Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
amadka.exe
Resource
win7-20240705-en
General
-
Target
amadka.exe
-
Size
1.8MB
-
MD5
e0e2f68f326a6fff31957eb78a24533e
-
SHA1
54e89a7fbaa6c156a27ee66b0d80634d9e67809c
-
SHA256
48c452384ef38cf45d25a69ff42712a7236f523b6f2f5715988c325c0e177d0e
-
SHA512
8ba6961fabcf006e7618ea68e0db1e120b0b26b877e223b83809eb92dcc1ea536af3aa1d56c767676b16486109d245d20870e43cb49ed5ccc4a8baea90d0cadd
-
SSDEEP
49152:3pzmUs0yliNt8whKkvoLUPBa4DCN642ET7QsXO:Iw58w8kgL+a4elpQs
Malware Config
Extracted
amadey
4.30
4dd39d
http://77.91.77.82
-
install_dir
ad40971b6b
-
install_file
explorti.exe
-
strings_key
a434973ad22def7137dbb5e059b7081e
-
url_paths
/Hun4Ko/index.php
Extracted
stealc
sila
http://85.28.47.31
-
url_path
/5499d72b3a3e55be.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amadka.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amadka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amadka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation amadka.exe Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation explorti.exe Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation 680b1a6e49.exe -
Executes dropped EXE 6 IoCs
pid Process 3964 explorti.exe 4004 explorti.exe 1124 c0b3fc37a4.exe 4220 680b1a6e49.exe 6040 explorti.exe 6024 explorti.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine amadka.exe Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Software\Wine explorti.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c0b3fc37a4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000021001\\c0b3fc37a4.exe" explorti.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023460-50.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1952 amadka.exe 3964 explorti.exe 6040 explorti.exe 6024 explorti.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3964 set thread context of 4004 3964 explorti.exe 92 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorti.job amadka.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1696 1124 WerFault.exe 93 -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1952 amadka.exe 1952 amadka.exe 3964 explorti.exe 3964 explorti.exe 6040 explorti.exe 6040 explorti.exe 6024 explorti.exe 6024 explorti.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2652 firefox.exe Token: SeDebugPrivilege 2652 firefox.exe Token: SeDebugPrivilege 2652 firefox.exe Token: SeDebugPrivilege 2652 firefox.exe Token: SeDebugPrivilege 2652 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1952 amadka.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 2652 firefox.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe 4220 680b1a6e49.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2652 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1952 wrote to memory of 3964 1952 amadka.exe 87 PID 1952 wrote to memory of 3964 1952 amadka.exe 87 PID 1952 wrote to memory of 3964 1952 amadka.exe 87 PID 3964 wrote to memory of 4004 3964 explorti.exe 92 PID 3964 wrote to memory of 4004 3964 explorti.exe 92 PID 3964 wrote to memory of 4004 3964 explorti.exe 92 PID 3964 wrote to memory of 4004 3964 explorti.exe 92 PID 3964 wrote to memory of 4004 3964 explorti.exe 92 PID 3964 wrote to memory of 4004 3964 explorti.exe 92 PID 3964 wrote to memory of 4004 3964 explorti.exe 92 PID 3964 wrote to memory of 4004 3964 explorti.exe 92 PID 3964 wrote to memory of 4004 3964 explorti.exe 92 PID 3964 wrote to memory of 1124 3964 explorti.exe 93 PID 3964 wrote to memory of 1124 3964 explorti.exe 93 PID 3964 wrote to memory of 1124 3964 explorti.exe 93 PID 3964 wrote to memory of 4220 3964 explorti.exe 98 PID 3964 wrote to memory of 4220 3964 explorti.exe 98 PID 3964 wrote to memory of 4220 3964 explorti.exe 98 PID 4220 wrote to memory of 1644 4220 680b1a6e49.exe 100 PID 4220 wrote to memory of 1644 4220 680b1a6e49.exe 100 PID 1644 wrote to memory of 2652 1644 firefox.exe 102 PID 1644 wrote to memory of 2652 1644 firefox.exe 102 PID 1644 wrote to memory of 2652 1644 firefox.exe 102 PID 1644 wrote to memory of 2652 1644 firefox.exe 102 PID 1644 wrote to memory of 2652 1644 firefox.exe 102 PID 1644 wrote to memory of 2652 1644 firefox.exe 102 PID 1644 wrote to memory of 2652 1644 firefox.exe 102 PID 1644 wrote to memory of 2652 1644 firefox.exe 102 PID 1644 wrote to memory of 2652 1644 firefox.exe 102 PID 1644 wrote to memory of 2652 1644 firefox.exe 102 PID 1644 wrote to memory of 2652 1644 firefox.exe 102 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 PID 2652 wrote to memory of 3800 2652 firefox.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\amadka.exe"C:\Users\Admin\AppData\Local\Temp\amadka.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"3⤵
- Executes dropped EXE
PID:4004
-
-
C:\Users\Admin\AppData\Local\Temp\1000021001\c0b3fc37a4.exe"C:\Users\Admin\AppData\Local\Temp\1000021001\c0b3fc37a4.exe"3⤵
- Executes dropped EXE
PID:1124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 12844⤵
- Program crash
PID:1696
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000022001\680b1a6e49.exe"C:\Users\Admin\AppData\Local\Temp\1000022001\680b1a6e49.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account4⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1904 -prefsLen 25755 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3a2e605b-313b-4c59-96c0-06dd7489fc13} 2652 "\\.\pipe\gecko-crash-server-pipe.2652" gpu6⤵PID:3800
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2432 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2400 -prefsLen 26675 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {321c10d1-6a56-4e45-acc6-486a273d6090} 2652 "\\.\pipe\gecko-crash-server-pipe.2652" socket6⤵PID:2468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3012 -childID 1 -isForBrowser -prefsHandle 3180 -prefMapHandle 1428 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7bac7235-6399-4fb8-8519-82265eb456e6} 2652 "\\.\pipe\gecko-crash-server-pipe.2652" tab6⤵PID:2428
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4012 -childID 2 -isForBrowser -prefsHandle 2584 -prefMapHandle 3356 -prefsLen 31165 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8190d3a9-4a4b-41f4-9ef0-d699ea00c4c8} 2652 "\\.\pipe\gecko-crash-server-pipe.2652" tab6⤵PID:1124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4776 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4772 -prefMapHandle 4768 -prefsLen 31165 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {106a14a1-2019-49e8-89a6-72f82bc723b1} 2652 "\\.\pipe\gecko-crash-server-pipe.2652" utility6⤵
- Checks processor information in registry
PID:5516
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5400 -childID 3 -isForBrowser -prefsHandle 5380 -prefMapHandle 4180 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {44785e5b-34e8-49c7-893d-3b31d4264da1} 2652 "\\.\pipe\gecko-crash-server-pipe.2652" tab6⤵PID:3176
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5588 -childID 4 -isForBrowser -prefsHandle 5664 -prefMapHandle 5660 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a07a55e5-71b5-40e6-98c6-8bcf50418422} 2652 "\\.\pipe\gecko-crash-server-pipe.2652" tab6⤵PID:2492
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5556 -childID 5 -isForBrowser -prefsHandle 5800 -prefMapHandle 5808 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3ca3fa8b-9893-403f-a20e-1a78dbb71612} 2652 "\\.\pipe\gecko-crash-server-pipe.2652" tab6⤵PID:1448
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1124 -ip 11241⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exeC:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6040
-
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exeC:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3mrom4gn.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD53f21735ecbd05700a9c7034ae2e1be70
SHA1ac5270795b2211d579ee18aef9c943759aad8bc2
SHA256580b8c10df39d3e02b5fa073c703526edcab7ae35025a69ffb3f02338e4e699f
SHA51216fba0d1d7c9c70644223ed29ca27ac19e85d2f4abd1982840c60e0c455fb058098d2930bdeff02343a4de86851d7fdef162b93d00f76eacea43457b14c5c6db
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\3mrom4gn.default-release\cache2\entries\8A2034D325DC0B5C9E11EDDA3FC70A54C8DC1C0D
Filesize13KB
MD5fb09de14db445d2ac63e8f6a5e631b91
SHA1074b4b7fe1e7f196e1df6873e271bf500d618cbe
SHA256df9b67ebc72941ebc4d63b1840cbf2db2cf8a192dd1182c525fff65b19b120d5
SHA51220b81ea0ab7aaabfd84f238880478562712ebd449850cb583196c29726ce4a7246ad19a9e78f4666b37eeb023b602075fb563583126e0544c6090ba5e7d8bb39
-
Filesize
199KB
MD54ee0b6214eb06ae32de0773dc4e5e30a
SHA14c1bcf6f93fd67a82d1bac890df32ee82027af32
SHA25618b8662e5d0b1f00302bbe26ddb5fa099da34a0d3255180d2358d6066bb42348
SHA5125f2e2cea8ab75c0b2d79b0466531787beb2ca234e7e1b32d505fb61aa5a5843226847874e7ae890cce061b5de40b24567bd9d00a8eec08c827209e375f50aed9
-
Filesize
1.2MB
MD588ea6cd6c7c2f278a05067d3727250e8
SHA1a9a9147048637cbc4ab69ed9f91162f5cb8c6b70
SHA256560fb71feb7abad3bec0b88e3ff170f1ea0dad82f717b2c5f2739553973682f5
SHA5121829a1e985469acc06d2ab24c62ef5f4a6774563978c84a4a9acaa72b8aeb66d28ada338ec9168efe92e438d9179c114c9256019557d957d88bf59249c3ecda6
-
Filesize
1.8MB
MD5e0e2f68f326a6fff31957eb78a24533e
SHA154e89a7fbaa6c156a27ee66b0d80634d9e67809c
SHA25648c452384ef38cf45d25a69ff42712a7236f523b6f2f5715988c325c0e177d0e
SHA5128ba6961fabcf006e7618ea68e0db1e120b0b26b877e223b83809eb92dcc1ea536af3aa1d56c767676b16486109d245d20870e43cb49ed5ccc4a8baea90d0cadd
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3mrom4gn.default-release\AlternateServices.bin
Filesize8KB
MD5c98916bd9ebed9b50477dafed0cc050c
SHA1b5608a34a717211a3ea0982cfa83dd2dfdd2a001
SHA25608cd1f120bd163fbf0d5b7ac9834633afef2b6872647b5782ead5c16846c6df2
SHA512d795467f8915c52bf99a48cfe427536762b134c418605202c031139d4c4495301f1f8badc9473b5a634b11f47278d6a8728a06dd507b2522a95972e8e8faa9dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3mrom4gn.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5401c34bcfff2c0496efb19a3fbd67e98
SHA1aa17f2506c53b3330448306fc546e3d4f2dd8ef6
SHA256df975fa45e832cd10e3a4aecf272650f0f5f2b5ff0799335c471155449350149
SHA5128bc45a7aa44b432cedc12e6ae612218b6175602f4a9273358898e54dfbea02f8e48571d1cd14c715e82f10c0447b69ef9bdb093dd03ffe98bf7a3d05013ef10c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3mrom4gn.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD59d2a3556b702a74639954c728e38e51f
SHA1b954f2d6c4fc42e619bdb1981e99c372ffe4d8a7
SHA256f5afe9a32879cb576958896feb103c994fff35f84eb57be8608e0a32fa4d5c05
SHA5120aa18ba6ff87f49872bedcc2b0b159564f2bb7ac426c6b06e926e03aa2042d935b63c1eda4b961372fda5695645648ef87bb22435c8d071a194e4f0548ec1523
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3mrom4gn.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5fe8576e701d54736d0f1902ebff9d32e
SHA169f613595dbdafd73c05247a3e0741b6aac83115
SHA256a7aa9959c86a615585f16f63aba2d76c54b0d72f58d3a21f5bac199495c2443d
SHA512731ca9702f53a65df2a4f463937113b4a9d577a70323ce038eb3a90b84abc700b5f19b0ff7136ed2e8b21eebda557423e856de3e979618d7c164eda684f33940
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3mrom4gn.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5ca5597ab8938bfa0af4363f0367e2669
SHA1597b316d6fa09291781ecd5548d271ac71e1d372
SHA2568425cf81d18a0ab4164347b41728968314671f02f0a040e20924d42dc7eac4f8
SHA51297576043b6f780e385c64a39251687a47f100f2e9ac833d2028e0f6d44b4ea6cdcc2a09ada03a913099e433db7dee273da26e721a70c848febdc7474e25c88e1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3mrom4gn.default-release\datareporting\glean\pending_pings\46152699-0a81-4b9d-a77d-5c833cad6ca2
Filesize659B
MD5bcb197115e1457aeb7e31c5d66edf3f0
SHA1470eed60b4762480df9b4521e132e2c562bad159
SHA2563a46ba09e9b10f6f705d1d4f441deb4a104d0c113dd8da1b5ed548910e90a946
SHA512879fe6a98f9c260be9fba64aaf29f9dcc8024dbfbfd2da680768dc55a752522b97431b58a7b1558c2824f4b0099f1f47fd8915ceefa047292d4d64aed06ca62d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3mrom4gn.default-release\datareporting\glean\pending_pings\7f9b9d59-c3a7-45fd-adc6-2d25ef8ace7e
Filesize982B
MD58d2f8fe0186b9c7694664cb4fb4da8a0
SHA1f17f0ed6878deee494ca012d7cc61e200874b6cc
SHA25671e0d5d2e2fec25b0d5fa14864fe8478798f2db4a5528bb3500bbe5e59adcb5a
SHA51204d6af7fae49587fd86ab5314ac08814591997c7ef58888afa02fd5a1976ba98a9d78a18514ee067bde452455ddb5b173e7f3d75dfe4d04f0927abd384486d26
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3mrom4gn.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3mrom4gn.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3mrom4gn.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\3mrom4gn.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
13KB
MD5e8353243158104eae01859f6a43ae197
SHA17b3441df8c0bb4ea0254911e16c338316603bc5c
SHA2567bb026ec6f7be868d95e14ac5b1f6660453bbb5fbcaa7aa983ec93744763cb8d
SHA512f2adefe64127eba5547b8a8c470bede0403b6051da061ec3c6a1796974fd84c64aba2b6798a8d7674e8d50a3ec6abdaeac8af418e0e507b879e3d31681049bdf
-
Filesize
8KB
MD58d7d7444f6638321f1a72959c1c21ac2
SHA1f3f68547ab00e45d3fb71bcb4cba812625c270cc
SHA25635e4f1abb7ab281dd80f751bfd993b6dd369b6667283839293daf46303ee9885
SHA512c87161fba007df513388017be0e935fd63dfcdf722372cb9277f3e72c8aeb9ca03a68805cc315642f93cefb7650c3ef40e28752dd734df18034bb2585e340e9b
-
Filesize
16KB
MD5b023261d115124098a1a2070d51e812d
SHA13b5b0b67655221a383eda979057d082a4c837dc2
SHA2568091008eba975bca2771367b2789b73824ba1e510c7e2e726f3caba093c7befd
SHA512ed94cd25d26a7add2bbd632e3e875fdc178eb609c64c69f811fc1e073087577be682ec354ae3273078e83f7f3bc037c7e363a7df476df3bf5fdaa94bc9350c00