Analysis
-
max time kernel
150s -
max time network
163s -
platform
windows11-21h2_x64 -
resource
win11-20240704-en -
resource tags
arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-07-2024 11:28
Static task
static1
Behavioral task
behavioral1
Sample
cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe
Resource
win10v2004-20240704-en
General
-
Target
cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe
-
Size
1.8MB
-
MD5
f5b545d705d9eb65864751dc06c581fc
-
SHA1
5a1e0218d17f6bf8d2caa61f62f8ec9f8dde8f80
-
SHA256
cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde
-
SHA512
cf600b113d2d4808fae4e841234737508100ccbd00615844f80cbf5f38a911641ced0906660a67b69d74c850d760257fb55102fac36de3d61f0e68b982675d9a
-
SSDEEP
49152:d600VbYNqsEV53kal9CLgM7D25DNAKEhQS0OodHtT:dIVJ3l9CUwD25Du0OoHT
Malware Config
Extracted
amadey
4.30
4dd39d
http://77.91.77.82
-
install_dir
ad40971b6b
-
install_file
explorti.exe
-
strings_key
a434973ad22def7137dbb5e059b7081e
-
url_paths
/Hun4Ko/index.php
Extracted
stealc
Nice
http://85.28.47.30
-
url_path
/920475a59bac849d.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ HJJECBKKEC.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion HJJECBKKEC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion HJJECBKKEC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe -
Executes dropped EXE 5 IoCs
pid Process 2848 explorti.exe 2740 146b1bda79.exe 5044 HJJECBKKEC.exe 2236 explorti.exe 2520 explorti.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3119450053-3073099215-1938054741-1000\Software\Wine HJJECBKKEC.exe Key opened \REGISTRY\USER\S-1-5-21-3119450053-3073099215-1938054741-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-3119450053-3073099215-1938054741-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-3119450053-3073099215-1938054741-1000\Software\Wine cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe Key opened \REGISTRY\USER\S-1-5-21-3119450053-3073099215-1938054741-1000\Software\Wine explorti.exe -
Loads dropped DLL 2 IoCs
pid Process 2740 146b1bda79.exe 2740 146b1bda79.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4948 cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe 2848 explorti.exe 2740 146b1bda79.exe 2740 146b1bda79.exe 2740 146b1bda79.exe 5044 HJJECBKKEC.exe 2236 explorti.exe 2520 explorti.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorti.job cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 146b1bda79.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 146b1bda79.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4948 cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe 4948 cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe 2848 explorti.exe 2848 explorti.exe 2740 146b1bda79.exe 2740 146b1bda79.exe 1584 msedge.exe 1584 msedge.exe 4364 msedge.exe 4364 msedge.exe 2740 146b1bda79.exe 2740 146b1bda79.exe 2100 identity_helper.exe 2100 identity_helper.exe 5044 HJJECBKKEC.exe 5044 HJJECBKKEC.exe 1608 msedge.exe 1608 msedge.exe 2236 explorti.exe 2236 explorti.exe 2520 explorti.exe 2520 explorti.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4948 cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2740 146b1bda79.exe 704 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4948 wrote to memory of 2848 4948 cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe 82 PID 4948 wrote to memory of 2848 4948 cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe 82 PID 4948 wrote to memory of 2848 4948 cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe 82 PID 2848 wrote to memory of 2740 2848 explorti.exe 83 PID 2848 wrote to memory of 2740 2848 explorti.exe 83 PID 2848 wrote to memory of 2740 2848 explorti.exe 83 PID 2848 wrote to memory of 3632 2848 explorti.exe 84 PID 2848 wrote to memory of 3632 2848 explorti.exe 84 PID 2848 wrote to memory of 3632 2848 explorti.exe 84 PID 3632 wrote to memory of 4364 3632 cmd.exe 86 PID 3632 wrote to memory of 4364 3632 cmd.exe 86 PID 4364 wrote to memory of 4008 4364 msedge.exe 89 PID 4364 wrote to memory of 4008 4364 msedge.exe 89 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 2964 4364 msedge.exe 90 PID 4364 wrote to memory of 1584 4364 msedge.exe 91 PID 4364 wrote to memory of 1584 4364 msedge.exe 91 PID 4364 wrote to memory of 1764 4364 msedge.exe 92 PID 4364 wrote to memory of 1764 4364 msedge.exe 92 PID 4364 wrote to memory of 1764 4364 msedge.exe 92 PID 4364 wrote to memory of 1764 4364 msedge.exe 92 PID 4364 wrote to memory of 1764 4364 msedge.exe 92 PID 4364 wrote to memory of 1764 4364 msedge.exe 92 PID 4364 wrote to memory of 1764 4364 msedge.exe 92 PID 4364 wrote to memory of 1764 4364 msedge.exe 92 PID 4364 wrote to memory of 1764 4364 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe"C:\Users\Admin\AppData\Local\Temp\cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\1000006001\146b1bda79.exe"C:\Users\Admin\AppData\Local\Temp\1000006001\146b1bda79.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2740 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\HJJECBKKEC.exe"4⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\HJJECBKKEC.exe"C:\Users\Admin\AppData\Local\Temp\HJJECBKKEC.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\IDAAFBGDBK.exe"4⤵
- Suspicious use of SetWindowsHookEx
PID:704
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1000008021\71bb58696e.cmd" "3⤵
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8945b3cb8,0x7ff8945b3cc8,0x7ff8945b3cd85⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,11804881910328594554,12496299256030107196,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1944 /prefetch:25⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1928,11804881910328594554,12496299256030107196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1928,11804881910328594554,12496299256030107196,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2556 /prefetch:85⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,11804881910328594554,12496299256030107196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:15⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,11804881910328594554,12496299256030107196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:15⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,11804881910328594554,12496299256030107196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:15⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,11804881910328594554,12496299256030107196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:15⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,11804881910328594554,12496299256030107196,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:15⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,11804881910328594554,12496299256030107196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:15⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,11804881910328594554,12496299256030107196,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:15⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1928,11804881910328594554,12496299256030107196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5888 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1928,11804881910328594554,12496299256030107196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,11804881910328594554,12496299256030107196,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1708 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exeC:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2236
-
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exeC:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
152B
MD56c1de55e8af0859bea07b6af77782896
SHA1d5efde7bcf31d692d697ebbc54ccd13fb3624856
SHA256130afd8eb97d11640a28231e9314983eee9eff75964c93abd71e84e6412f710f
SHA5129664d41b0b1767ddc4012318fca427edf9606c525f868a5ba98e5987bf5e71e4710dd19a0ed7223c706588b5803f3b118ee949c51d6fd99696049befff5fd510
-
Filesize
152B
MD50176e968a02096540e4a096219a8fe34
SHA1cd301ea619d7c92daf64446caea1f1293da48373
SHA256f9319c68cc75bc8e334037d946cc89ad65605606c1bfd12a2fe2ebd711b14067
SHA512b6aba8640823d43f8968ff31a2e5a48b6f6def43ea6f83cef801294ea1ca9eb1fa16cec516893485b650d7b4407e34536b380712fb72bc9da581cc2e1e0ae2d8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD51eec805e52351b8e7c24739c80cbc628
SHA147a5eabc523ca5c245c85cfb6fbff06d45c0c8f9
SHA2564384965cce7130b2d42c3bbb5db8e2e83f5dae5946d9ba872e4782d8acfaac0a
SHA5122f9c867c21e062749b93aa7e417e7b86da336f7367fb982eef20f3ae0e21aae7a9e088d80047a9d2111e7646b4510b85f9a5201f8df6b9d4080fa07296298c60
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD59a0c5e6b2c71416965b6c43b3f4f48fe
SHA15429ebd1226318449e2e7ba3d023b24e7ad3c43a
SHA256f013045a9e9f10a0d58ceca8f4fa2fd129367b6616f95a8b5b424d42423e3ab3
SHA512dfdd229496c6c2c6dfbc2cf737f48fe291238d823904c05bc821f17f2b0b4e7970168f94eebd84f3679898c1f80b46d43a0e5a4e1aed2b4b0e4c589605966968
-
Filesize
5KB
MD5b309d0beadd91661f8d53b3b6cd8b66a
SHA167eb3b80ef6e5b40644c002fbe273ac9325ba872
SHA25666f2254285ae03e15e2e7a8b300c4752ec50cd712c8af6eb8cb9b87a7ecfc826
SHA512462ddc602f33971e261d87c0b704f303da79915a13328ab23ca82dd3d2fa5622108cccfd1839a7f2c39d1edf07ff99f967ffa179701b135650b4304e7a0846dd
-
Filesize
6KB
MD52198320ae01dcbb5f89fa408e0fde4ca
SHA111a3e614f1471c6703b7cf5d75aee3d906ee8de6
SHA256bcc53edd7c3760935625c4116b7641c9425b88b77d019d7a1fa0ff9367640059
SHA512b2b7ed20bc8db8faf56e77903aa804e8c4c44267d835fb0a32f6e61bc6e1d9bd5149cec948d90e11c67e3089ee5f4b25a2b02ed80d94da221791dfbbd6ea1e29
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5ae170a30716fd171ab6e26a79ac8b373
SHA137a74f675cbfa6dc8fda6f23401fad05090a293d
SHA256259be96884e1c276a9d9593eeb20894809ddc1585a26bd0ae66b757ed35625ff
SHA512b07c0c6ca33089c6baa15d130a49427ecc8b1299e58cef7e76d890b1afb289a8f86fb177403aab5c47b39b216b2dccdfbaa4e86b74a8493097615ae0dd8cf952
-
Filesize
11KB
MD5da953755016f243dd65f3fb9875ba383
SHA15bdaf5c59af952132dc20c899199916faa3653c6
SHA256dc0d143cbde6e033d98a2c3eef51e86191e993afadc4951b84edaf6e2c1293a0
SHA51244e0cd6930b257cb33dc7f5854a094d6771c2583cf9b4d3f88e7ecb8507b9927bf438b6c1c04ff640f23486d3904cdcd45cd8fcde044ffcc7a4ac1a81df5441b
-
Filesize
2.4MB
MD558ecb697be82278aeb969f9c2c12e1d4
SHA1962efe904a67f667065350cf5a865d22a8d9b563
SHA256c8d2aaa1fc32eab170c96f95884a85e47a025f8d74b66a9e7311cba9ee88d10d
SHA5120947b87b1b38d1bcde914e65233a78dc8079f419fc0c0f36e10d4ae2fc07e239b557fa05e899d36ef3158265a7519cf1a83fa44e1d86567ff181c5660966f26c
-
Filesize
41B
MD5ee00aba3bdbf694bb1588c965a077e3a
SHA100491ccb092d576b62d54172bdc09877d0f74c19
SHA2561aaae392ae43103ba228a64247a82cc41767041f6fa6db20246e3f0d49b29750
SHA5121a05c43de1ac0fdbabe97145e7170a1a399fcf2b8463422049ee1e5b13d42c316e7da0cb39b7e10935fc16e69f88d6a5869e114f1ae4fbed15ffd1b313661e49
-
Filesize
1.8MB
MD5f5b545d705d9eb65864751dc06c581fc
SHA15a1e0218d17f6bf8d2caa61f62f8ec9f8dde8f80
SHA256cd76f05a2948f291245d29bcbd8f61f3280e91c31787c730b65525af56dacbde
SHA512cf600b113d2d4808fae4e841234737508100ccbd00615844f80cbf5f38a911641ced0906660a67b69d74c850d760257fb55102fac36de3d61f0e68b982675d9a