Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 00:12
Static task
static1
Behavioral task
behavioral1
Sample
179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe
Resource
win10v2004-20240704-en
General
-
Target
179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe
-
Size
2.4MB
-
MD5
05be2cbe945ebb1f4db5c1fa09a75079
-
SHA1
bda32f10b41780e494da9733b74aaff5ddca342d
-
SHA256
179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac
-
SHA512
20447216767e2010afc5d54ba6218c48f8aa6594de53e97ff0a9da180f2021c9916c1dddb059aabe2470454f945eedd1520b6c3f5ba5099b6d48fad9f400cacb
-
SSDEEP
49152:02RGSEB5Y6aSeEmGKvmDzGgvP6H3g0B8ChNd9KrjKZcMXiNSvNc5RWGln:06t6aSeE2+zG6C3nBbSr4jXJvW9l
Malware Config
Extracted
stealc
Nice
http://85.28.47.30
-
url_path
/920475a59bac849d.php
Extracted
amadey
4.30
4dd39d
http://77.91.77.82
-
install_dir
ad40971b6b
-
install_file
explorti.exe
-
strings_key
a434973ad22def7137dbb5e059b7081e
-
url_paths
/Hun4Ko/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ BAKKEGCAAE.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BAKKEGCAAE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BAKKEGCAAE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation BAKKEGCAAE.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation explorti.exe -
Executes dropped EXE 6 IoCs
pid Process 3252 BAKKEGCAAE.exe 780 explorti.exe 2380 82e5237dde.exe 2452 explorti.exe 4460 explorti.exe 4588 explorti.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Software\Wine BAKKEGCAAE.exe -
Loads dropped DLL 2 IoCs
pid Process 216 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 216 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 216 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 216 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 3252 BAKKEGCAAE.exe 780 explorti.exe 2380 82e5237dde.exe 2452 explorti.exe 4460 explorti.exe 4588 explorti.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorti.job BAKKEGCAAE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 216 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 216 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 216 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 216 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 3252 BAKKEGCAAE.exe 3252 BAKKEGCAAE.exe 780 explorti.exe 780 explorti.exe 740 msedge.exe 740 msedge.exe 756 msedge.exe 756 msedge.exe 1356 identity_helper.exe 1356 identity_helper.exe 2452 explorti.exe 2452 explorti.exe 4460 explorti.exe 4460 explorti.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4588 explorti.exe 4588 explorti.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3252 BAKKEGCAAE.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 216 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 3636 cmd.exe 2380 82e5237dde.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 216 wrote to memory of 4204 216 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 84 PID 216 wrote to memory of 4204 216 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 84 PID 216 wrote to memory of 4204 216 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 84 PID 216 wrote to memory of 3636 216 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 85 PID 216 wrote to memory of 3636 216 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 85 PID 216 wrote to memory of 3636 216 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 85 PID 4204 wrote to memory of 3252 4204 cmd.exe 88 PID 4204 wrote to memory of 3252 4204 cmd.exe 88 PID 4204 wrote to memory of 3252 4204 cmd.exe 88 PID 3252 wrote to memory of 780 3252 BAKKEGCAAE.exe 89 PID 3252 wrote to memory of 780 3252 BAKKEGCAAE.exe 89 PID 3252 wrote to memory of 780 3252 BAKKEGCAAE.exe 89 PID 780 wrote to memory of 2380 780 explorti.exe 90 PID 780 wrote to memory of 2380 780 explorti.exe 90 PID 780 wrote to memory of 2380 780 explorti.exe 90 PID 780 wrote to memory of 1448 780 explorti.exe 91 PID 780 wrote to memory of 1448 780 explorti.exe 91 PID 780 wrote to memory of 1448 780 explorti.exe 91 PID 1448 wrote to memory of 756 1448 cmd.exe 93 PID 1448 wrote to memory of 756 1448 cmd.exe 93 PID 756 wrote to memory of 2376 756 msedge.exe 95 PID 756 wrote to memory of 2376 756 msedge.exe 95 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 1176 756 msedge.exe 96 PID 756 wrote to memory of 740 756 msedge.exe 97 PID 756 wrote to memory of 740 756 msedge.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe"C:\Users\Admin\AppData\Local\Temp\179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\BAKKEGCAAE.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\BAKKEGCAAE.exe"C:\Users\Admin\AppData\Local\Temp\BAKKEGCAAE.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\1000006001\82e5237dde.exe"C:\Users\Admin\AppData\Local\Temp\1000006001\82e5237dde.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2380
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1000008021\94982dcb44.cmd" "5⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account6⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xfc,0x128,0x7ff93e5146f8,0x7ff93e514708,0x7ff93e5147187⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,14911759702774596722,7141024526409901413,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2016 /prefetch:27⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,14911759702774596722,7141024526409901413,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:37⤵
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,14911759702774596722,7141024526409901413,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:87⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14911759702774596722,7141024526409901413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:17⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14911759702774596722,7141024526409901413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:17⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14911759702774596722,7141024526409901413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:17⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,14911759702774596722,7141024526409901413,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3672 /prefetch:87⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,14911759702774596722,7141024526409901413,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3672 /prefetch:87⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14911759702774596722,7141024526409901413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:17⤵PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14911759702774596722,7141024526409901413,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:17⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14911759702774596722,7141024526409901413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:17⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14911759702774596722,7141024526409901413,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:17⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,14911759702774596722,7141024526409901413,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\JKEGDHCFCA.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:3636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3476
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exeC:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2452
-
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exeC:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exeC:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
152B
MD509c7ae658385f6de986103443217840b
SHA1298d880503edce4413337c09d3525f27a2edcd28
SHA25691e04ec38abdb0204458543592c4621b7bc0306407884f764aa9596a52454cd7
SHA5124e1272b209487d1e9e7d8502be49ebce91c76718410e817b3ac7faf47d9b699210aab1b941fbb5ddafc192ddf4b2ba151afd47fab753ec62bc0bca36039c55c3
-
Filesize
152B
MD53c78617ec8f88da19254f9ff03312175
SHA1344e9fed9434d924d1c9f05351259cbc21e434d3
SHA2563cb47fcdca33bb3c8f4acc98424140987235ad79815da4f0e7593e4591ae90ed
SHA5125b58675088b0fc2b2d705cb648ea89385b80c7cf908b0f4f95a9acdbd350b50754e1b586202db6a918eef70029fafb210947f3c43c570ecf7657e08939fd7e9c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5066e3094f806662d863c08fc3b57714f
SHA1c9e2cc2eeff99c839a14830bfd650854a909f80f
SHA256fdb91ed118bbc1d8488fd64049a651f85db716348e8cabd4c4b886794135b16e
SHA512a5ca1f989de23b2bbd7e89f3b8f9d5cddb093ea3f244ef69978053c8d6650c3df0f8e6e1966f3f2bd6e7771beedae583d13d1d9edaa99a27fef72abc8d5cf177
-
Filesize
1KB
MD5bbfc22cb81c30b31f4202b635467db5c
SHA1ba00505124686dce983eeaf6e46bca3ee1fde608
SHA25680434900f11ba24d57bec1b23ef2d1440292ee178d9e6f0dd1f43eb899661735
SHA512597572bad81a8d2f1a9d657b77bad3c5dfff711bd52289f57f59c49b27c51a87728e9606caec4821557ae616b2c5632a1540755425f6f28a85a52357a3ab9804
-
Filesize
6KB
MD529c1d3fc480456c449e58a8c480a5a5f
SHA1cce6d5c988fe996fcd0b48d08004d16ad8ef15aa
SHA2561c88f49aa71b19b6fe6fddeb613b49d42a5774c0a1ea3f8fbaec85e3ab6f5385
SHA5126d9ccac0f9049ce4766a5abe6f7b0689c01f3cf8bef5eeffc6d9a1ff0f328c94fcbe72fb10b0f03cc9d4b72d1d588b928899710e3dece07226351d67f44c7382
-
Filesize
6KB
MD5ec3dac1497147897069def5c60fbf54e
SHA19a4f42165e572b1e2cf2e5128acc6ec39529f08e
SHA256414ebf0c1c28f69e5eadb319e384ca94d3ffc1c045c4ab82b0756b8032cf24e2
SHA5120dfddb4da36b02e35f460226606565923e01bd3449de815ecb7b06d6bea5013140f2a7e26112bfc19db32a2f24816c45548681e0c5bcfd1eac8eb0e2d44a1389
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e2828b1f1211b09f9c62c53c86b68a66
SHA106224dbdcb9f709626a094c3ca9b155620c5ca8e
SHA256bebf88b64629a3d57a5a5c4cf404605da49c41d0f32d8e5e61f5e04d619238df
SHA5128df49910362babe6d298e41915009b4ffbb85283d44454ab02e531be42423c99c84636a6f1c313bddf905a4d0a0e2f73f6f305ed61e03520aa46a5c44a156fcb
-
Filesize
2.4MB
MD505be2cbe945ebb1f4db5c1fa09a75079
SHA1bda32f10b41780e494da9733b74aaff5ddca342d
SHA256179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac
SHA51220447216767e2010afc5d54ba6218c48f8aa6594de53e97ff0a9da180f2021c9916c1dddb059aabe2470454f945eedd1520b6c3f5ba5099b6d48fad9f400cacb
-
Filesize
41B
MD5ee00aba3bdbf694bb1588c965a077e3a
SHA100491ccb092d576b62d54172bdc09877d0f74c19
SHA2561aaae392ae43103ba228a64247a82cc41767041f6fa6db20246e3f0d49b29750
SHA5121a05c43de1ac0fdbabe97145e7170a1a399fcf2b8463422049ee1e5b13d42c316e7da0cb39b7e10935fc16e69f88d6a5869e114f1ae4fbed15ffd1b313661e49
-
Filesize
1.8MB
MD5871c8a5c8f7347ea553b8ba61e14d6b2
SHA1869cf73c7fb829fb329b894cdd8a4dd1db8d95a9
SHA256744e0f6e1df8bb8f48bce1ad404552f9a4d088b39d444c588a88ee99258bcc00
SHA5120e646829210c8356bceba6f6b68eb914557b73dd0fa36f479e6829e9817080024f303a178d589fef9a325e9574114d864ad8814ae8f395605f742d4fe01c0c37