Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 19:48
Static task
static1
Behavioral task
behavioral1
Sample
bc39eccc3e5bec7599af33c90047ed9d33916120c390613ecdd9806b6366c412.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
bc39eccc3e5bec7599af33c90047ed9d33916120c390613ecdd9806b6366c412.exe
Resource
win11-20240802-en
General
-
Target
bc39eccc3e5bec7599af33c90047ed9d33916120c390613ecdd9806b6366c412.exe
-
Size
1.8MB
-
MD5
c2d532cd0b4604cd64ed7ab3caa10b0d
-
SHA1
cca6998da63ee7a0e47a054a89d2ac0772c35861
-
SHA256
bc39eccc3e5bec7599af33c90047ed9d33916120c390613ecdd9806b6366c412
-
SHA512
5dfa6a3c484b83f12da6db1f9a0061eb3a49dbe7c001cf4b4195a41f10f2e727dab7cb501548846268bfd05f3700bf1b522dfc1f4ad7bbefc1de84fabc8e45fe
-
SSDEEP
49152:5JCCdwGF8AliPJs7ZkEp6AZqz8EgaUIxwQtry:B5vliPelkEpXZKgIWMry
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
xworm
154.216.18.213:7000
-
install_file
USB.exe
Extracted
redline
cheat
62.113.117.95:29928
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/4828-41-0x0000000005680000-0x0000000005695000-memory.dmp family_xworm behavioral1/memory/4828-42-0x0000000005850000-0x0000000005864000-memory.dmp family_xworm -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 17 IoCs
resource yara_rule behavioral1/memory/3004-315-0x0000000000400000-0x00000000004DA000-memory.dmp family_redline behavioral1/memory/3004-327-0x0000000000400000-0x00000000004DA000-memory.dmp family_redline behavioral1/memory/3004-343-0x0000000000400000-0x00000000004DA000-memory.dmp family_redline behavioral1/memory/3004-341-0x0000000000400000-0x00000000004DA000-memory.dmp family_redline behavioral1/memory/3004-339-0x0000000000400000-0x00000000004DA000-memory.dmp family_redline behavioral1/memory/3004-338-0x0000000000400000-0x00000000004DA000-memory.dmp family_redline behavioral1/memory/3004-335-0x0000000000400000-0x00000000004DA000-memory.dmp family_redline behavioral1/memory/3004-333-0x0000000000400000-0x00000000004DA000-memory.dmp family_redline behavioral1/memory/3004-331-0x0000000000400000-0x00000000004DA000-memory.dmp family_redline behavioral1/memory/3004-329-0x0000000000400000-0x00000000004DA000-memory.dmp family_redline behavioral1/memory/3004-325-0x0000000000400000-0x00000000004DA000-memory.dmp family_redline behavioral1/memory/3004-323-0x0000000000400000-0x00000000004DA000-memory.dmp family_redline behavioral1/memory/3004-321-0x0000000000400000-0x00000000004DA000-memory.dmp family_redline behavioral1/memory/3004-319-0x0000000000400000-0x00000000004DA000-memory.dmp family_redline behavioral1/memory/3004-317-0x0000000000400000-0x00000000004DA000-memory.dmp family_redline behavioral1/files/0x0008000000023487-348.dat family_redline behavioral1/memory/4784-404-0x0000000000BD0000-0x0000000000BEE000-memory.dmp family_redline -
SectopRAT payload 17 IoCs
resource yara_rule behavioral1/memory/3004-315-0x0000000000400000-0x00000000004DA000-memory.dmp family_sectoprat behavioral1/memory/3004-327-0x0000000000400000-0x00000000004DA000-memory.dmp family_sectoprat behavioral1/memory/3004-343-0x0000000000400000-0x00000000004DA000-memory.dmp family_sectoprat behavioral1/memory/3004-341-0x0000000000400000-0x00000000004DA000-memory.dmp family_sectoprat behavioral1/memory/3004-339-0x0000000000400000-0x00000000004DA000-memory.dmp family_sectoprat behavioral1/memory/3004-338-0x0000000000400000-0x00000000004DA000-memory.dmp family_sectoprat behavioral1/memory/3004-335-0x0000000000400000-0x00000000004DA000-memory.dmp family_sectoprat behavioral1/memory/3004-333-0x0000000000400000-0x00000000004DA000-memory.dmp family_sectoprat behavioral1/memory/3004-331-0x0000000000400000-0x00000000004DA000-memory.dmp family_sectoprat behavioral1/memory/3004-329-0x0000000000400000-0x00000000004DA000-memory.dmp family_sectoprat behavioral1/memory/3004-325-0x0000000000400000-0x00000000004DA000-memory.dmp family_sectoprat behavioral1/memory/3004-323-0x0000000000400000-0x00000000004DA000-memory.dmp family_sectoprat behavioral1/memory/3004-321-0x0000000000400000-0x00000000004DA000-memory.dmp family_sectoprat behavioral1/memory/3004-319-0x0000000000400000-0x00000000004DA000-memory.dmp family_sectoprat behavioral1/memory/3004-317-0x0000000000400000-0x00000000004DA000-memory.dmp family_sectoprat behavioral1/files/0x0008000000023487-348.dat family_sectoprat behavioral1/memory/4784-404-0x0000000000BD0000-0x0000000000BEE000-memory.dmp family_sectoprat -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ XClient_protected.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ XClient_protected.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ xhjnpi.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bc39eccc3e5bec7599af33c90047ed9d33916120c390613ecdd9806b6366c412.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bc39eccc3e5bec7599af33c90047ed9d33916120c390613ecdd9806b6366c412.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XClient_protected.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XClient_protected.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion xhjnpi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion XClient_protected.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion XClient_protected.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion xhjnpi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bc39eccc3e5bec7599af33c90047ed9d33916120c390613ecdd9806b6366c412.exe -
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation bc39eccc3e5bec7599af33c90047ed9d33916120c390613ecdd9806b6366c412.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation xhjnpi.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation xxxx.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation ._cache_xxxx.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation XClient_protected.exe -
Executes dropped EXE 15 IoCs
pid Process 3500 axplong.exe 4828 WindowsUI.exe 3812 xxxx.exe 1996 ._cache_xxxx.exe 2628 Synaptics.exe 4568 XClient_protected.exe 780 ._cache_Synaptics.exe 2748 XClient_protected.exe 2268 axplong.exe 2844 orcovv.exe 4784 ._cache_RegAsm.exe 4492 xhjnpi.exe 4644 ._cache_xhjnpi.exe 3104 ._cache_RegAsm.exe 4520 axplong.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Wine bc39eccc3e5bec7599af33c90047ed9d33916120c390613ecdd9806b6366c412.exe Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Wine axplong.exe -
Loads dropped DLL 2 IoCs
pid Process 4004 RegAsm.exe 4004 RegAsm.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000b000000023474-201.dat themida behavioral1/memory/4568-252-0x00000000006D0000-0x0000000000F46000-memory.dmp themida behavioral1/memory/4568-251-0x00000000006D0000-0x0000000000F46000-memory.dmp themida behavioral1/memory/2748-273-0x00000000006D0000-0x0000000000F46000-memory.dmp themida behavioral1/memory/2748-274-0x00000000006D0000-0x0000000000F46000-memory.dmp themida behavioral1/memory/2748-295-0x00000000006D0000-0x0000000000F46000-memory.dmp themida behavioral1/files/0x0017000000023488-593.dat themida behavioral1/memory/4492-600-0x00000000001E0000-0x000000000074A000-memory.dmp themida behavioral1/memory/4492-601-0x00000000001E0000-0x000000000074A000-memory.dmp themida behavioral1/memory/4492-602-0x00000000001E0000-0x000000000074A000-memory.dmp themida behavioral1/memory/4492-603-0x00000000001E0000-0x000000000074A000-memory.dmp themida behavioral1/memory/4492-663-0x00000000001E0000-0x000000000074A000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" xxxx.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MyApp = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\1000184001\\WindowsUI.exe\"" WindowsUI.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XClient_protected.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XClient_protected.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xhjnpi.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 3716 bc39eccc3e5bec7599af33c90047ed9d33916120c390613ecdd9806b6366c412.exe 3500 axplong.exe 4568 XClient_protected.exe 2748 XClient_protected.exe 2268 axplong.exe 4492 xhjnpi.exe 4520 axplong.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2844 set thread context of 3004 2844 orcovv.exe 118 PID 4644 set thread context of 4004 4644 ._cache_xhjnpi.exe 125 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job bc39eccc3e5bec7599af33c90047ed9d33916120c390613ecdd9806b6366c412.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc39eccc3e5bec7599af33c90047ed9d33916120c390613ecdd9806b6366c412.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XClient_protected.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XClient_protected.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language orcovv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhjnpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_xhjnpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_xxxx.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ xhjnpi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ xxxx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ RegAsm.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1132 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3716 bc39eccc3e5bec7599af33c90047ed9d33916120c390613ecdd9806b6366c412.exe 3716 bc39eccc3e5bec7599af33c90047ed9d33916120c390613ecdd9806b6366c412.exe 3500 axplong.exe 3500 axplong.exe 2268 axplong.exe 2268 axplong.exe 4784 ._cache_RegAsm.exe 4784 ._cache_RegAsm.exe 4784 ._cache_RegAsm.exe 3104 ._cache_RegAsm.exe 3104 ._cache_RegAsm.exe 3104 ._cache_RegAsm.exe 4520 axplong.exe 4520 axplong.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4828 WindowsUI.exe Token: SeDebugPrivilege 4828 WindowsUI.exe Token: SeDebugPrivilege 4568 XClient_protected.exe Token: SeDebugPrivilege 2748 XClient_protected.exe Token: SeDebugPrivilege 4784 ._cache_RegAsm.exe Token: SeDebugPrivilege 3104 ._cache_RegAsm.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3716 bc39eccc3e5bec7599af33c90047ed9d33916120c390613ecdd9806b6366c412.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 1132 EXCEL.EXE 1132 EXCEL.EXE 1132 EXCEL.EXE 1132 EXCEL.EXE 1132 EXCEL.EXE 1132 EXCEL.EXE 1132 EXCEL.EXE 1132 EXCEL.EXE 1132 EXCEL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3716 wrote to memory of 3500 3716 bc39eccc3e5bec7599af33c90047ed9d33916120c390613ecdd9806b6366c412.exe 89 PID 3716 wrote to memory of 3500 3716 bc39eccc3e5bec7599af33c90047ed9d33916120c390613ecdd9806b6366c412.exe 89 PID 3716 wrote to memory of 3500 3716 bc39eccc3e5bec7599af33c90047ed9d33916120c390613ecdd9806b6366c412.exe 89 PID 3500 wrote to memory of 4828 3500 axplong.exe 91 PID 3500 wrote to memory of 4828 3500 axplong.exe 91 PID 3500 wrote to memory of 4828 3500 axplong.exe 91 PID 3500 wrote to memory of 3812 3500 axplong.exe 102 PID 3500 wrote to memory of 3812 3500 axplong.exe 102 PID 3500 wrote to memory of 3812 3500 axplong.exe 102 PID 3812 wrote to memory of 1996 3812 xxxx.exe 103 PID 3812 wrote to memory of 1996 3812 xxxx.exe 103 PID 3812 wrote to memory of 1996 3812 xxxx.exe 103 PID 3812 wrote to memory of 2628 3812 xxxx.exe 104 PID 3812 wrote to memory of 2628 3812 xxxx.exe 104 PID 3812 wrote to memory of 2628 3812 xxxx.exe 104 PID 1996 wrote to memory of 4568 1996 ._cache_xxxx.exe 105 PID 1996 wrote to memory of 4568 1996 ._cache_xxxx.exe 105 PID 1996 wrote to memory of 4568 1996 ._cache_xxxx.exe 105 PID 2628 wrote to memory of 780 2628 Synaptics.exe 107 PID 2628 wrote to memory of 780 2628 Synaptics.exe 107 PID 2628 wrote to memory of 780 2628 Synaptics.exe 107 PID 780 wrote to memory of 2748 780 ._cache_Synaptics.exe 109 PID 780 wrote to memory of 2748 780 ._cache_Synaptics.exe 109 PID 780 wrote to memory of 2748 780 ._cache_Synaptics.exe 109 PID 4568 wrote to memory of 2844 4568 XClient_protected.exe 115 PID 4568 wrote to memory of 2844 4568 XClient_protected.exe 115 PID 4568 wrote to memory of 2844 4568 XClient_protected.exe 115 PID 2844 wrote to memory of 1312 2844 orcovv.exe 117 PID 2844 wrote to memory of 1312 2844 orcovv.exe 117 PID 2844 wrote to memory of 1312 2844 orcovv.exe 117 PID 2844 wrote to memory of 3004 2844 orcovv.exe 118 PID 2844 wrote to memory of 3004 2844 orcovv.exe 118 PID 2844 wrote to memory of 3004 2844 orcovv.exe 118 PID 2844 wrote to memory of 3004 2844 orcovv.exe 118 PID 2844 wrote to memory of 3004 2844 orcovv.exe 118 PID 2844 wrote to memory of 3004 2844 orcovv.exe 118 PID 2844 wrote to memory of 3004 2844 orcovv.exe 118 PID 2844 wrote to memory of 3004 2844 orcovv.exe 118 PID 2844 wrote to memory of 3004 2844 orcovv.exe 118 PID 2844 wrote to memory of 3004 2844 orcovv.exe 118 PID 2844 wrote to memory of 3004 2844 orcovv.exe 118 PID 2844 wrote to memory of 3004 2844 orcovv.exe 118 PID 2844 wrote to memory of 3004 2844 orcovv.exe 118 PID 3004 wrote to memory of 4784 3004 RegAsm.exe 119 PID 3004 wrote to memory of 4784 3004 RegAsm.exe 119 PID 3004 wrote to memory of 4784 3004 RegAsm.exe 119 PID 4568 wrote to memory of 4492 4568 XClient_protected.exe 121 PID 4568 wrote to memory of 4492 4568 XClient_protected.exe 121 PID 4568 wrote to memory of 4492 4568 XClient_protected.exe 121 PID 4492 wrote to memory of 4644 4492 xhjnpi.exe 122 PID 4492 wrote to memory of 4644 4492 xhjnpi.exe 122 PID 4492 wrote to memory of 4644 4492 xhjnpi.exe 122 PID 4644 wrote to memory of 4452 4644 ._cache_xhjnpi.exe 124 PID 4644 wrote to memory of 4452 4644 ._cache_xhjnpi.exe 124 PID 4644 wrote to memory of 4452 4644 ._cache_xhjnpi.exe 124 PID 4644 wrote to memory of 4004 4644 ._cache_xhjnpi.exe 125 PID 4644 wrote to memory of 4004 4644 ._cache_xhjnpi.exe 125 PID 4644 wrote to memory of 4004 4644 ._cache_xhjnpi.exe 125 PID 4644 wrote to memory of 4004 4644 ._cache_xhjnpi.exe 125 PID 4644 wrote to memory of 4004 4644 ._cache_xhjnpi.exe 125 PID 4644 wrote to memory of 4004 4644 ._cache_xhjnpi.exe 125 PID 4644 wrote to memory of 4004 4644 ._cache_xhjnpi.exe 125 PID 4644 wrote to memory of 4004 4644 ._cache_xhjnpi.exe 125 PID 4644 wrote to memory of 4004 4644 ._cache_xhjnpi.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc39eccc3e5bec7599af33c90047ed9d33916120c390613ecdd9806b6366c412.exe"C:\Users\Admin\AppData\Local\Temp\bc39eccc3e5bec7599af33c90047ed9d33916120c390613ecdd9806b6366c412.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\1000184001\WindowsUI.exe"C:\Users\Admin\AppData\Local\Temp\1000184001\WindowsUI.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
C:\Users\Admin\AppData\Local\Temp\1000185001\xxxx.exe"C:\Users\Admin\AppData\Local\Temp\1000185001\xxxx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\._cache_xxxx.exe"C:\Users\Admin\AppData\Local\Temp\._cache_xxxx.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\XClient_protected.exe"C:\Users\Admin\AppData\Local\Temp\XClient_protected.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\orcovv.exe"C:\Users\Admin\AppData\Local\Temp\orcovv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:1312
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\._cache_RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\._cache_RegAsm.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\xhjnpi.exe"C:\Users\Admin\AppData\Local\Temp\xhjnpi.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\._cache_xhjnpi.exe"C:\Users\Admin\AppData\Local\Temp\._cache_xhjnpi.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵PID:4452
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\._cache_RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\._cache_RegAsm.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3104
-
-
-
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\XClient_protected.exe"C:\Users\Admin\AppData\Local\Temp\XClient_protected.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
-
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1132
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4520
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD552a913f73fc75b6e5c46a84220f7a0f5
SHA190c6c4b98466a2686718ec2d36a8ac0ccec1a47e
SHA2567f7895db44551017aa3fabf996d1918dd670eb28d23772e12d45eee68e9a9e41
SHA512f376ae995b058b320386694e5c5145862a9fa101437e4a8fbd88db8335f39100664140533727245c579fad01af7a0fce4d1d06864f7d201de6be243ec6eca4da
-
Filesize
955KB
MD523647af4334d570eacd80331641dfc11
SHA18d4687eebd7bdb82292f9bf67b84833632fbf652
SHA25656384b296652e1e5540fca3ad5bb2bf207c248c4f2e70767baa4476eeb1a3656
SHA51237ccea9dd003f5dd3e4155220a9432b434d41edb3754ec0bd7fb09200efe18b9aa7dd818ef8f86b43ca0e206c02636ca87b1f5c7f82a63dfd9384038c958b953
-
Filesize
5.1MB
MD53468a1c8607d4c705455f4f3e4f8c8c0
SHA188abcd636a23f43ff7a56274be3d733519547420
SHA256c66e667dfc3f42d95ee063da10feccf00f247aee2d789cf3fb2f11ca0609030b
SHA512616bc8f65192e111f9ef11e0e9d8ad31ad5a56036e54aeb8f754d4b4a0ad7fe14ddaf6050ad44c3421c9b82d460be45f47b1956b57eb00cf25c0ee112b276c6d
-
Filesize
847KB
MD5616b51fce27e45ac6370a4eb0ac463f6
SHA1be425b40b4da675e9ccf7eb6bc882cb7dcbed05b
SHA256ba22a9f54751c8fd8b2cfd38cc632bb8b75d54593410468e6ec75bdc0a076ae6
SHA5127df000e6d4fe7add4370d3ac009717ce9343c4c0c4dbe32ceb23dc5269418c26fd339f7cf37ede6cb96ebe7e3ff1a6090a524f74f64485ba27bd13c893a169b2
-
Filesize
5.9MB
MD507300085faa37291ead5d042591bdc89
SHA1388ff6958dc62398a5f73c050ef243b3a44a60a3
SHA256a3496af00e750941d106a9b0533b3e2804d520e5508a702a1ba6ab849a79d3b1
SHA5127b3bc43859a2249c57e0a4d056d362f320b26a56fb418639d826dafb49413e045a222170f1cce2748b93f4b08edf30e70948bc82dadedc0165d4e24700d87205
-
Filesize
1.8MB
MD5c2d532cd0b4604cd64ed7ab3caa10b0d
SHA1cca6998da63ee7a0e47a054a89d2ac0772c35861
SHA256bc39eccc3e5bec7599af33c90047ed9d33916120c390613ecdd9806b6366c412
SHA5125dfa6a3c484b83f12da6db1f9a0061eb3a49dbe7c001cf4b4195a41f10f2e727dab7cb501548846268bfd05f3700bf1b522dfc1f4ad7bbefc1de84fabc8e45fe
-
Filesize
21KB
MD59c7de4a079d667c21d37fc1336584dbc
SHA1aa5194e926dbb91f07d9116711f380d7c6bf81d8
SHA2564fd6d6903b814c0bbdf32607b986e5bce20e82bd807b6170b5aab692ea19eb0b
SHA512373acc0f45b374f570b3e65cd46ed3f24fc28dd6a17ba6f13c6859d89149d1cda3d2fd6cbde9a404fc3977aaf5afd51eb75b7ee11b9f92bc176147722bac1cc1
-
Filesize
8.4MB
MD55003e9b3ba755ad2e72a2f33141456d3
SHA1fb5ae39c72a28dd2e8b5cb373ac24eb51a83a9bb
SHA256423eea281087ffca6ef9323fbf7f3dfe57e7dd63c2347fe04f979aebd90578fc
SHA5129fc41f91ada24717d8c61b9243b78e25729abce53aeab3305d6a30047cae0f14e9e61ba49632737bab71a0882743716ba4e0bdd1db43519af322a00c4f74d914
-
Filesize
858KB
MD5b80bcaef82ffee7794fa71ee08c1f7bf
SHA172f53b87b0c89e81fd030e557a7417ee56592113
SHA2564047f85704ddd8b3f5592da32a76ed4395f91f1acdbf595ea13a49bf6211104c
SHA5126c7253a81328f71a04608cd6efb73585a439548842d548a45775afe76c7e668c8a1e2dafc1a8e0793928016d13aa3553df82d20c1c91baa738977ac3f7fcde19
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD535fb57f056b0f47185c5dfb9a0939dba
SHA17c1b0bbbb77dbe46286078bca427202d494a5d36
SHA2561dc436687ed65d9f2fcda9a68a812346f56f566f7671cbe1be0beaa157045294
SHA512531351adffddc5a9c8c9d1fcba531d85747be0927156bae79106114b4bdc3f2fd2570c97bbfcec09265dcc87ed286655f2ab15fb3c7af0ad638a67a738f504c7
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
5.0MB
MD5def67e9c1036ad0b9eb181b9506776e0
SHA1ec91e7f435b73ebb3d7dd3df3520d74c1a9827d4
SHA25659419194d0139adb30e27c2daae029dff698ee5418680ecb78a23bf769ce269b
SHA512fde8b28150cf86df5da608bd16ca91d54e9c99c8a3acf165f5dd8bcbd3a384b6790629ada376faa21f54c8b5da2322ae4eea8bad801187ee89535a7307fec351
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04