Analysis
-
max time kernel
104s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 23:17
Static task
static1
General
-
Target
4dff851bc8eef01f9edc43742ace87e10d2dfd4461f180635b842f180b8beac7.exe
-
Size
1.9MB
-
MD5
163783e79ea2e3dba698f5933e4c3561
-
SHA1
5c411b62b7ac82cde4dee6e7e70f703535066600
-
SHA256
4dff851bc8eef01f9edc43742ace87e10d2dfd4461f180635b842f180b8beac7
-
SHA512
5152be8ce316edd89b284b02c11b18a3dbe4753b12c85db5aded4bd65bb7005a0d9d323656b47cc7b6a8c82a467019887a9dcad21afbca10d7e86e19810c558e
-
SSDEEP
24576:KxNAljwnaibmh5gCig1P5weI1gN3hrO1f7C2TLtTleRcGsLBr9Oi7B3PbaoU5BWw:OqwqHZV0f7CE7Oi70H5BWf4Z
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4dff851bc8eef01f9edc43742ace87e10d2dfd4461f180635b842f180b8beac7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4dff851bc8eef01f9edc43742ace87e10d2dfd4461f180635b842f180b8beac7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4dff851bc8eef01f9edc43742ace87e10d2dfd4461f180635b842f180b8beac7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation 4dff851bc8eef01f9edc43742ace87e10d2dfd4461f180635b842f180b8beac7.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation neon.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation neon.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation neon.exe -
Executes dropped EXE 7 IoCs
pid Process 3340 axplong.exe 2728 axplong.exe 2196 neon.exe 5996 neon.exe 5944 neon.exe 5180 neon.exe 5272 axplong.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Wine 4dff851bc8eef01f9edc43742ace87e10d2dfd4461f180635b842f180b8beac7.exe Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Wine axplong.exe -
Loads dropped DLL 2 IoCs
pid Process 208 taskmgr.exe 208 taskmgr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neon = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\neon.exe" reg.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4304 4dff851bc8eef01f9edc43742ace87e10d2dfd4461f180635b842f180b8beac7.exe 3340 axplong.exe 2728 axplong.exe 5272 axplong.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2196 set thread context of 2876 2196 neon.exe 107 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 4dff851bc8eef01f9edc43742ace87e10d2dfd4461f180635b842f180b8beac7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4dff851bc8eef01f9edc43742ace87e10d2dfd4461f180635b842f180b8beac7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neon.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3424 cmd.exe 4528 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1302416131-1437503476-2806442725-1000\{9D392F91-6637-4C62-8C52-C45872038C8C} msedge.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4528 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4304 4dff851bc8eef01f9edc43742ace87e10d2dfd4461f180635b842f180b8beac7.exe 4304 4dff851bc8eef01f9edc43742ace87e10d2dfd4461f180635b842f180b8beac7.exe 208 taskmgr.exe 208 taskmgr.exe 3340 axplong.exe 3340 axplong.exe 208 taskmgr.exe 208 taskmgr.exe 2728 axplong.exe 2728 axplong.exe 208 taskmgr.exe 208 taskmgr.exe 2196 neon.exe 2196 neon.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 1124 msedge.exe 1124 msedge.exe 208 taskmgr.exe 208 taskmgr.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 208 taskmgr.exe 208 taskmgr.exe 2196 neon.exe 2196 neon.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 652 msedge.exe 652 msedge.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 5452 identity_helper.exe 5452 identity_helper.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 208 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 208 taskmgr.exe Token: SeSystemProfilePrivilege 208 taskmgr.exe Token: SeCreateGlobalPrivilege 208 taskmgr.exe Token: SeDebugPrivilege 2196 neon.exe Token: SeDebugPrivilege 5996 neon.exe Token: SeDebugPrivilege 5944 neon.exe Token: SeDebugPrivilege 5180 neon.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4304 4dff851bc8eef01f9edc43742ace87e10d2dfd4461f180635b842f180b8beac7.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 208 taskmgr.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 208 taskmgr.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe 208 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4304 wrote to memory of 3340 4304 4dff851bc8eef01f9edc43742ace87e10d2dfd4461f180635b842f180b8beac7.exe 83 PID 4304 wrote to memory of 3340 4304 4dff851bc8eef01f9edc43742ace87e10d2dfd4461f180635b842f180b8beac7.exe 83 PID 4304 wrote to memory of 3340 4304 4dff851bc8eef01f9edc43742ace87e10d2dfd4461f180635b842f180b8beac7.exe 83 PID 3340 wrote to memory of 2196 3340 axplong.exe 86 PID 3340 wrote to memory of 2196 3340 axplong.exe 86 PID 2676 wrote to memory of 1948 2676 msedge.exe 94 PID 2676 wrote to memory of 1948 2676 msedge.exe 94 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1096 2676 msedge.exe 96 PID 2676 wrote to memory of 1124 2676 msedge.exe 97 PID 2676 wrote to memory of 1124 2676 msedge.exe 97 PID 2676 wrote to memory of 628 2676 msedge.exe 98 PID 2676 wrote to memory of 628 2676 msedge.exe 98 PID 2676 wrote to memory of 628 2676 msedge.exe 98 PID 2676 wrote to memory of 628 2676 msedge.exe 98 PID 2676 wrote to memory of 628 2676 msedge.exe 98 PID 2676 wrote to memory of 628 2676 msedge.exe 98 PID 2676 wrote to memory of 628 2676 msedge.exe 98 PID 2676 wrote to memory of 628 2676 msedge.exe 98 PID 2676 wrote to memory of 628 2676 msedge.exe 98 PID 2676 wrote to memory of 628 2676 msedge.exe 98 PID 2676 wrote to memory of 628 2676 msedge.exe 98 PID 2676 wrote to memory of 628 2676 msedge.exe 98 PID 2676 wrote to memory of 628 2676 msedge.exe 98 PID 2676 wrote to memory of 628 2676 msedge.exe 98 PID 2676 wrote to memory of 628 2676 msedge.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dff851bc8eef01f9edc43742ace87e10d2dfd4461f180635b842f180b8beac7.exe"C:\Users\Admin\AppData\Local\Temp\4dff851bc8eef01f9edc43742ace87e10d2dfd4461f180635b842f180b8beac7.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\1000356001\neon.exe"C:\Users\Admin\AppData\Local\Temp\1000356001\neon.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2196 -
C:\Windows\SYSTEM32\cmd.exe"cmd" /c ping 127.0.0.1 -n 6 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "neon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\neon.exe"4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3424 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 65⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4528
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "neon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\neon.exe"5⤵
- Adds Run key to start application
PID:5212
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"4⤵PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\neon.exe"C:\Users\Admin\AppData\Local\Temp\neon.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5996 -
C:\Users\Admin\AppData\Local\Temp\neon.exe"C:\Users\Admin\AppData\Local\Temp\neon.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5944 -
C:\Users\Admin\AppData\Local\Temp\1000356001\neon.exe"C:\Users\Admin\AppData\Local\Temp\1000356001\neon.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5180
-
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"4⤵PID:5788
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:208
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.bing.com/search?q=neon.exe OCCT"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffef7ce46f8,0x7ffef7ce4708,0x7ffef7ce47182⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,2648902727476566679,10682640133899269091,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:22⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,2648902727476566679,10682640133899269091,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,2648902727476566679,10682640133899269091,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2648902727476566679,10682640133899269091,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2648902727476566679,10682640133899269091,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2648902727476566679,10682640133899269091,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1984,2648902727476566679,10682640133899269091,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3868 /prefetch:82⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1984,2648902727476566679,10682640133899269091,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5088 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2648902727476566679,10682640133899269091,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,2648902727476566679,10682640133899269091,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵PID:5300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,2648902727476566679,10682640133899269091,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2648902727476566679,10682640133899269091,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:5932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2648902727476566679,10682640133899269091,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:5940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2648902727476566679,10682640133899269091,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,2648902727476566679,10682640133899269091,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:5224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5272
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
6Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57dca233df92b3884663fa5a40db8d49c
SHA1208b8f27b708c4e06ac37f974471cc7b29c29b60
SHA25690c83311e35da0b5f8aa65aa2109745feb68ee9540e863f4ed909872e9c6a84c
SHA512d134b96fd33c79c85407608f76afc5a9f937bff453b1c90727a3ed992006c7d4c8329be6a2b5ba6b11da1a32f7cd60e9bc380be388b586d6cd5c2e6b1f57bd07
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD59f0f32d83a0a73e36f07393670ee75cb
SHA1a81f82366efdd8050247662cb5629aba4f1f80fb
SHA25643382ab2fe01e8cc113f426d48674d6569a23841693d8bbfce9fad79c6f47648
SHA51295f333ebed2af5d72faee275b1b83b01545fb538d0f4dcdc5d040951529907d955afaf55a539630d24196e7c419e9947384bee8ea8249cc1184cfb9b1cdb73d7
-
Filesize
760B
MD565f419471233d5d8974615eb74e1ddd9
SHA18e2a789dae6d6c0c29452d772f76c9dd41d536bf
SHA256bf36795ceeb3d57091f8ddbd3463e95f89c58eaafc6b72b2fd537f0a9ef5cc7a
SHA51231ffec5b94562742d0d83720b67b48f7bc2e317bc6bf90e1205c5ef41ed63c5545088cbbec25cdf6391ccfcb29f33d36042159ca58a5f1693ab9904574d3f6cd
-
Filesize
5KB
MD59220ba02de49e6c3698e5b637c5f75fa
SHA1aa8f9fa4590fce757bf1250d3894ead9e4167437
SHA2568be599d73c6ffe8291b5b02d6879456f514c30f80d3b23fee58bf677fcad7b77
SHA51266db26407d7af796fb1733092bbe2bc2ebcb9c96b6345d7f830dcc0a658d4fdfcc6cd7820b4cf892ef1726f3d61161e376cb0fdc67f3158e2fa4565981cc0fd4
-
Filesize
6KB
MD5c44827403cd1fa346cca607d603dbfce
SHA17c3ae2ae01505c33fa13bbff90de8057e50e13ec
SHA25673f063dfb555e1c5e68cf61973e1ada09acf0d57f97a98fc2ff06a7ed0f3d63f
SHA5128ef1f12e9d98e6e7e9e6600f94ab5b6196cdac5c9313ad623dd6611819a9a42127a4bf17492d4d4330b5be171ef1bd5f9e89c62f8a0d84e2ec43d97c21ab1e00
-
Filesize
7KB
MD59c3fa2aea9bf084dae53c36ed096789b
SHA1eee2a49139342bb04f3f9db749fc9d9b729c2a8d
SHA256a0b940d00959dc2e5e3da0aa18419501f584a53d3db2c343c086cac8485129c1
SHA512ebd2b61e568e55c312d145b41c9d6904a1123fb1b6ff3a759dd2ecfc9efc5be3ed3da5f2b15ff1ecd1fa8b2fc9584dc3789d4ca812da19ac4aace937bf1c6f05
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52c1355a7d2a0a9bab84bd8c6e5326eb6
SHA1524e401de05c731a06c6ecf75ba04444147bd536
SHA256fee0e5efb2f66675e5bd12818033142947ad51f0dd75b771b68fda5fe8850550
SHA512c5e22af3b8673d5e4e385dfde86b7aeba013322f76aa968aed38c289d2b987e09ada274da1c71904150495a3f34db2ebca5fb0be671e4fcc8017cf2da208b58c
-
Filesize
10KB
MD5299f5491c0d18a25b729ee33a9656475
SHA116021a04faa948f527f72af069ef8eabc109e674
SHA25665aae20f6458aa32c688b65cdbb79f976ad9956196687dda2463b1fa9d977cb9
SHA512104393dc72a42393bda29bf57e94f4ef460017d8ace5b5723801b774d8a6c58ddf2bed13c8f7d04226127877ec42b9c1b56e6e0d5cdfca58969752bb0220ea81
-
Filesize
3.5MB
MD5b3fd0e1003b1cd38402b6d32829f6135
SHA1c9cedd6322fb83457f56b64b4624b07e2786f702
SHA256e4a36be98f730d706d2ca97a5d687329a1cc7d4848daf698b7e21b6b9b577f31
SHA51204692e0f80a75f78b533677cefe3db6607108abf19963d88e231925cfa13f1ec054811aebe53c82d238e732a999cd8d176107d50cf2ea5694d4177cbfd3b30f1
-
Filesize
1.9MB
MD5163783e79ea2e3dba698f5933e4c3561
SHA15c411b62b7ac82cde4dee6e7e70f703535066600
SHA2564dff851bc8eef01f9edc43742ace87e10d2dfd4461f180635b842f180b8beac7
SHA5125152be8ce316edd89b284b02c11b18a3dbe4753b12c85db5aded4bd65bb7005a0d9d323656b47cc7b6a8c82a467019887a9dcad21afbca10d7e86e19810c558e
-
Filesize
76KB
MD50e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
Filesize
64B
MD547b6b71b300fe9de8a94f76691ceb7fc
SHA17491d9e1785a7e8b45240d3f25a51af84d75879d
SHA2567e122994d83660f23c3d5cb26479cbdb5f0468741cdcbe6432bb3443a706d51e
SHA5125c8bb39ac0c99170685087400b2486a9302599c6ec1679079369652807caa1f69d357e809b0c8788fc1cc273d142cbeeba98f76d6f3df4aa06f45c2ed361bddc
-
Filesize
67B
MD5a272d1def3911983f19751ff9d502659
SHA17bbe5c558aa6ba4585dc7dd60f13d1f36f77ba76
SHA2560434219f8327f027d05ba3ba86b58861af753d9893671c253845435783f5d0ab
SHA51243df92866c609e252af63a95fb95c003a523406f9410637f92f0c9f62615339deeb1c2a69218b2e23dc4b0f31b4b51f2d262b3e2087fc14bdc11571b352ffbcc
-
Filesize
67B
MD5f05583fb7075515d369c837c9b18a68f
SHA13de9706520106ea2d786fd73ced4e5d64c6cec81
SHA256e61f6023d727b6bfc8de671c858487d5aea181fd01434624d679e5f82633c73f
SHA5122651b966c6d6e01db87367f904208e5b8a57f43e6ddf3e86be086465ead61ecfffbdd055ce2bfe28a2c1ce26258a5508c2c38101a2c24fe036c3bf5142bcedc2