Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-08-2024 08:54
Static task
static1
Behavioral task
behavioral1
Sample
343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe
Resource
win11-20240802-en
General
-
Target
343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe
-
Size
941KB
-
MD5
f5b93d3369d1ae23d6e150e75d2b6a80
-
SHA1
6f6914770748ad148154e1576d9c6fe6887f2290
-
SHA256
343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81
-
SHA512
dcedaed2df62386b980cc1957f224fc48224aeb0f5bf8d0241acc7a0a552b0ae90697ed333189963540f8391cbecfa0977a8685723c5025c9a4f95918032cf1e
-
SSDEEP
12288:pX8RkdnkRZOwECM98hfcunLIYCx28xur5GbYkpMalQBEnxSSraaoKZ2A:SRPRAqM98qCRCxnx7YpauBML
Malware Config
Extracted
amadey
4.41
2da029
http://api.garageserviceoperation.com
-
install_dir
69c36458f5
-
install_file
ednfosi.exe
-
strings_key
0abf6f7bfab99a62ed876fec107361d0
-
url_paths
/CoreOPT/index.php
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
redline
LiveTraffic
20.52.165.210:39030
Extracted
redline
185.215.113.67:21405
Extracted
stealc
default
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/memory/1484-108-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral2/files/0x000100000002aae8-250.dat family_redline behavioral2/memory/4528-274-0x0000000000780000-0x00000000007D2000-memory.dmp family_redline -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ eb894687b1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell and hide display window.
pid Process 248 powershell.exe 5072 powershell.exe 3892 powershell.exe 2484 powershell.exe 4952 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eb894687b1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eb894687b1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Drops startup file 6 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\D41M2uPZQwX55GJ10KYq4lFD.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KPXU8hk1PEwtlcmUoXaco1VY.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tchuC3p2ZTRSqDlT9C4WAn2X.bat AddInProcess32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gGFq5IYYfRkJsdfvHNflwJNU.bat AddInProcess32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DEzuS5804x4H3wm8MP9aALUj.bat AddInProcess32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\5l3HrMUC67B4n5ukzjVulDqV.bat jsc.exe -
Executes dropped EXE 31 IoCs
pid Process 3524 ednfosi.exe 1560 ednfosi.exe 4676 eb894687b1.exe 4280 axplong.exe 2492 kitty.exe 4968 GOLD.exe 1600 axplong.exe 1616 ednfosi.exe 2832 crypteda.exe 3596 ufileee.exe 2012 newalp.exe 1380 Operation6572.exe 1068 TpTsjoleAeTFwOgyRUrt85JB.exe 2568 Hkbsse.exe 5000 RTSX4eXm5mb5FNE7vyFTSnoM.exe 4528 06082025.exe 4872 Install.exe 4552 Install.exe 4944 YZItdAvbIu.exe 960 UutQmtGMkx.exe 3672 stealc_default.exe 2440 umrfile%20.exe 3216 pu7WxILpAoyOQL9JSknidye2.exe 124 8g8v3Nkpc2ixSpdQNp2tH1fH.exe 4904 Install.exe 2096 Install.exe 3880 ednfosi.exe 4724 Hkbsse.exe 1752 Install.exe 1692 axplong.exe 3308 ednfosi.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000\Software\Wine eb894687b1.exe Key opened \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000\Software\Wine axplong.exe -
Indirect Command Execution 1 TTPs 17 IoCs
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.
pid Process 3372 forfiles.exe 3936 forfiles.exe 2436 forfiles.exe 2164 forfiles.exe 4092 forfiles.exe 1244 forfiles.exe 3436 forfiles.exe 3600 forfiles.exe 3616 forfiles.exe 3268 forfiles.exe 4900 forfiles.exe 3452 forfiles.exe 2844 forfiles.exe 2144 forfiles.exe 2440 forfiles.exe 4468 forfiles.exe 2440 forfiles.exe -
Loads dropped DLL 2 IoCs
pid Process 3672 stealc_default.exe 3672 stealc_default.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
flow ioc 48 raw.githubusercontent.com 16 raw.githubusercontent.com 16 iplogger.com 23 pastebin.com 27 raw.githubusercontent.com 50 iplogger.com 16 pastebin.com 19 raw.githubusercontent.com 42 raw.githubusercontent.com 43 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4676 eb894687b1.exe 4280 axplong.exe 1600 axplong.exe 1692 axplong.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 4860 set thread context of 3688 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 83 PID 3524 set thread context of 1560 3524 ednfosi.exe 86 PID 4968 set thread context of 1484 4968 GOLD.exe 95 PID 3596 set thread context of 944 3596 ufileee.exe 102 PID 2832 set thread context of 1788 2832 crypteda.exe 110 PID 2440 set thread context of 4296 2440 umrfile%20.exe 150 PID 1616 set thread context of 3880 1616 ednfosi.exe 137 -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\Tasks\ednfosi.job 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe File created C:\Windows\Tasks\axplong.job eb894687b1.exe File created C:\Windows\Tasks\Hkbsse.job newalp.exe File created C:\Windows\Tasks\bvobQgTgLADiTwblyc.job schtasks.exe File opened for modification C:\Windows\Tasks\bvobQgTgLADiTwblyc.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2340 2492 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06082025.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb894687b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pu7WxILpAoyOQL9JSknidye2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language newalp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkbsse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gpupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ednfosi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UutQmtGMkx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language forfiles.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOLD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ednfosi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 48 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Install.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\SlowContextMenuEntries = 6024b221ea3a6910a2dc08002b30309d680100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Install.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3140 schtasks.exe 1484 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 3524 ednfosi.exe 3524 ednfosi.exe 3524 ednfosi.exe 3524 ednfosi.exe 4676 eb894687b1.exe 4676 eb894687b1.exe 4280 axplong.exe 4280 axplong.exe 1600 axplong.exe 1600 axplong.exe 1616 ednfosi.exe 1616 ednfosi.exe 1616 ednfosi.exe 1616 ednfosi.exe 1616 ednfosi.exe 248 powershell.exe 248 powershell.exe 248 powershell.exe 3672 stealc_default.exe 3672 stealc_default.exe 1380 Operation6572.exe 1380 Operation6572.exe 5072 powershell.exe 5072 powershell.exe 4944 YZItdAvbIu.exe 4944 YZItdAvbIu.exe 5072 powershell.exe 960 UutQmtGMkx.exe 960 UutQmtGMkx.exe 1484 RegAsm.exe 1484 RegAsm.exe 1484 RegAsm.exe 1484 RegAsm.exe 1484 RegAsm.exe 1484 RegAsm.exe 3892 powershell.exe 3892 powershell.exe 3892 powershell.exe 3672 stealc_default.exe 3672 stealc_default.exe 4528 06082025.exe 4528 06082025.exe 2484 powershell.exe 2484 powershell.exe 2484 powershell.exe 4528 06082025.exe 4528 06082025.exe 4528 06082025.exe 4528 06082025.exe 1692 axplong.exe 1692 axplong.exe 3308 ednfosi.exe 3308 ednfosi.exe 4952 powershell.exe 4952 powershell.exe 4952 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe Token: SeDebugPrivilege 3524 ednfosi.exe Token: SeDebugPrivilege 1616 ednfosi.exe Token: SeDebugPrivilege 944 AddInProcess32.exe Token: SeDebugPrivilege 1380 Operation6572.exe Token: SeBackupPrivilege 1380 Operation6572.exe Token: SeSecurityPrivilege 1380 Operation6572.exe Token: SeSecurityPrivilege 1380 Operation6572.exe Token: SeSecurityPrivilege 1380 Operation6572.exe Token: SeSecurityPrivilege 1380 Operation6572.exe Token: SeDebugPrivilege 960 UutQmtGMkx.exe Token: SeDebugPrivilege 4944 YZItdAvbIu.exe Token: SeBackupPrivilege 960 UutQmtGMkx.exe Token: SeSecurityPrivilege 960 UutQmtGMkx.exe Token: SeSecurityPrivilege 960 UutQmtGMkx.exe Token: SeSecurityPrivilege 960 UutQmtGMkx.exe Token: SeSecurityPrivilege 960 UutQmtGMkx.exe Token: SeBackupPrivilege 4944 YZItdAvbIu.exe Token: SeSecurityPrivilege 4944 YZItdAvbIu.exe Token: SeSecurityPrivilege 4944 YZItdAvbIu.exe Token: SeSecurityPrivilege 4944 YZItdAvbIu.exe Token: SeSecurityPrivilege 4944 YZItdAvbIu.exe Token: SeDebugPrivilege 248 powershell.exe Token: SeDebugPrivilege 5072 powershell.exe Token: SeIncreaseQuotaPrivilege 1244 WMIC.exe Token: SeSecurityPrivilege 1244 WMIC.exe Token: SeTakeOwnershipPrivilege 1244 WMIC.exe Token: SeLoadDriverPrivilege 1244 WMIC.exe Token: SeSystemProfilePrivilege 1244 WMIC.exe Token: SeSystemtimePrivilege 1244 WMIC.exe Token: SeProfSingleProcessPrivilege 1244 WMIC.exe Token: SeIncBasePriorityPrivilege 1244 WMIC.exe Token: SeCreatePagefilePrivilege 1244 WMIC.exe Token: SeBackupPrivilege 1244 WMIC.exe Token: SeRestorePrivilege 1244 WMIC.exe Token: SeShutdownPrivilege 1244 WMIC.exe Token: SeDebugPrivilege 1244 WMIC.exe Token: SeSystemEnvironmentPrivilege 1244 WMIC.exe Token: SeRemoteShutdownPrivilege 1244 WMIC.exe Token: SeUndockPrivilege 1244 WMIC.exe Token: SeManageVolumePrivilege 1244 WMIC.exe Token: 33 1244 WMIC.exe Token: 34 1244 WMIC.exe Token: 35 1244 WMIC.exe Token: 36 1244 WMIC.exe Token: SeIncreaseQuotaPrivilege 1244 WMIC.exe Token: SeSecurityPrivilege 1244 WMIC.exe Token: SeTakeOwnershipPrivilege 1244 WMIC.exe Token: SeLoadDriverPrivilege 1244 WMIC.exe Token: SeSystemProfilePrivilege 1244 WMIC.exe Token: SeSystemtimePrivilege 1244 WMIC.exe Token: SeProfSingleProcessPrivilege 1244 WMIC.exe Token: SeIncBasePriorityPrivilege 1244 WMIC.exe Token: SeCreatePagefilePrivilege 1244 WMIC.exe Token: SeBackupPrivilege 1244 WMIC.exe Token: SeRestorePrivilege 1244 WMIC.exe Token: SeShutdownPrivilege 1244 WMIC.exe Token: SeDebugPrivilege 1244 WMIC.exe Token: SeSystemEnvironmentPrivilege 1244 WMIC.exe Token: SeRemoteShutdownPrivilege 1244 WMIC.exe Token: SeUndockPrivilege 1244 WMIC.exe Token: SeManageVolumePrivilege 1244 WMIC.exe Token: 33 1244 WMIC.exe Token: 34 1244 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4860 wrote to memory of 3908 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 82 PID 4860 wrote to memory of 3908 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 82 PID 4860 wrote to memory of 3908 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 82 PID 4860 wrote to memory of 3908 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 82 PID 4860 wrote to memory of 3908 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 82 PID 4860 wrote to memory of 3908 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 82 PID 4860 wrote to memory of 3908 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 82 PID 4860 wrote to memory of 3908 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 82 PID 4860 wrote to memory of 3908 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 82 PID 4860 wrote to memory of 3908 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 82 PID 4860 wrote to memory of 3688 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 83 PID 4860 wrote to memory of 3688 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 83 PID 4860 wrote to memory of 3688 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 83 PID 4860 wrote to memory of 3688 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 83 PID 4860 wrote to memory of 3688 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 83 PID 4860 wrote to memory of 3688 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 83 PID 4860 wrote to memory of 3688 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 83 PID 4860 wrote to memory of 3688 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 83 PID 4860 wrote to memory of 3688 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 83 PID 4860 wrote to memory of 3688 4860 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 83 PID 3688 wrote to memory of 3524 3688 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 85 PID 3688 wrote to memory of 3524 3688 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 85 PID 3688 wrote to memory of 3524 3688 343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe 85 PID 3524 wrote to memory of 1560 3524 ednfosi.exe 86 PID 3524 wrote to memory of 1560 3524 ednfosi.exe 86 PID 3524 wrote to memory of 1560 3524 ednfosi.exe 86 PID 3524 wrote to memory of 1560 3524 ednfosi.exe 86 PID 3524 wrote to memory of 1560 3524 ednfosi.exe 86 PID 3524 wrote to memory of 1560 3524 ednfosi.exe 86 PID 3524 wrote to memory of 1560 3524 ednfosi.exe 86 PID 3524 wrote to memory of 1560 3524 ednfosi.exe 86 PID 3524 wrote to memory of 1560 3524 ednfosi.exe 86 PID 3524 wrote to memory of 1560 3524 ednfosi.exe 86 PID 1560 wrote to memory of 4676 1560 ednfosi.exe 87 PID 1560 wrote to memory of 4676 1560 ednfosi.exe 87 PID 1560 wrote to memory of 4676 1560 ednfosi.exe 87 PID 4676 wrote to memory of 4280 4676 eb894687b1.exe 88 PID 4676 wrote to memory of 4280 4676 eb894687b1.exe 88 PID 4676 wrote to memory of 4280 4676 eb894687b1.exe 88 PID 1560 wrote to memory of 2492 1560 ednfosi.exe 89 PID 1560 wrote to memory of 2492 1560 ednfosi.exe 89 PID 1560 wrote to memory of 2492 1560 ednfosi.exe 89 PID 4280 wrote to memory of 4968 4280 axplong.exe 93 PID 4280 wrote to memory of 4968 4280 axplong.exe 93 PID 4280 wrote to memory of 4968 4280 axplong.exe 93 PID 4968 wrote to memory of 1484 4968 GOLD.exe 95 PID 4968 wrote to memory of 1484 4968 GOLD.exe 95 PID 4968 wrote to memory of 1484 4968 GOLD.exe 95 PID 4968 wrote to memory of 1484 4968 GOLD.exe 95 PID 4968 wrote to memory of 1484 4968 GOLD.exe 95 PID 4968 wrote to memory of 1484 4968 GOLD.exe 95 PID 4968 wrote to memory of 1484 4968 GOLD.exe 95 PID 4968 wrote to memory of 1484 4968 GOLD.exe 95 PID 4280 wrote to memory of 2832 4280 axplong.exe 98 PID 4280 wrote to memory of 2832 4280 axplong.exe 98 PID 4280 wrote to memory of 2832 4280 axplong.exe 98 PID 1560 wrote to memory of 3596 1560 ednfosi.exe 99 PID 1560 wrote to memory of 3596 1560 ednfosi.exe 99 PID 3596 wrote to memory of 944 3596 ufileee.exe 102 PID 3596 wrote to memory of 944 3596 ufileee.exe 102 PID 3596 wrote to memory of 944 3596 ufileee.exe 102 PID 3596 wrote to memory of 944 3596 ufileee.exe 102 PID 3596 wrote to memory of 944 3596 ufileee.exe 102 PID 3596 wrote to memory of 944 3596 ufileee.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe"C:\Users\Admin\AppData\Local\Temp\343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe"C:\Users\Admin\AppData\Local\Temp\343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe"2⤵PID:3908
-
-
C:\Users\Admin\AppData\Local\Temp\343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe"C:\Users\Admin\AppData\Local\Temp\343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\1000031001\eb894687b1.exe"C:\Users\Admin\AppData\Local\Temp\1000031001\eb894687b1.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\1000002001\GOLD.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\GOLD.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1484
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵PID:2980
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵
- System Location Discovery: System Language Discovery
PID:1788 -
C:\Users\Admin\AppData\Roaming\YZItdAvbIu.exe"C:\Users\Admin\AppData\Roaming\YZItdAvbIu.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
C:\Users\Admin\AppData\Roaming\UutQmtGMkx.exe"C:\Users\Admin\AppData\Roaming\UutQmtGMkx.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:960
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\newalp.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\newalp.exe"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2568
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000050001\06082025.exe"C:\Users\Admin\AppData\Local\Temp\1000050001\06082025.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3672
-
-
C:\Users\Admin\AppData\Local\Temp\1000069001\umrfile%20.exe"C:\Users\Admin\AppData\Local\Temp\1000069001\umrfile%20.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2440 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"8⤵
- Drops startup file
PID:4296 -
C:\Users\Admin\Pictures\pu7WxILpAoyOQL9JSknidye2.exe"C:\Users\Admin\Pictures\pu7WxILpAoyOQL9JSknidye2.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\7zS1AD1.tmp\Install.exe.\Install.exe10⤵
- Executes dropped EXE
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\7zS1E8A.tmp\Install.exe.\Install.exe /chnsTdidx "385104" /S11⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2096 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"12⤵
- System Location Discovery: System Language Discovery
PID:4240 -
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"13⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:3616 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 614⤵
- System Location Discovery: System Language Discovery
PID:1792 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 615⤵
- System Location Discovery: System Language Discovery
PID:2428
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"13⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:2440 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 614⤵
- System Location Discovery: System Language Discovery
PID:4212 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 615⤵
- System Location Discovery: System Language Discovery
PID:5072
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"13⤵
- Indirect Command Execution
PID:4468 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 614⤵PID:1148
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 615⤵
- System Location Discovery: System Language Discovery
PID:3684
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"13⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:3268 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 614⤵
- System Location Discovery: System Language Discovery
PID:1032 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 615⤵
- System Location Discovery: System Language Discovery
PID:2300
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"13⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:1244 -
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force14⤵
- System Location Discovery: System Language Discovery
PID:1712 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force15⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3892 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force16⤵PID:1068
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"12⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:2440 -
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True13⤵
- System Location Discovery: System Language Discovery
PID:4188 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True14⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2484 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True15⤵
- System Location Discovery: System Language Discovery
PID:976
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bvobQgTgLADiTwblyc" /SC once /ST 08:57:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS1E8A.tmp\Install.exe\" Sj /vrjdidwFK 385104 /S" /V1 /F12⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1484
-
-
-
-
-
C:\Users\Admin\Pictures\8g8v3Nkpc2ixSpdQNp2tH1fH.exe"C:\Users\Admin\Pictures\8g8v3Nkpc2ixSpdQNp2tH1fH.exe"9⤵
- Executes dropped EXE
PID:124
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000032001\kitty.exe"C:\Users\Admin\AppData\Local\Temp\1000032001\kitty.exe"5⤵
- Executes dropped EXE
PID:2492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 5086⤵
- Program crash
PID:2340
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000033001\ufileee.exe"C:\Users\Admin\AppData\Local\Temp\1000033001\ufileee.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"6⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:944 -
C:\Users\Admin\Pictures\TpTsjoleAeTFwOgyRUrt85JB.exe"C:\Users\Admin\Pictures\TpTsjoleAeTFwOgyRUrt85JB.exe"7⤵
- Executes dropped EXE
PID:1068
-
-
C:\Users\Admin\Pictures\RTSX4eXm5mb5FNE7vyFTSnoM.exe"C:\Users\Admin\Pictures\RTSX4eXm5mb5FNE7vyFTSnoM.exe"7⤵
- Executes dropped EXE
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\7zSD731.tmp\Install.exe.\Install.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\7zSDADA.tmp\Install.exe.\Install.exe /zfRtdidVtnj "385121" /S9⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:4552 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"10⤵
- System Location Discovery: System Language Discovery
PID:4816 -
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"11⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:2844 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 612⤵
- System Location Discovery: System Language Discovery
PID:4864 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 613⤵
- System Location Discovery: System Language Discovery
PID:3236
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"11⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:3372 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 612⤵
- System Location Discovery: System Language Discovery
PID:3920 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 613⤵PID:1672
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"11⤵
- Indirect Command Execution
PID:2144 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 612⤵
- System Location Discovery: System Language Discovery
PID:3308 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 613⤵
- System Location Discovery: System Language Discovery
PID:4240
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"11⤵
- Indirect Command Execution
PID:3436 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 612⤵
- System Location Discovery: System Language Discovery
PID:1384 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 613⤵
- System Location Discovery: System Language Discovery
PID:2384
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"11⤵
- Indirect Command Execution
PID:3600 -
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force12⤵PID:3820
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force13⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:248 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force14⤵
- System Location Discovery: System Language Discovery
PID:912
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"10⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:4092 -
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True11⤵
- System Location Discovery: System Language Discovery
PID:3236 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True12⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True13⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bvobQgTgLADiTwblyc" /SC once /ST 08:57:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zSDADA.tmp\Install.exe\" Sj /cRHdidIUu 385121 /S" /V1 /F10⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3140
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000034001\Operation6572.exe"C:\Users\Admin\AppData\Local\Temp\1000034001\Operation6572.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2492 -ip 24921⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exeC:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵
- Executes dropped EXE
PID:3880
-
-
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe1⤵
- Executes dropped EXE
PID:4724
-
C:\Users\Admin\AppData\Local\Temp\7zS1E8A.tmp\Install.exeC:\Users\Admin\AppData\Local\Temp\7zS1E8A.tmp\Install.exe Sj /vrjdidwFK 385104 /S1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1752 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"2⤵
- System Location Discovery: System Language Discovery
PID:1168 -
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:3936 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
PID:576 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:1652
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
PID:2436 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
PID:688 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:4832
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:4900 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 64⤵PID:4852
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:868
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:3452 -
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 64⤵
- System Location Discovery: System Language Discovery
PID:3016 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵
- System Location Discovery: System Language Discovery
PID:1032
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵
- Indirect Command Execution
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force4⤵PID:2844
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exeC:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3308
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
280B
MD5a66b7796ff6187b51f5747254c94f21d
SHA1980d0fba2fa21527709831b7fcf92e0443696c11
SHA256661b208091012d429b08254dad6b7312ec5ce369dc3a7d03b0359308ad0793b9
SHA5124ffaf245aeb244fed74200585f5a3c197fec954c399e201901ea50a02e9ff012519deeddbf03b195b1d5e6c0120272e7db64b83f882f17d2a206fafd957111ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25
Filesize1KB
MD5a16cbfee9fc8ecc88297ba806ccc576d
SHA134b28b0f6c1b5df0b063160a3d312e52b4911640
SHA256891bcd2b69ca42290d19961f1093d4909ec7ea9524a692a41741383e754ace68
SHA512a92bb53d84a451836fe4b66d6bf82f79ddd9119b3b5f9c7dac2bc1c5cf34d5fe919481ec746f31fe4ed7a6bc7c8d3ca16758726d06384c949bf24cb64a6a6645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90
Filesize979B
MD5979e41b6e144bdb24d4a4b0efd2a23f9
SHA17272d75da833c58b27ee264bec05859b0b8659a7
SHA256abead8e00e65d83f7c5055f34ec15c29a478648975e416536446447e46da01b5
SHA5123feb269aad6b612d66d49697083bd5c72d9be213a63c10c55702ca1df153ef868d48551419ff7d61861ab47790909c760c839e70607934e01c07b44d8ad142b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419
Filesize471B
MD54585ebd57690b8c9e1fff60dde307e36
SHA13bb4a2af1143342ff2e4999aceef0a3ff59bd7ea
SHA256a782c405de9e81ddb4903852c36b4a99e1b7d084d83e96f575451b0fa04a7229
SHA5124f3dade2de3fddbc824486c17b9c69e4ed30a63339897e6e679230fe3356b3a42e5c3c1bcf423b349bd94e6689dd1b87221b490a4fbcab7f55c44715311ea7c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A66A8DB907BADC9D16AD67B2FBFFDD5C
Filesize480B
MD54b446f95482e6a346bc032ae31de3b6c
SHA1a732c1bd8f615ee461ea4cdd9193b5f9a3d97b44
SHA256f8f713f3d8fafd0baffa88b41d4ea6b74842e96703148303f2f193c211016d42
SHA512408baa7fa13d99a3e53128a0adfae72b97a8763d840b13207de1966190c0809e9eef8d08882a6df58d089598cb2aa66d20da8cffb9589f93999a8ae053d2255b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_89854CA6A0F0936A4D2ECA78845CEA25
Filesize482B
MD53ee82513c83ee837f0f5a3e10bc918f6
SHA1b74a7393bb5a489fa0c737eac2fa8a3e77976e8b
SHA256c965f88e87bc560c68e85ec2e5161c26fda2a67200e2f51f89739e9ce47a5467
SHA512ae7ee64eb626e12a8b539e70b8145f3489702586582750e302872f55e59942894b10eb5725a14d3b427514a6d230bde547a44cb0003a80e38f65ca13a9078ad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D0E1C4B6144E7ECAB3F020E4A19EFC29_B5F77004C894173A10E3A199871D2D90
Filesize480B
MD5c5e696cd59002ae122695b7ce5466742
SHA1ff03f0c9caf9071d9a35f38ee9aca5108116c477
SHA2563fa9d22d74b9de9e293852405c75addebe65886a705be8d99fa598d4c1ddb222
SHA5128764cd0681a478ad5f32a9769e4f67fd52bc6dc7d8e2220f4359439ed8900a02aa8376af0c28090dfa8f3c4ac2da6921e5ce90490f647ae92136e951e4e0aa3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419
Filesize412B
MD5b2fecfe6832d8c2305065b548cea920f
SHA1e980243b2ae477e983b4205190876bb95f981660
SHA256ae24587d397acf16d005b73025d0116149648b60251f19b5d72a3c4e1bace937
SHA512f89043472064496577e4b69df9e3cdb8d02c4faf9a04790de038bab95b90f7d3a08080c8961d7782472d2a7c83df013aab2582b2a1791a989eabd3701e020dbe
-
Filesize
1KB
MD52f13af6aee5f8bb7506e5bb1c5db5503
SHA1f90001d0ddbcf42bdf726d15194c02968e4c6e27
SHA256954f692df2fb645ad94c0d8a397f8a6776f13bd16d7a4974138fd0f0cb2895f3
SHA5124dcd079e6707e6f087f2ecda602bf54e6e96c275385130d5512eb8da4061fe7d36c57eb32b833a6fb3bfc7860830af161f874f75f78dde34660a9de87b78669b
-
Filesize
1KB
MD5faa2dd409bb88491b6c57728dbf8a673
SHA16095f074030e7599cb1f9c251c62e2c0d1fb7418
SHA256955d02ee998eae94048f3a1b33c8eedc73276ef0a179efb1cebc970d9af0df09
SHA5120ab69299400998bc05fe7074b2c9b01162db9343deab22b502a26c47a054d2ca42918908fcc77a8cc5d275c17635508d546c3f65d857f37a7331ec9c32a766ce
-
Filesize
15KB
MD53b19cd3ed7c7307cd4dd1d251da722f1
SHA1e42529cb2249a5847a467e1444c4e892938115ab
SHA256aae5e6f2c6f67c49254aec6ef20c2ddd26300979bb4054ae439bd254f8d564d5
SHA512f2df37d44872caceb8a94811e6aad46868709a84d6563a99a12f6a9803250ff8b09d44fd370752db79858071f6ed9328610fcadc4c6b6ee4db5ff38f604a842e
-
Filesize
11KB
MD5260b0319ea78001fcf4e6995e455e596
SHA13954880e3ec9dbb49a4b169d8dce928136d65e61
SHA25629779189d52b7729d34da49a08f8191f67649ea739fb938b659c6c7c069e69b7
SHA512d73ef1ff70cd5bf336e954a918949555e59874c20c6c3c6e86f0a48729c8ef57fed454321b36940cc14f89a7b84a4e793fb414c83f4417c743d772ee9d920225
-
Filesize
15KB
MD544fe80ab7bd4deb00e3c1bf7db9090d0
SHA17fb3435d441b142aaf940e2c1d1fcde98b35684b
SHA256c8cfbce10f6f92de72093ee006b80e7438e413d604f9f5f3ee7acb54cfbe1745
SHA5127114bfb28b623995107706716e88aded43dc92d5ae0dcc88682e3245ae2faf3b5fd79b79fa1b852e69213ea0cc6d87adeea9f10fbc92460d5c10e0c38b79ec51
-
Filesize
954KB
MD5e71c0c5d72455dde6510ba23552d7d2f
SHA14dff851c07a9f9ebc9e71b7f675cc20b06a2439c
SHA256de1d7fe86a0b70a7a268d2960109833f4d126d5d9e3acb36697e8ff59c56017f
SHA512c6f4b1eb353a554ca49bab5e894a4d7c46e2674d32f2f0d5a9231400d14a9ea5604c079193cd0bed9fea409bb71b5779c0c03671e104cb0740fe8ade3e530ca6
-
Filesize
1.4MB
MD504e90b2cf273efb3f6895cfcef1e59ba
SHA179afcc39db33426ee8b97ad7bfb48f3f2e4c3449
SHA256e015f535c8a9fab72f2e06863c559108b1a25af90468cb9f80292c3ba2c33f6e
SHA51272aa08242507f6dd39822a34c68d6185927f6772a3fc03a0850d7c8542b21a43e176f29e5fbb3a4e54bc02fa68c807a01091158ef68c5a2f425cc432c95ea555
-
Filesize
416KB
MD56093bb59e7707afe20ca2d9b80327b49
SHA1fd599fa9d5ef5c980a445fc6c19efd1fcb80f2bc
SHA2563acc0b21db1f774d15a1f1d8080aff0b8f83eefb70c5c673f1c6ed7b676cd6d3
SHA512d28808686f73bcc13b8ad57c84585b9d55d1b6445807023897be45f229bcab89971fb320223772fa500a692ad0b6106eaa0b4cf35e807038a6050994106d18e1
-
Filesize
1.8MB
MD554a7169c7787b93f74b4bceb783cc91e
SHA168138ff9acd3eedb7a4c7dab8003e3c9770a8736
SHA2562efc4b80fdb9b66eabf08e3507c5587cb468ed423fd084c5825cfaae05c2fca8
SHA5127b37ea0392c0d063c9e2146e8a80765a95a44fac949190c8d290f35c7de3c99c01ad501e6e6ee361c95c0c2ed275bb45f937564cbeed2e60792bde4560604138
-
Filesize
319KB
MD50ec1f7cc17b6402cd2df150e0e5e92ca
SHA18405b9bf28accb6f1907fbe28d2536da4fba9fc9
SHA2564c5ca5701285337a96298ebf994f8ba013d290c63afa65b5c2b05771fbbb9ed4
SHA5127caa2416bc7878493b62a184ddc844d201a9ab5282abfa77a616316af39ff65309e37bb566b3e29d9e764e08f4eda43a06464acaf9962f911b33e6dbc60c1861
-
Filesize
2.1MB
MD5224297950318b574eff66d8c5821816c
SHA1674ef31660964d23d4c4c9cd0ce28ab89ee772fc
SHA25608423614449782c59c3c61ca024b16bdb5da07b8d3c740123b131bd257d2ecc8
SHA5127d471f3793150b51fb2c64ff731986ccdb3337240bbeded09fe0bf8e44883a2e5857856babcffc47c0edb2a9b2d7022d23558727c1200b30aad3e24be8b9884c
-
Filesize
538KB
MD5913bdfccaaed0a1ed80d2c52e5f5d7c3
SHA19befba3d43ace45a777d2e936e1046e7a0fb634c
SHA25693e66ad3eea5b3217d9a016cb96951ab2dd0ae3f3ef6c2782667abacaaa8018f
SHA5121999d174e14b96ccb35dc8ffa2cc576aff9d01d9373654a2a0f78342735e8b637f605144f5c56e922dc5ee43afb82e62ab9f21e0ecfd33a1b8369344346f90e6
-
Filesize
304KB
MD50d76d08b0f0a404604e7de4d28010abc
SHA1ef4270c06b84b0d43372c5827c807641a41f2374
SHA2566dcda2619b61b0cafbfdebb7fbb82c8c2c0b3f9855a4306782874625d6ff067e
SHA512979e0d3ec0dad1cc2acd5ec8b0a84a5161e46ee7a30f99d9a3ff3b7ce4eec7f5fa1f11fbe2a84267a7263e04434f4fc7fabc7858ef4c0b7667aeb6dcd3aa7165
-
Filesize
187KB
MD5e78239a5b0223499bed12a752b893cad
SHA1a429b46db791f433180ae4993ebb656d2f9393a4
SHA25680befdb25413d68adbadd8f236a2e8c71b261d8befc04c99749e778b07bcde89
SHA512cee5d5d4d32e5575852a412f6b3e17f8c0cbafe97fd92c7024934234a23c240dcc1f7a0452e2e5da949dec09dcfeb006e73862c5bbc549a2ab1cfb0241eaddfc
-
Filesize
2.1MB
MD5f90f8ddedf92f642bd938cdc2f770f70
SHA164877a6cdf1f359bf2552121a106f595279dd5d9
SHA2561d3558065f87e6039aff316dd0771b19a07c3bced1ae951cf290035fb1e4420e
SHA512f463bbbe34c7e5cde5cbb0a34d7d90b97351347d5a6205c0de42cd74d18f454424f8fa0e83610b2eef83e8819f09fc26ac48f66c4b42d4079d496e143591fd63
-
Filesize
941KB
MD5f5b93d3369d1ae23d6e150e75d2b6a80
SHA16f6914770748ad148154e1576d9c6fe6887f2290
SHA256343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81
SHA512dcedaed2df62386b980cc1957f224fc48224aeb0f5bf8d0241acc7a0a552b0ae90697ed333189963540f8391cbecfa0977a8685723c5025c9a4f95918032cf1e
-
Filesize
6.4MB
MD55fd3d1be090fc00290f60d25b45cfb97
SHA1ffe7ad8f8195bf9372ab85e22fc355d095280941
SHA256b86eab4824556b90b8454ca51d6618bd1e6594dadc0899b618d1fe0e13e48026
SHA51220fbc7b5c1b4d1deab10d602c3941a3b5694b296d1e8542701d6a36c9598afeeaa243b52e9f414565fed4c9c97276ae8f2ea7b6fd44a9d7b0db8814098b69e3f
-
Filesize
6.4MB
MD56d65c4b2b606c1bebf41a38e9859dffc
SHA1fa31536a99d8fd61f2db48060b973e560eab7915
SHA2560c4a1b1e7fbde64504de94d3ab2b034d816ff089709140b9391e6d158a5b8f7f
SHA51237f66944279bd8a5a04f2db7510b0282b154fc479a39e977aa811bbd19ccb26edf10ac048768d0e24959898db75e46f06b8c7e24cc8cac9b0051786c4a663868
-
Filesize
6.7MB
MD59e36a22f656dce8bcbc37ad0306b1159
SHA162cf001d7e5557a2b075ee6dbf3713a072843eac
SHA25665146311d12e4be1764bc83ad4a0c1dbfcca7e1a78800adfbb66b71270aefd7f
SHA512aac711a4091e2715964ccaf3cddd28a24b099ace134670409f016e766118ed38eb1418b0d43bd3392a2f5b212214df4586e558d18ecda57bc5961ea0e42aac05
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
503KB
MD52c2be38fb507206d36dddb3d03096518
SHA1a16edb81610a080096376d998e5ddc3e4b54bbd6
SHA2560c7173daaa5ad8dabe7a2cde6dbd0eee1ca790071443aa13b01a1e731053491e
SHA512e436954d7d5b77feb32f200cc48cb01f94b449887443a1e75ebef2f6fa2139d989d65f5ea7a71f8562c3aae2fea4117efc87e8aae905e1ba466fbc8bb328b316
-
Filesize
510KB
MD574e358f24a40f37c8ffd7fa40d98683a
SHA17a330075e6ea3d871eaeefcecdeb1d2feb2fc202
SHA2560928c96b35cd4cc5887fb205731aa91eb68886b816bcc5ec151aeee81ce4f9a6
SHA5121525e07712c35111b56664e1589b1db37965995cc8e6d9b6f931fa38b0aa8e8347fc08b870d03573d10f0d597a2cd9db2598845c82b6c085f0df04f2a3b46eaf
-
Filesize
2.9MB
MD5bc3e076ec6527a8bf74e9293be24630e
SHA12a58c06f16d1ba29e7f6945fd08896caa55df709
SHA25637b97e07cc1d88c49e382de22ce61ad6d684901114d475b96e2bc9645797903b
SHA5120dbf419d0652d143a36d4185d9b7ec2f35224b2467395826f55d53f538ef5539326bca03afa43676961c316de70b830f176a0056105d64f1205bf03fa84c4cf1
-
Filesize
7KB
MD577f762f953163d7639dff697104e1470
SHA1ade9fff9ffc2d587d50c636c28e4cd8dd99548d3
SHA256d9e15bb8027ff52d6d8d4e294c0d690f4bbf9ef3abc6001f69dcf08896fbd4ea
SHA512d9041d02aaca5f06a0f82111486df1d58df3be7f42778c127ccc53b2e1804c57b42b263cc607d70e5240518280c7078e066c07dec2ea32ec13fb86aa0d4cb499
-
Filesize
7.3MB
MD5fc0ea27fc5ad5ea9a46f7c2614eb1a54
SHA1d1d371984e32810f460adbf1eb4b77bc7ff4b4e8
SHA2563ecb788cbbe51fda59cf562744eacc19972f3f2bde52a0e7b23ed42c3ce44aea
SHA512dfac9b921a5f745b991ce47bde7a8e37a4d9559d1ac21ac586257daee7a2f79f5f2f0d6c32b46d011463d7abf5018c02592b17e5cb1fcf4dbba85313c21394d1
-
Filesize
250KB
MD5850a43e323656b86ae665d8b4fd71369
SHA1099d6e80c394ccc5233e1cbd6b29769da9e0e2aa
SHA256539423d2e436e198df15b5577d816dc306ba4c03b1362f7731e675b51f4a5f42
SHA5121f2778040e906ea2939a8b0a682e267599aa8422f81ea83bb6c980a304b569ad750ef3e81e1490edd5b1d74e734a2cb82f428f47096c55436037e03e516d2378
-
Filesize
7.3MB
MD512a864a73609e6a77c324aa84145511c
SHA1634b20b864e48579518cc6ffb64c1d569eac6ca9
SHA2567b13a67fad88c6e4b146fd306866a95f268a1b37fe849ba8b0594163ca80b5d1
SHA512be4d909d3a852a541a6d2c4788ef8d76375c41195a2dbb3517239cd7bd8640abc5c434523645cb3752dd90d8a9de1ec43ca7288832e588bcf81c8d8b34073e3f
-
Filesize
428B
MD5bb25e14dca4355d8c17271b7e83e771e
SHA11d9e5511f6cb641df1545b134571f5b96a18b88d
SHA256bf83ed4aa4e24d90f57df181126064ca6bfcfac1fddd17022aa7a543011cdff4
SHA512b7c9a8ea5e30b04d0b6df151429989266d44d660187aa89ce452e5de6afc55b78bff6fa951e29d3361abd06c3e92f089b625d9385b9232b539d21ae422a93c7f