 chrome.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe 796 0ca4a4dc0a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1424 num.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4808 wrote to memory of 3012 4808 82d87b4dfeac9c8cb9a99f51b60693279dc87bd045133b1e8f15ae1e929b78f3.exe 77 PID 4808 wrote to memory of 3012 4808 82d87b4dfeac9c8cb9a99f51b60693279dc87bd045133b1e8f15ae1e929b78f3.exe 77 PID 4808 wrote to memory of 3012 4808 82d87b4dfeac9c8cb9a99f51b60693279dc87bd045133b1e8f15ae1e929b78f3.exe 77 PID 3012 wrote to memory of 3568 3012 explortu.exe 78 PID 3012 wrote to memory of 3568 3012 explortu.exe 78 PID 3012 wrote to memory of 3568 3012 explortu.exe 78 PID 3012 wrote to memory of 3568 3012 explortu.exe 78 PID 3012 wrote to memory of 3568 3012 explortu.exe 78 PID 3012 wrote to memory of 3568 3012 explortu.exe 78 PID 3012 wrote to memory of 3568 3012 explortu.exe 78 PID 3012 wrote to memory of 3568 3012 explortu.exe 78 PID 3012 wrote to memory of 3568 3012 explortu.exe 78 PID 3012 wrote to memory of 3568 3012 explortu.exe 78 PID 3012 wrote to memory of 3568 3012 explortu.exe 78 PID 3012 wrote to memory of 3568 3012 explortu.exe 78 PID 3012 wrote to memory of 1180 3012 explortu.exe 79 PID 3012 wrote to memory of 1180 3012 explortu.exe 79 PID 3012 wrote to memory of 1180 3012 explortu.exe 79 PID 3012 wrote to memory of 796 3012 explortu.exe 80 PID 3012 wrote to memory of 796 3012 explortu.exe 80 PID 3012 wrote to memory of 796 3012 explortu.exe 80 PID 796 wrote to memory of 2504 796 0ca4a4dc0a.exe 81 PID 796 wrote to memory of 2504 796 0ca4a4dc0a.exe 81 PID 2504 wrote to memory of 4764 2504 chrome.exe 84 PID 2504 wrote to memory of 4764 2504 chrome.exe 84 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4988 2504 chrome.exe 85 PID 2504 wrote to memory of 4092 2504 chrome.exe 86 PID 2504 wrote to memory of 4092 2504 chrome.exe 86 PID 2504 wrote to memory of 4888 2504 chrome.exe 87 PID 2504 wrote to memory of 4888 2504 chrome.exe 87 PID 2504 wrote to memory of 4888 2504 chrome.exe 87 PID 2504 wrote to memory of 4888 2504 chrome.exe 87 PID 2504 wrote to memory of 4888 2504 chrome.exe 87 PID 2504 wrote to memory of 4888 2504 chrome.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\82d87b4dfeac9c8cb9a99f51b60693279dc87bd045133b1e8f15ae1e929b78f3.exe"C:\Users\Admin\AppData\Local\Temp\82d87b4dfeac9c8cb9a99f51b60693279dc87bd045133b1e8f15ae1e929b78f3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3568
-
-
C:\Users\Admin\AppData\Local\Temp\1000016001\bd45bbf8ec.exe"C:\Users\Admin\AppData\Local\Temp\1000016001\bd45bbf8ec.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Users\Admin\AppData\Local\Temp\1000017001\0ca4a4dc0a.exe"C:\Users\Admin\AppData\Local\Temp\1000017001\0ca4a4dc0a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff95a45ab58,0x7ff95a45ab68,0x7ff95a45ab785⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=1848,i,7993300254745626721,3838732270123180849,131072 /prefetch:25⤵PID:4988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=1848,i,7993300254745626721,3838732270123180849,131072 /prefetch:85⤵PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2128 --field-trial-handle=1848,i,7993300254745626721,3838732270123180849,131072 /prefetch:85⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1848,i,7993300254745626721,3838732270123180849,131072 /prefetch:15⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1848,i,7993300254745626721,3838732270123180849,131072 /prefetch:15⤵PID:576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4220 --field-trial-handle=1848,i,7993300254745626721,3838732270123180849,131072 /prefetch:15⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4424 --field-trial-handle=1848,i,7993300254745626721,3838732270123180849,131072 /prefetch:85⤵PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4508 --field-trial-handle=1848,i,7993300254745626721,3838732270123180849,131072 /prefetch:85⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4516 --field-trial-handle=1848,i,7993300254745626721,3838732270123180849,131072 /prefetch:85⤵PID:1512
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000020001\num.exe"C:\Users\Admin\AppData\Local\Temp\1000020001\num.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1424
-
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:724
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
216B
MD5114fc293e8e56a3fc701d16e3acc64ea
SHA1c3d06b44a36cfca34dce415bb8df97465cdc7d4c
SHA256004ddf7f645f30be6051c488011d6d70c33e6942f988bfca15c9264991408461
SHA512b6110229ece4298379515094ee6b121c890f934fa125e136def3952ae627e126bc4e4cc7208011c17015a6b5045a0e28b17e1531cf8ac626e2dc63f33b5c951b
-
Filesize
152KB
MD5141a1c6904b0598fe5342df66856fd05
SHA13e7163d064cbd333fbe772fd69fdf40234453dd6
SHA2563dbd373c3886de9c0dd25d3d4f19ba72934bb413ffcec32481893abf050a46aa
SHA512de03e6b6e91d5f55e81cec89851482152474d79af6cbe4818374aae7bc70a0f1b22e7e52f815bb5241571f056a31103f11034771e01496d71fd89a72928bf9d1
-
Filesize
2KB
MD5c1cb52f26e5a66ee53ec6aace3966d23
SHA1161d28a7b1ea2ce45066e8fe943984fdd80eeb16
SHA256dc88645157d52a8961b06ba019283691a2a9867d1486d7af10f61eaf74302cfd
SHA5123d32ae52657aaccaac6d81abaf6daa7d9ab18c80dd479dce5e21f658fe76fa8db039d61c5d36ed9c7e19fcec1989a309e9a2c1a429a6d5ec6d172cc16be1150b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD5f31e7e939f2e5cfbef9210b6fee05f4f
SHA192c8e6a948e4c20258f7d995b6c684ec32106f13
SHA2561fc119f490137fe74a398cc01654dedef750531f76548383a74aee06a14722c8
SHA512f034b044aa1a124e995c5d319119d6bbba8ff7f5442cee46324fecc2428528b2eaf8a3487d7c97680e8fdd01f266bd3cfefa70870555018806d7a5744d3d184e
-
Filesize
7KB
MD5d9954a839160553fec78d379f2d36153
SHA1913d7119393ae358d9a1c94032d6aa192bcbcc78
SHA2566886edb284959d66e5a15cf9c2200f33d4bc3e475d6a83f529e222008de15dd7
SHA512498d35429226dbc8db0a68b4d2132564956eb94271a43cd10ffaff45deefc037bb36833d29a127c8a10e64d62a23cdf1895f54b45166934416355ae12a14df87
-
Filesize
16KB
MD52298ff11ce29a1e16b5a5cf07943fd07
SHA1fe4eb0639a00d40f9cc41676994502db03a23c53
SHA2563b51eee6d8dedce68f555a01b1628c664512d1e236d1b6e44f1fc086584f32e3
SHA5124ad0cee58992eb8f58e869eaef868a1db63f5c42119f77a7fac63e7beb1639ecd98de23a43c6029d499d78b5cbbc4d399b8126e98339aee465599ffa2e1a32fe
-
Filesize
281KB
MD52f3de3b40bb99ca3dcaeb6824065ae34
SHA18ef485d43dfb92b856e10353b4fb5821a0ffd2de
SHA25640c96715f48d73945f239019b9aa7b1446461f47601542ba0ff01e52777200b2
SHA5121ca03a0cf54030716622bdbeffc79024b14ff2bfc01e6d1c7952bd6e0efe4e2220a1e0cc56560cc959f8e0e1e15f752435ddd3155ab54f62ecde9b42c687d1f7
-
Filesize
2.3MB
MD5dab25c41f68cdd128a18a8eb8cbb62fc
SHA12bba8b4db24467edd0bd9f4fd0f58156e09f4581
SHA2561bc7c74f15149979e9b4598592f66b93bf3afbe5ed0fb2506bbf26a00aca8ead
SHA512360c67b14d2183354950829f58d30df4427583e18b26e357f49f3a371373a5c5a45106e37d0b1b624a94d82de97cd8efee7e4b32ca5fa64f905d294e2465e7ac
-
Filesize
2.3MB
MD533e8684339063ec10d967c183a3e2773
SHA1c5d56088e73656e55fa8a9ba8a6b80888ef7f60d
SHA256d0e663f6b2d46cbec8542be9495490e59860b3da3535c6de85a719199d0fbecf
SHA512e27e90fd4fe7efb236234c7dc360fa5b18959e5daaa0027af846cae05381741d7d53a06d3ce5744c96617c9f4994bb9ff35971b5be58f1b8a2c8fa25c587229e
-
Filesize
2.4MB
MD526a77a61fb964d82c815da952ebedb23
SHA18d9100fcc2e55df7c20954d459c1a6c5861228a1
SHA2562e1662bc8b93a8cea652f916afa628ce5646e3b62d15cf584188f7df066dca73
SHA512793a6dcd9d3eae88b25a24895f0cf2b23060e8b59788b0bbf357a8fd7df0f536301912dcdd8c2ccf08313f89322a350c5bbc0bdce08a44bedd862cf8d421ab9a
-
Filesize
1.8MB
MD580bb37d0d0b67ac4d218f3563a0cd28a
SHA19614b6e077ed217946e2c844226f87472a9fad25
SHA25682d87b4dfeac9c8cb9a99f51b60693279dc87bd045133b1e8f15ae1e929b78f3
SHA512c06548970577d6d73921df7a4e84b4dcab89bd056bc80cb51002319b69b341f1c98086dbb9bc7fdd9944cd18bb3dc9bea8ee42d548ed9f637737ed8e0325024e