Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 16:24
Static task
static1
Behavioral task
behavioral1
Sample
e106c7d47aa2546fb2a2f53a0ec26cc5beb1c39eb4d50927d35bb03ad3b211ff.exe
Resource
win10v2004-20240704-en
General
-
Target
e106c7d47aa2546fb2a2f53a0ec26cc5beb1c39eb4d50927d35bb03ad3b211ff.exe
-
Size
1.8MB
-
MD5
28e316defe36cba8e0812869245a5268
-
SHA1
9721632e16cdd212da1ed418cafee85b59b0c959
-
SHA256
e106c7d47aa2546fb2a2f53a0ec26cc5beb1c39eb4d50927d35bb03ad3b211ff
-
SHA512
45ec3a3804846ce7fb987c88b331ccc5faf347b24ccf474ace258f2649569548b41c16530bc5e66fb5233c7478d2e8b7ed13a00e4230184e584b852729634a8d
-
SSDEEP
49152:agYnxOAbl3WPrsfLZLxpIFQnp8ev9kUn26jC+FN:VYnU2GkLZ1pIFem6jV
Malware Config
Extracted
amadey
4.30
4dd39d
http://77.91.77.82
-
install_dir
ad40971b6b
-
install_file
explorti.exe
-
strings_key
a434973ad22def7137dbb5e059b7081e
-
url_paths
/Hun4Ko/index.php
Extracted
stealc
Nice
http://85.28.47.30
-
url_path
/920475a59bac849d.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ IJEBKKEGDB.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e106c7d47aa2546fb2a2f53a0ec26cc5beb1c39eb4d50927d35bb03ad3b211ff.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e106c7d47aa2546fb2a2f53a0ec26cc5beb1c39eb4d50927d35bb03ad3b211ff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e106c7d47aa2546fb2a2f53a0ec26cc5beb1c39eb4d50927d35bb03ad3b211ff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IJEBKKEGDB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IJEBKKEGDB.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation e106c7d47aa2546fb2a2f53a0ec26cc5beb1c39eb4d50927d35bb03ad3b211ff.exe Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation explorti.exe Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation 358bfcef5b.exe Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 5 IoCs
pid Process 1416 explorti.exe 2664 358bfcef5b.exe 2716 IJEBKKEGDB.exe 3764 explorti.exe 2584 explorti.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Software\Wine e106c7d47aa2546fb2a2f53a0ec26cc5beb1c39eb4d50927d35bb03ad3b211ff.exe Key opened \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Software\Wine IJEBKKEGDB.exe Key opened \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Software\Wine explorti.exe -
Loads dropped DLL 2 IoCs
pid Process 2664 358bfcef5b.exe 2664 358bfcef5b.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2756 e106c7d47aa2546fb2a2f53a0ec26cc5beb1c39eb4d50927d35bb03ad3b211ff.exe 1416 explorti.exe 2664 358bfcef5b.exe 2664 358bfcef5b.exe 2716 IJEBKKEGDB.exe 3764 explorti.exe 2584 explorti.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorti.job e106c7d47aa2546fb2a2f53a0ec26cc5beb1c39eb4d50927d35bb03ad3b211ff.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 358bfcef5b.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 358bfcef5b.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2756 e106c7d47aa2546fb2a2f53a0ec26cc5beb1c39eb4d50927d35bb03ad3b211ff.exe 2756 e106c7d47aa2546fb2a2f53a0ec26cc5beb1c39eb4d50927d35bb03ad3b211ff.exe 1416 explorti.exe 1416 explorti.exe 2664 358bfcef5b.exe 2664 358bfcef5b.exe 4336 msedge.exe 4336 msedge.exe 976 msedge.exe 976 msedge.exe 2664 358bfcef5b.exe 2664 358bfcef5b.exe 3236 identity_helper.exe 3236 identity_helper.exe 2716 IJEBKKEGDB.exe 2716 IJEBKKEGDB.exe 3764 explorti.exe 3764 explorti.exe 2584 explorti.exe 2584 explorti.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2756 e106c7d47aa2546fb2a2f53a0ec26cc5beb1c39eb4d50927d35bb03ad3b211ff.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2664 358bfcef5b.exe 3276 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2756 wrote to memory of 1416 2756 e106c7d47aa2546fb2a2f53a0ec26cc5beb1c39eb4d50927d35bb03ad3b211ff.exe 85 PID 2756 wrote to memory of 1416 2756 e106c7d47aa2546fb2a2f53a0ec26cc5beb1c39eb4d50927d35bb03ad3b211ff.exe 85 PID 2756 wrote to memory of 1416 2756 e106c7d47aa2546fb2a2f53a0ec26cc5beb1c39eb4d50927d35bb03ad3b211ff.exe 85 PID 1416 wrote to memory of 2664 1416 explorti.exe 86 PID 1416 wrote to memory of 2664 1416 explorti.exe 86 PID 1416 wrote to memory of 2664 1416 explorti.exe 86 PID 1416 wrote to memory of 2604 1416 explorti.exe 87 PID 1416 wrote to memory of 2604 1416 explorti.exe 87 PID 1416 wrote to memory of 2604 1416 explorti.exe 87 PID 2604 wrote to memory of 976 2604 cmd.exe 89 PID 2604 wrote to memory of 976 2604 cmd.exe 89 PID 976 wrote to memory of 1124 976 msedge.exe 91 PID 976 wrote to memory of 1124 976 msedge.exe 91 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4392 976 msedge.exe 92 PID 976 wrote to memory of 4336 976 msedge.exe 93 PID 976 wrote to memory of 4336 976 msedge.exe 93 PID 976 wrote to memory of 4112 976 msedge.exe 94 PID 976 wrote to memory of 4112 976 msedge.exe 94 PID 976 wrote to memory of 4112 976 msedge.exe 94 PID 976 wrote to memory of 4112 976 msedge.exe 94 PID 976 wrote to memory of 4112 976 msedge.exe 94 PID 976 wrote to memory of 4112 976 msedge.exe 94 PID 976 wrote to memory of 4112 976 msedge.exe 94 PID 976 wrote to memory of 4112 976 msedge.exe 94 PID 976 wrote to memory of 4112 976 msedge.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\e106c7d47aa2546fb2a2f53a0ec26cc5beb1c39eb4d50927d35bb03ad3b211ff.exe"C:\Users\Admin\AppData\Local\Temp\e106c7d47aa2546fb2a2f53a0ec26cc5beb1c39eb4d50927d35bb03ad3b211ff.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\1000006001\358bfcef5b.exe"C:\Users\Admin\AppData\Local\Temp\1000006001\358bfcef5b.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2664 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\IJEBKKEGDB.exe"4⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\IJEBKKEGDB.exe"C:\Users\Admin\AppData\Local\Temp\IJEBKKEGDB.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\CBAKEBGIID.exe"4⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:3276
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1000008021\8154c775fc.cmd" "3⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0x100,0x128,0x7fffa5be46f8,0x7fffa5be4708,0x7fffa5be47185⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6835008375277774028,1328697642691418600,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:25⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,6835008375277774028,1328697642691418600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,6835008375277774028,1328697642691418600,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3056 /prefetch:85⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6835008375277774028,1328697642691418600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2152 /prefetch:15⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6835008375277774028,1328697642691418600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:15⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6835008375277774028,1328697642691418600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:15⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6835008375277774028,1328697642691418600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:85⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6835008375277774028,1328697642691418600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6835008375277774028,1328697642691418600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:15⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6835008375277774028,1328697642691418600,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:15⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6835008375277774028,1328697642691418600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:15⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6835008375277774028,1328697642691418600,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:15⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6835008375277774028,1328697642691418600,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2932 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3652
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1800
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exeC:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3764
-
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exeC:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
152B
MD50331fa75ac7846bafcf885ea76d47447
SHA15a141ffda430e091153fefc4aa36317422ba28ae
SHA25664b4b2e791644fc04f164ecd13b8b9a3e62669896fb7907bf0a072bbeebaf74a
SHA512f8b960d38d73cf29ce17ea409ef6830cae99d7deafaf2ff59f8347120d81925ff16e38faaa0f7f4c39936472d05d1d131df2a8a383351f138c38afb21c1a60e2
-
Filesize
152B
MD5f0f818d52a59eb6cf9c4dd2a1c844df9
SHA126afc4b28c0287274624690bd5bd4786cfe11d16
SHA25658c0beea55fecbeded2d2c593473149214df818be1e4e4a28c97171dc8179d61
SHA5127e8a1d3a6c8c9b0f1ac497e509e9edbe9e121df1df0147ce4421b8cf526ad238bd146868e177f9ce02e2d8f99cf7bb9ce7db4a582d487bbc921945211a977509
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5839908b56053dbd82242801c174c123e
SHA15aec0daaf1aa056a53c44f41602e9bde5dfb7e2b
SHA25604bdfcb41cb829ae4b025465ef978be31973fba47cb67de0a0b33b6096e19ce5
SHA512f9464c3982158ac1aa52777a548d026abec61c546ee05694b3270918eb74af99c43c96c842d6b65c46c46befe1a0983e43eae97fa3f73a3756e62d64f68f9cb6
-
Filesize
1KB
MD5c86292a511d12e50971fb8b7cdf762d9
SHA16ced2dd0068baa2316c29cbd3766a2f9c48f60de
SHA256af85908aea96388a79049c5aebe61dade4d5ab632a1774c88047d6ec821770b2
SHA512d088458b35dee93eb52e466661d1ae8ea9bfae32f64638385c135dcab747ea9c0d1b48520d71dd58e72cd21fa57ac3ae490e2c7f9ee0cef45a1c3b7aaa07363b
-
Filesize
6KB
MD57362272cef37f016195e33fa5956a80f
SHA1b748371de563d7567caf607e3c23c8ea3ebfa88a
SHA256189cf057480ca42b3d47dcb502944096e2baa6131ab1a498fa6d3e06577cfb2c
SHA512aef09141e5f2595ef2c9a78a5609f8449648fb073416cff65308262d8b4c50dce25c3b0bc3e8b181f1c3a47e3de7e143e8cacb692cfcf4ed7c5c5d591cb2a60a
-
Filesize
6KB
MD540e182b8cb216d663c45fedef5e2b70c
SHA1ef7bbf613bb12a63f2999001a8dee4501c74b913
SHA256a1eca7b3fa98c7acebaf40c670f663efa1957524527e377f612956c2632c38d9
SHA51222a9c824838dc88291fed8bc0add799b7c02ba055c2046f6b1de8bf070132d436c413ac8c056e29a8c355cb4b0acadabeabce0423b82fa0c03936354ee0b9ae9
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD58f4d7b0ae82dfa84c15be4ae487fec06
SHA1e88b12b076f65856bde51bb89656a98b6b01e9fb
SHA256b51b699c9d615b3cf077eacfc10027a6f57034e3e3befa6680c4838df1aa836f
SHA5123ecf12bc81c61e2a177426a81f41fc9ff06142b176454e108bec1cafb7096472dfb2396e647261c5632ce1be5ceb3e6ef48adcf304a1266942481c260d93cfb3
-
Filesize
11KB
MD556712b0c448e7f1e569d2e92adb8e5e8
SHA1809e5fb009eccecaee2bb0d0dc215cf20f454056
SHA256b990062c50e0c55a691477d28b2f1c8c56a650003063a51e54f648d50c9e9d2b
SHA512b6e4e3acaf0390fad8aee7ce9c20d178ee58a46b21f4f4828377a4cd1869b64f574ca5d79eec982d5267f5ff07f116470f9c52c5c5eda4eb53c36f326be97b2e
-
Filesize
2.4MB
MD51777f237c8512068dc8ad44df646b840
SHA1ac5fd06bab176db78de47f0abdcb28e7fd3762e9
SHA256f5e680092bbd672fc6bf7a403a7f186365032494dd055b24bcb6801a9d54dc39
SHA5123a9415e9e8315f4d91d5640542f6e4751ab706a8c54d6b36bf13f0cc042d82db297735705e7abba17f9a9d26334f7c64d2aa2a3cb6831d4f4d1472d71586848c
-
Filesize
41B
MD5ee00aba3bdbf694bb1588c965a077e3a
SHA100491ccb092d576b62d54172bdc09877d0f74c19
SHA2561aaae392ae43103ba228a64247a82cc41767041f6fa6db20246e3f0d49b29750
SHA5121a05c43de1ac0fdbabe97145e7170a1a399fcf2b8463422049ee1e5b13d42c316e7da0cb39b7e10935fc16e69f88d6a5869e114f1ae4fbed15ffd1b313661e49
-
Filesize
1.8MB
MD528e316defe36cba8e0812869245a5268
SHA19721632e16cdd212da1ed418cafee85b59b0c959
SHA256e106c7d47aa2546fb2a2f53a0ec26cc5beb1c39eb4d50927d35bb03ad3b211ff
SHA51245ec3a3804846ce7fb987c88b331ccc5faf347b24ccf474ace258f2649569548b41c16530bc5e66fb5233c7478d2e8b7ed13a00e4230184e584b852729634a8d