Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 11:28
Static task
static1
Behavioral task
behavioral1
Sample
cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe
Resource
win10v2004-20240704-en
General
-
Target
cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe
-
Size
1.8MB
-
MD5
f5b545d705d9eb65864751dc06c581fc
-
SHA1
5a1e0218d17f6bf8d2caa61f62f8ec9f8dde8f80
-
SHA256
cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde
-
SHA512
cf600b113d2d4808fae4e841234737508100ccbd00615844f80cbf5f38a911641ced0906660a67b69d74c850d760257fb55102fac36de3d61f0e68b982675d9a
-
SSDEEP
49152:d600VbYNqsEV53kal9CLgM7D25DNAKEhQS0OodHtT:dIVJ3l9CUwD25Du0OoHT
Malware Config
Extracted
amadey
4.30
4dd39d
http://77.91.77.82
-
install_dir
ad40971b6b
-
install_file
explorti.exe
-
strings_key
a434973ad22def7137dbb5e059b7081e
-
url_paths
/Hun4Ko/index.php
Extracted
stealc
Nice
http://85.28.47.30
-
url_path
/920475a59bac849d.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ HCFCFHJDBK.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion HCFCFHJDBK.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion HCFCFHJDBK.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\Control Panel\International\Geo\Nation cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe Key value queried \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\Control Panel\International\Geo\Nation explorti.exe Key value queried \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\Control Panel\International\Geo\Nation 8923dab871.exe -
Executes dropped EXE 5 IoCs
pid Process 4152 explorti.exe 3080 8923dab871.exe 3420 HCFCFHJDBK.exe 676 explorti.exe 1028 explorti.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\Software\Wine HCFCFHJDBK.exe Key opened \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\Software\Wine cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe -
Loads dropped DLL 2 IoCs
pid Process 3080 8923dab871.exe 3080 8923dab871.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 412 cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe 4152 explorti.exe 3080 8923dab871.exe 3080 8923dab871.exe 3080 8923dab871.exe 3420 HCFCFHJDBK.exe 676 explorti.exe 1028 explorti.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorti.job cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 8923dab871.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 8923dab871.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 412 cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe 412 cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe 4152 explorti.exe 4152 explorti.exe 3080 8923dab871.exe 3080 8923dab871.exe 4300 msedge.exe 4300 msedge.exe 3448 msedge.exe 3448 msedge.exe 3080 8923dab871.exe 3080 8923dab871.exe 3392 identity_helper.exe 3392 identity_helper.exe 3420 HCFCFHJDBK.exe 3420 HCFCFHJDBK.exe 676 explorti.exe 676 explorti.exe 1028 explorti.exe 1028 explorti.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 412 cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3080 8923dab871.exe 1376 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 412 wrote to memory of 4152 412 cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe 85 PID 412 wrote to memory of 4152 412 cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe 85 PID 412 wrote to memory of 4152 412 cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe 85 PID 4152 wrote to memory of 3080 4152 explorti.exe 86 PID 4152 wrote to memory of 3080 4152 explorti.exe 86 PID 4152 wrote to memory of 3080 4152 explorti.exe 86 PID 4152 wrote to memory of 4924 4152 explorti.exe 87 PID 4152 wrote to memory of 4924 4152 explorti.exe 87 PID 4152 wrote to memory of 4924 4152 explorti.exe 87 PID 4924 wrote to memory of 3448 4924 cmd.exe 89 PID 4924 wrote to memory of 3448 4924 cmd.exe 89 PID 3448 wrote to memory of 3676 3448 msedge.exe 91 PID 3448 wrote to memory of 3676 3448 msedge.exe 91 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 3188 3448 msedge.exe 92 PID 3448 wrote to memory of 4300 3448 msedge.exe 93 PID 3448 wrote to memory of 4300 3448 msedge.exe 93 PID 3448 wrote to memory of 4520 3448 msedge.exe 94 PID 3448 wrote to memory of 4520 3448 msedge.exe 94 PID 3448 wrote to memory of 4520 3448 msedge.exe 94 PID 3448 wrote to memory of 4520 3448 msedge.exe 94 PID 3448 wrote to memory of 4520 3448 msedge.exe 94 PID 3448 wrote to memory of 4520 3448 msedge.exe 94 PID 3448 wrote to memory of 4520 3448 msedge.exe 94 PID 3448 wrote to memory of 4520 3448 msedge.exe 94 PID 3448 wrote to memory of 4520 3448 msedge.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe"C:\Users\Admin\AppData\Local\Temp\cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\1000006001\8923dab871.exe"C:\Users\Admin\AppData\Local\Temp\1000006001\8923dab871.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3080 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\HCFCFHJDBK.exe"4⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\HCFCFHJDBK.exe"C:\Users\Admin\AppData\Local\Temp\HCFCFHJDBK.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3420
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\FCBAEHCAEG.exe"4⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:1376
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1000008021\af505d0ec3.cmd" "3⤵
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9c88146f8,0x7ff9c8814708,0x7ff9c88147185⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,11561685635899686520,5589546801808144077,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:25⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,11561685635899686520,5589546801808144077,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,11561685635899686520,5589546801808144077,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:85⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11561685635899686520,5589546801808144077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:15⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11561685635899686520,5589546801808144077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:15⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11561685635899686520,5589546801808144077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:15⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11561685635899686520,5589546801808144077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4288 /prefetch:15⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11561685635899686520,5589546801808144077,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2996 /prefetch:15⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,11561685635899686520,5589546801808144077,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:85⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,11561685635899686520,5589546801808144077,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11561685635899686520,5589546801808144077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:15⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11561685635899686520,5589546801808144077,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:15⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,11561685635899686520,5589546801808144077,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3472 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2388
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exeC:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:676
-
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exeC:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
152B
MD506b496d28461d5c01fc81bc2be6a9978
SHA136e7a9d9c7a924d5bb448d68038c7fe5e6cbf5aa
SHA256e4a2d1395627095b0fa55e977e527ccb5b71dff3cd2d138df498f50f9f5ab507
SHA5126488a807c978d38d65010583c1e5582548ab8102ebd68ee827e603c9bdfcdbb9f98a488d31414a829409f6edca8bd2eb4aadd4ff31b144de41249fa63a26bc91
-
Filesize
152B
MD5de1d175f3af722d1feb1c205f4e92d1e
SHA1019cf8527a9b94bd0b35418bf7be8348be5a1c39
SHA2561b99cae942ebf99c31795fa279d51b1a2379ca0af7b27bd3c58ea6c78a033924
SHA512f0dcd08afd3c6a761cc1afa2846ec23fb5438d6127ebd535a754498debabd0b1ebd04858d1b98be92faf14b512f982b1f3dcbb702860e96877eb835f763f9734
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5f022b9ea97d2cacef9f106d1f2a8a440
SHA17e0c4fa00e3764cb8dbb0f15fb89ac813c2a4e58
SHA2568e9bb638ad999d0553f5c5efc11bfadeae4e74e6097a8b7b66bb86197c78676f
SHA5124ef79ba9a1926012791f071a61121abba9ad9c26871e4f670c7a2648bf0960a1dec83c5456a2308b00c36e64d5785e4a37a2b61c3dcc5142e63a09cb3d4f73e6
-
Filesize
1KB
MD5754d35e538b4875c88bd9bf801c0084c
SHA1bbf3369d046f035629e02a494f76eacabb79e364
SHA2560d1e5d931fb5062bab93e8915b2592c789617f1e1dadd92b1a82cf165b400691
SHA5127d52f95acfcfe456ad07b59bbfdfc15f916318b9f644aecfe9c48ceff97c88fb15e23cb5b4dce5793b994dfa2136c8c25233de2210a21faa8c7915dcd1aab8ac
-
Filesize
6KB
MD549f3ab1233266817ab7d695156986136
SHA1779cc856e4617500fee4d17c772f1270380a0860
SHA256aeba9b2b3d7fa00685b99dd47fb39f8f76f679f8ef7df4bbbde334fc16f35ef2
SHA5122d8d820f9d8ecf5a1e1f0be61c0349f153986ee0ea64d78a8a9ba939dc2593eb26e7b023e833c2c22a263dc28d7f9e20265cf969cd0803fcc29a24256dfa2b3a
-
Filesize
6KB
MD5f09850b086d572799f7548a52c102270
SHA1426f4be3147a22a2818364bb86310fcf204d9075
SHA256eeb486efd7136c5033f52123db605231ef3d61733c66e2ceecac06ead14e1184
SHA512bac7c9f00dee60c373c6f9c7c7eb1cbb708e85a8de86405b9577323ff626c9d1eec5aef611e1b871b49715e279d572273cb39dbf654c87ffa6c22f507f818658
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52393b578f27641530240570c5aebac71
SHA16e231668a7d0904df21fd903919b2f7f089df42b
SHA25635f70728e26ed626a258f63533489145f4f2564543be62b16d936fb57d2ed816
SHA512acffa44f47b21052be8ee1d7d14f6c5b0f1c073239a7cb57caec9d31ac2d4cbd404cc79f370ce78cf661deae2ceee444e8e0a8997165563b1b5753851a946c67
-
Filesize
11KB
MD5742030c3d89900095e568c82758ef7dd
SHA11eb5b0eff06128c7f86d6f131fe9ea94e5d0a650
SHA256b37a2371aabca8b01bbf25036f190cc46375de94c7ea827021214f1a743fcb5b
SHA5120deaffffd6535e381697ec4d6f9f23fc299586a2b48834061ba010d256b49c7a1fb8915433d09c9347b125628504dc00a5b1944bc95b2dc052357f74884da275
-
Filesize
11KB
MD5067d6ea24cf93cb7cd7f8b05c6c6b050
SHA1e0a33cc2aa235f27892a432e6588d8d68467efca
SHA256fbf20c5a930c3fefe7258c463d7e467656d607e27ca4bfa68e06b549fd71e0fa
SHA5123fa89a59acf5d4e7e7963ccd2ca44d353fb2c8e29e135dbbd7ecfe5d4e195af2f7031a7436820befc14c9ee45ca047567b287af69641a430e8c413ee3abd102d
-
Filesize
2.4MB
MD558ecb697be82278aeb969f9c2c12e1d4
SHA1962efe904a67f667065350cf5a865d22a8d9b563
SHA256c8d2aaa1fc32eab170c96f95884a85e47a025f8d74b66a9e7311cba9ee88d10d
SHA5120947b87b1b38d1bcde914e65233a78dc8079f419fc0c0f36e10d4ae2fc07e239b557fa05e899d36ef3158265a7519cf1a83fa44e1d86567ff181c5660966f26c
-
Filesize
41B
MD5ee00aba3bdbf694bb1588c965a077e3a
SHA100491ccb092d576b62d54172bdc09877d0f74c19
SHA2561aaae392ae43103ba228a64247a82cc41767041f6fa6db20246e3f0d49b29750
SHA5121a05c43de1ac0fdbabe97145e7170a1a399fcf2b8463422049ee1e5b13d42c316e7da0cb39b7e10935fc16e69f88d6a5869e114f1ae4fbed15ffd1b313661e49
-
Filesize
1.8MB
MD5f5b545d705d9eb65864751dc06c581fc
SHA15a1e0218d17f6bf8d2caa61f62f8ec9f8dde8f80
SHA256cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde
SHA512cf600b113d2d4808fae4e841234737508100ccbd00615844f80cbf5f38a911641ced0906660a67b69d74c850d760257fb55102fac36de3d61f0e68b982675d9a