Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20240704-en -
resource tags
arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-07-2024 00:12
Static task
static1
Behavioral task
behavioral1
Sample
179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe
Resource
win10v2004-20240704-en
General
-
Target
179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe
-
Size
2.4MB
-
MD5
05be2cbe945ebb1f4db5c1fa09a75079
-
SHA1
bda32f10b41780e494da9733b74aaff5ddca342d
-
SHA256
179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac
-
SHA512
20447216767e2010afc5d54ba6218c48f8aa6594de53e97ff0a9da180f2021c9916c1dddb059aabe2470454f945eedd1520b6c3f5ba5099b6d48fad9f400cacb
-
SSDEEP
49152:02RGSEB5Y6aSeEmGKvmDzGgvP6H3g0B8ChNd9KrjKZcMXiNSvNc5RWGln:06t6aSeE2+zG6C3nBbSr4jXJvW9l
Malware Config
Extracted
stealc
Nice
http://85.28.47.30
-
url_path
/920475a59bac849d.php
Extracted
amadey
4.30
4dd39d
http://77.91.77.82
-
install_dir
ad40971b6b
-
install_file
explorti.exe
-
strings_key
a434973ad22def7137dbb5e059b7081e
-
url_paths
/Hun4Ko/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ HCGCAAKJDH.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion HCGCAAKJDH.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion HCGCAAKJDH.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe -
Executes dropped EXE 6 IoCs
pid Process 1116 HCGCAAKJDH.exe 8 explorti.exe 4204 bb4eea40ad.exe 4272 explorti.exe 3100 explorti.exe 2792 explorti.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3234977864-427365696-1522832567-1000\Software\Wine HCGCAAKJDH.exe Key opened \REGISTRY\USER\S-1-5-21-3234977864-427365696-1522832567-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-3234977864-427365696-1522832567-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-3234977864-427365696-1522832567-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-3234977864-427365696-1522832567-1000\Software\Wine explorti.exe -
Loads dropped DLL 2 IoCs
pid Process 2108 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 2108 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 2108 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 2108 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 1116 HCGCAAKJDH.exe 8 explorti.exe 4204 bb4eea40ad.exe 4204 bb4eea40ad.exe 4272 explorti.exe 3100 explorti.exe 2792 explorti.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorti.job HCGCAAKJDH.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2108 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 2108 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 2108 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 2108 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 1116 HCGCAAKJDH.exe 1116 HCGCAAKJDH.exe 8 explorti.exe 8 explorti.exe 2732 msedge.exe 2732 msedge.exe 2644 msedge.exe 2644 msedge.exe 3644 msedge.exe 3644 msedge.exe 4272 explorti.exe 4272 explorti.exe 2864 identity_helper.exe 2864 identity_helper.exe 3100 explorti.exe 3100 explorti.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 2792 explorti.exe 2792 explorti.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1116 HCGCAAKJDH.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe 2644 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2108 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 1800 cmd.exe 4204 bb4eea40ad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2108 wrote to memory of 3580 2108 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 81 PID 2108 wrote to memory of 3580 2108 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 81 PID 2108 wrote to memory of 3580 2108 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 81 PID 2108 wrote to memory of 1800 2108 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 82 PID 2108 wrote to memory of 1800 2108 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 82 PID 2108 wrote to memory of 1800 2108 179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe 82 PID 3580 wrote to memory of 1116 3580 cmd.exe 85 PID 3580 wrote to memory of 1116 3580 cmd.exe 85 PID 3580 wrote to memory of 1116 3580 cmd.exe 85 PID 1116 wrote to memory of 8 1116 HCGCAAKJDH.exe 86 PID 1116 wrote to memory of 8 1116 HCGCAAKJDH.exe 86 PID 1116 wrote to memory of 8 1116 HCGCAAKJDH.exe 86 PID 8 wrote to memory of 4204 8 explorti.exe 87 PID 8 wrote to memory of 4204 8 explorti.exe 87 PID 8 wrote to memory of 4204 8 explorti.exe 87 PID 8 wrote to memory of 4840 8 explorti.exe 88 PID 8 wrote to memory of 4840 8 explorti.exe 88 PID 8 wrote to memory of 4840 8 explorti.exe 88 PID 4840 wrote to memory of 2644 4840 cmd.exe 90 PID 4840 wrote to memory of 2644 4840 cmd.exe 90 PID 2644 wrote to memory of 220 2644 msedge.exe 93 PID 2644 wrote to memory of 220 2644 msedge.exe 93 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 4612 2644 msedge.exe 94 PID 2644 wrote to memory of 2732 2644 msedge.exe 95 PID 2644 wrote to memory of 2732 2644 msedge.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe"C:\Users\Admin\AppData\Local\Temp\179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\HCGCAAKJDH.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\HCGCAAKJDH.exe"C:\Users\Admin\AppData\Local\Temp\HCGCAAKJDH.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\1000006001\bb4eea40ad.exe"C:\Users\Admin\AppData\Local\Temp\1000006001\bb4eea40ad.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4204
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1000008021\c6623eb7b4.cmd" "5⤵
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account6⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbfec03cb8,0x7ffbfec03cc8,0x7ffbfec03cd87⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1636,11848833317334929854,18405603141304517720,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1916 /prefetch:27⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1636,11848833317334929854,18405603141304517720,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1636,11848833317334929854,18405603141304517720,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:87⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1636,11848833317334929854,18405603141304517720,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:17⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1636,11848833317334929854,18405603141304517720,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:17⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1636,11848833317334929854,18405603141304517720,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:17⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1636,11848833317334929854,18405603141304517720,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 /prefetch:87⤵
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1636,11848833317334929854,18405603141304517720,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3452 /prefetch:87⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1636,11848833317334929854,18405603141304517720,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:17⤵PID:72
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1636,11848833317334929854,18405603141304517720,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4552 /prefetch:17⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1636,11848833317334929854,18405603141304517720,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:17⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1636,11848833317334929854,18405603141304517720,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:17⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1636,11848833317334929854,18405603141304517720,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5036 /prefetch:27⤵
- Suspicious behavior: EnumeratesProcesses
PID:660
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\KEBFHIJECF.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exeC:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4272
-
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exeC:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3100
-
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exeC:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
152B
MD5640b9bae54d22b45b4d52a96e2f81f13
SHA1b1c7304e9abbe1759f8df7f88ca2c6354b42fdf3
SHA256834c17e205445d197a64177b76ae0bb718bfe2eb8ffe492f008946603edf80d4
SHA5128baaa3339cddca01a018e9a0900426a7590f7107c55372d65fe932dd570bb4289238977396037c9bf73157d6bfd7f1f5795842df39c354200c2af1a84014e6a6
-
Filesize
152B
MD5b45c28d31ee31580e85d12f5ce5b6a46
SHA18bd9a23f3141aa877711fc7835446b8783b51974
SHA256d944d6021a2fdf016911aa4d9e8b437431fa4f92b0229b9e3322b4354a4b19c7
SHA5123628da551c52367a4b54ca0cb7c401f7d3a8dd37375b3b57d82adb06c96657ac55d593ffa7a9f000f74ecd7e6d35562a96013d0c70b04123f055a4d2af72aa3d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5f4c1e7e325915cb42ef144f8cf7aa3cc
SHA12f2b69d23f1ec0e09fe7edbb686eaf3f9f87500c
SHA2564f9c11131f40649d8c9d3ce3cf4e5cf610555f59528929ab68993d56d3a93abb
SHA5120dc23ee2f9ff9881470e18ec05aaf8b050caca9dd143df93c9081dd06033a4c2d2fec5717b2c2c2117ef665afca17fdc179259ff507360dc15426114c05c61f5
-
Filesize
1KB
MD53944ab22c0db3744f4506ceb912f0f27
SHA11c31dbf71e8e26a74684a518c60586dfe6da8ee7
SHA25659c68c8dbc763e929b027725065b6f4df49f3b766fc35500f3caa563428b4f36
SHA512b25237fec48269c73b603f2179cc5a395c21ea2759b610d0de51ba0efc33d52a6c6e289b7a28a0195b407ed459e7ecfb26fd8a9f7516191b5f34cc91cdaf7e62
-
Filesize
5KB
MD548bef7341b85329c41c5a5f7b5e57af4
SHA1f24e95e370bb41193e5e980df7d5eb1c9e258173
SHA2567114ea55950929d76c3d1fa43c90f29019e1dea9cb8699436e5da7366f1ba8ad
SHA51236dd2076ed044a86cad463253f068a279e38947864080771dd2b875da88f20f1af27473c2c0a9593672627bf935add36095dc01afb3085115616604948d60814
-
Filesize
6KB
MD58a3da785cfe7f3afaf888884a986f4c0
SHA1b9e4c2404166b9f5f4020ffbb79e03f2513df2b7
SHA256ad265730f35fe02d91c5974a8bae5fed694cc4a48f00c409c0a417e98551a366
SHA512a9eb07ca7dd9086f66cfc87f147d1703b73e855f9e6ed216105ff42ed2f2bd61692929c8077c6b94de40c2cbe330a649333e129565b84056189f70d43277da9d
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD55f0628ba40b06728a67571b26fa3796a
SHA1c03380f975c3596bc327ffaf84fd76cc76329b18
SHA256482d00ee0b88ba66d3ec719148a6584966dc2bc44f5b5c068b53623a998863fa
SHA512f1f9a4aacb89a848eafe4deefa2f8607436d2b0ac8f6dfa2fcac94038868d41c216491d3570bf2f586d4d74ac78d2291b3766cd76cd9292fc81d3c09e1fffd80
-
Filesize
2.4MB
MD505be2cbe945ebb1f4db5c1fa09a75079
SHA1bda32f10b41780e494da9733b74aaff5ddca342d
SHA256179f7c98dab9536a149dbbeee298e9153c3a01fc94a2c48377118231246200ac
SHA51220447216767e2010afc5d54ba6218c48f8aa6594de53e97ff0a9da180f2021c9916c1dddb059aabe2470454f945eedd1520b6c3f5ba5099b6d48fad9f400cacb
-
Filesize
41B
MD5ee00aba3bdbf694bb1588c965a077e3a
SHA100491ccb092d576b62d54172bdc09877d0f74c19
SHA2561aaae392ae43103ba228a64247a82cc41767041f6fa6db20246e3f0d49b29750
SHA5121a05c43de1ac0fdbabe97145e7170a1a399fcf2b8463422049ee1e5b13d42c316e7da0cb39b7e10935fc16e69f88d6a5869e114f1ae4fbed15ffd1b313661e49
-
Filesize
1.8MB
MD5871c8a5c8f7347ea553b8ba61e14d6b2
SHA1869cf73c7fb829fb329b894cdd8a4dd1db8d95a9
SHA256744e0f6e1df8bb8f48bce1ad404552f9a4d088b39d444c588a88ee99258bcc00
SHA5120e646829210c8356bceba6f6b68eb914557b73dd0fa36f479e6829e9817080024f303a178d589fef9a325e9574114d864ad8814ae8f395605f742d4fe01c0c37