Analysis
-
max time kernel
300s -
max time network
306s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
26-09-2024 22:32
Static task
static1
Behavioral task
behavioral1
Sample
10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed.exe
Resource
win10-20240611-en
General
-
Target
10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed.exe
-
Size
1.8MB
-
MD5
bd7abe8f2f298b19d4a91f3ac05d96ac
-
SHA1
0a2560343a2f6d28008e409ede3050faff272058
-
SHA256
10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed
-
SHA512
4a0fbecbd0098a81724fcb9e930b1256c0b218898c557883572f6c64954932c3479a0b384564ef72e027c425dc4eda0cdbd7abc857025795055d0c9d1c38c09a
-
SSDEEP
49152:wVXX1Qtyb/1DB8DXFu4zQghNPeE8melL:KZB87FuBgORmeN
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
save
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Nightingale stealer
Nightingale stealer is an information stealer written in C#.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 18 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5937db8fb2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5c7a38c17d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ad7d9639e4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1175197065.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 49994b2be4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 36 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ad7d9639e4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1175197065.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5937db8fb2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 49994b2be4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5c7a38c17d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ad7d9639e4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5c7a38c17d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1175197065.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5937db8fb2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 49994b2be4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed.exe -
Executes dropped EXE 21 IoCs
pid Process 3160 axplong.exe 4724 ad7d9639e4.exe 4168 1175197065.exe 3740 skotes.exe 5116 neon.exe 2320 5937db8fb2.exe 5068 49994b2be4.exe 3464 127676b0fb.exe 1480 5c7a38c17d.exe 4944 axplong.exe 1280 skotes.exe 2320 neon.exe 3848 neon.exe 4492 skotes.exe 5100 axplong.exe 4984 skotes.exe 1376 axplong.exe 3164 skotes.exe 4448 axplong.exe 888 axplong.exe 4480 skotes.exe -
Identifies Wine through registry keys 2 TTPs 18 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine ad7d9639e4.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine 5c7a38c17d.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine 10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine 1175197065.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine 5937db8fb2.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine 49994b2be4.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine axplong.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Microsoft\Windows\CurrentVersion\Run\ad7d9639e4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000354001\\ad7d9639e4.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Microsoft\Windows\CurrentVersion\Run\1175197065.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000355001\\1175197065.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Microsoft\Windows\CurrentVersion\Run\5937db8fb2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000023001\\5937db8fb2.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Microsoft\Windows\CurrentVersion\Run\49994b2be4.exe = "C:\\Users\\Admin\\1000026002\\49994b2be4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Microsoft\Windows\CurrentVersion\Run\127676b0fb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000028001\\127676b0fb.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Microsoft\Windows\CurrentVersion\Run\neon = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\neon.exe" reg.exe -
pid Process 416 powershell.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 60 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000800000001ab25-111.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
pid Process 3280 10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed.exe 3160 axplong.exe 4724 ad7d9639e4.exe 4168 1175197065.exe 3740 skotes.exe 2320 5937db8fb2.exe 5068 49994b2be4.exe 1480 5c7a38c17d.exe 4944 axplong.exe 1280 skotes.exe 4492 skotes.exe 5100 axplong.exe 4984 skotes.exe 1376 axplong.exe 3164 skotes.exe 4448 axplong.exe 888 axplong.exe 4480 skotes.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5116 set thread context of 4556 5116 neon.exe 96 PID 5116 set thread context of 5044 5116 neon.exe 104 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1175197065.exe File created C:\Windows\Tasks\axplong.job 10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1175197065.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 127676b0fb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad7d9639e4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5937db8fb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49994b2be4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c7a38c17d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5000 cmd.exe 3840 PING.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133718635692564549" chrome.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3840 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3280 10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed.exe 3280 10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed.exe 3160 axplong.exe 3160 axplong.exe 4724 ad7d9639e4.exe 4724 ad7d9639e4.exe 4168 1175197065.exe 4168 1175197065.exe 3740 skotes.exe 3740 skotes.exe 5116 neon.exe 5116 neon.exe 2320 5937db8fb2.exe 2320 5937db8fb2.exe 5068 49994b2be4.exe 5068 49994b2be4.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 4412 chrome.exe 4412 chrome.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3464 127676b0fb.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5116 neon.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe Token: SeCreatePagefilePrivilege 4412 chrome.exe Token: SeShutdownPrivilege 4412 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3280 10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed.exe 4168 1175197065.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 3464 127676b0fb.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 3464 127676b0fb.exe 4412 chrome.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 3464 127676b0fb.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 4412 chrome.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe 3464 127676b0fb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3280 wrote to memory of 3160 3280 10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed.exe 71 PID 3280 wrote to memory of 3160 3280 10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed.exe 71 PID 3280 wrote to memory of 3160 3280 10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed.exe 71 PID 3160 wrote to memory of 4724 3160 axplong.exe 72 PID 3160 wrote to memory of 4724 3160 axplong.exe 72 PID 3160 wrote to memory of 4724 3160 axplong.exe 72 PID 3160 wrote to memory of 4168 3160 axplong.exe 73 PID 3160 wrote to memory of 4168 3160 axplong.exe 73 PID 3160 wrote to memory of 4168 3160 axplong.exe 73 PID 4168 wrote to memory of 3740 4168 1175197065.exe 74 PID 4168 wrote to memory of 3740 4168 1175197065.exe 74 PID 4168 wrote to memory of 3740 4168 1175197065.exe 74 PID 3160 wrote to memory of 5116 3160 axplong.exe 75 PID 3160 wrote to memory of 5116 3160 axplong.exe 75 PID 3740 wrote to memory of 2320 3740 skotes.exe 76 PID 3740 wrote to memory of 2320 3740 skotes.exe 76 PID 3740 wrote to memory of 2320 3740 skotes.exe 76 PID 3740 wrote to memory of 5068 3740 skotes.exe 77 PID 3740 wrote to memory of 5068 3740 skotes.exe 77 PID 3740 wrote to memory of 5068 3740 skotes.exe 77 PID 3740 wrote to memory of 3464 3740 skotes.exe 78 PID 3740 wrote to memory of 3464 3740 skotes.exe 78 PID 3740 wrote to memory of 3464 3740 skotes.exe 78 PID 3464 wrote to memory of 4412 3464 127676b0fb.exe 79 PID 3464 wrote to memory of 4412 3464 127676b0fb.exe 79 PID 4412 wrote to memory of 4824 4412 chrome.exe 81 PID 4412 wrote to memory of 4824 4412 chrome.exe 81 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 PID 4412 wrote to memory of 2644 4412 chrome.exe 83 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed.exe"C:\Users\Admin\AppData\Local\Temp\10c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\1000354001\ad7d9639e4.exe"C:\Users\Admin\AppData\Local\Temp\1000354001\ad7d9639e4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4724
-
-
C:\Users\Admin\AppData\Local\Temp\1000355001\1175197065.exe"C:\Users\Admin\AppData\Local\Temp\1000355001\1175197065.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\1000023001\5937db8fb2.exe"C:\Users\Admin\AppData\Local\Temp\1000023001\5937db8fb2.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
-
C:\Users\Admin\1000026002\49994b2be4.exe"C:\Users\Admin\1000026002\49994b2be4.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
C:\Users\Admin\AppData\Local\Temp\1000028001\127676b0fb.exe"C:\Users\Admin\AppData\Local\Temp\1000028001\127676b0fb.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd6⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff57ff9758,0x7fff57ff9768,0x7fff57ff97787⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1544 --field-trial-handle=1888,i,9554615031346437246,4426184365032916533,131072 /prefetch:27⤵PID:2644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1800 --field-trial-handle=1888,i,9554615031346437246,4426184365032916533,131072 /prefetch:87⤵PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2100 --field-trial-handle=1888,i,9554615031346437246,4426184365032916533,131072 /prefetch:87⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1888,i,9554615031346437246,4426184365032916533,131072 /prefetch:17⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3176 --field-trial-handle=1888,i,9554615031346437246,4426184365032916533,131072 /prefetch:17⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4364 --field-trial-handle=1888,i,9554615031346437246,4426184365032916533,131072 /prefetch:17⤵PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 --field-trial-handle=1888,i,9554615031346437246,4426184365032916533,131072 /prefetch:87⤵PID:4188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4632 --field-trial-handle=1888,i,9554615031346437246,4426184365032916533,131072 /prefetch:87⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4640 --field-trial-handle=1888,i,9554615031346437246,4426184365032916533,131072 /prefetch:87⤵PID:3228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1888,i,9554615031346437246,4426184365032916533,131072 /prefetch:87⤵PID:4544
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000029001\5c7a38c17d.exe"C:\Users\Admin\AppData\Local\Temp\1000029001\5c7a38c17d.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000356001\neon.exe"C:\Users\Admin\AppData\Local\Temp\1000356001\neon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5116 -
C:\Windows\SYSTEM32\cmd.exe"cmd" /c ping 127.0.0.1 -n 8 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "neon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\neon.exe"4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5000 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 85⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3840
-
-
C:\Windows\system32\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "neon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\neon.exe"5⤵
- Adds Run key to start application
PID:1264
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"4⤵PID:4556
-
-
C:\Users\Admin\AppData\Local\Temp\neon.exe"C:\Users\Admin\AppData\Local\Temp\neon.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\neon.exe"C:\Users\Admin\AppData\Local\Temp\neon.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3848
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"4⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:5044 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY5⤵
- Command and Scripting Interpreter: PowerShell
PID:416
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY5⤵PID:3192
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4944
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1280
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4492
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5100
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1376
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4984
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4448
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3164
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:888
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4480
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Discovery
Browser Information Discovery
1Query Registry
4Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
323KB
MD5263a958a362759c6e8961ba96d8d8777
SHA178bde690e40df1dc794976fc86a5c43b7d6062b9
SHA256a9d78193108e1531c6468d35e3f89ebcf4a2906c17bf629915758c435ed0be72
SHA5128d95f3316a5bbcdb30c3799f7f3ca483de20c2213d137dc679a16b53ccbc914fcc588eb21f29ebdc4fd2b649dab803d8c1ab43351c0e81414246a8007d555937
-
Filesize
240B
MD50b48682375aa96f9e3a22cf14c405f96
SHA109a88281f7b1466dee3f2ab2b25d72e22a76627b
SHA2562788e681422ea58ff7969df3dbb10eb1212b61dba77200ec0d5f1281c9f30771
SHA512e0f96369ee8747388769049aeccaa65936e2360eea486320d78796fd8d382b03a7009e2af9f2a070a012b20a0e30b57d73d340433b838b3e660df5cf818982d5
-
Filesize
20KB
MD51d1083a965567aa48021e982cec56145
SHA1944391ad30689482316739dfa6c1d64cbabe4f0e
SHA256ead7a1631b1427f7d17ac72ca347490df7123de13b16836ea8373e7dd646182c
SHA512b47fb0cfaabf89199d19bf20df4c8d31c21f429a3de22b8ce9f2ef52b22b3970eef906759232ae0f4210e5996c151bd6602410cf95f43089cbca4e756209adc0
-
Filesize
1KB
MD58ba3c6207ba26e0c7e83bb9b2e738fc9
SHA130eaf2e33d540e073746110dfd74f4d0e38b48d1
SHA256e2f751e044b4cb72b47014a1dff908f39342d834034d4d76f00343b10a6470ef
SHA512c9c875d4d4175df47749247b76352852eccfba1881d1c318f56e9c3ca475b800fde5c1d5d957bee7d8122c10275041e0e782f19a46ea9dbe773cf6d769d62c23
-
Filesize
707B
MD58c67b5685e27ab618867be8b286418ea
SHA1bea8aa22f594115547f6b7d9cb024a482e493f58
SHA25633b47bd11acf51e994138a678b5856066c72255d3aaa54dffadd57b6f78e31a6
SHA512c006a47f51636950f3ad92f47664d8552cf05af7db84fff6aba2949deb1f133ebd4636bdf577925a34e55bb2769f732338bd8a5cef2d2f4e4a950d186b6e3e39
-
Filesize
6KB
MD5b461e7bd480035072dd77bcd9a9aff4e
SHA1173808a4594de1d6eb9c9c8ecc90c5d4055991bd
SHA2569ce8e238dbb96ef219660b1d644e27f0076c38de3a393977c476d2f1be7f568a
SHA512071e69c239710233adcbf1b373403f7503b82ead589cc2f0d0ee5decdc454446b89725cecce77f5d78ba62cb7b62be857b143e481369faca17db1fd5a797a597
-
Filesize
6KB
MD53c4036da8a2e4ff5ce7b089b4be6ae40
SHA1f80d94051880b0ec980619b7cb373cba67385b42
SHA2560f053ce3b160e91f995be20131727750b1a33fd5a61bca2c2c1123bc25aebf37
SHA512f3043e02e69796537ed6d86ac015d2c455561b3a8ecdc7fb376a34506c11481736b8b23e29e0f065a36f9927ed5ae7447441bf67873498616602b7afa86dbd9c
-
Filesize
6KB
MD51a8c1d5d5b207e933444c7100e559efd
SHA1398a7db874ba5fc16bccf1aab60f1039ff73786c
SHA25669e24983911284deecc54c72a193c48adefa3e88c45417a4d59f8e55a9650b97
SHA512a2953f90496c073bd2301817285f7af21c3cf4fecf7b6c3bebd76fead02965bb515606d0b81f02ce4274f9cf70cb5d7c2940375ebf02ccae9b9af8800cfcacbf
-
Filesize
14B
MD59eae63c7a967fc314dd311d9f46a45b7
SHA1caba9c2c93acfe0b9ceb9ab19b992b0fc19c71cf
SHA2564288925b0cf871c7458c22c46936efb0e903802feb991a0e1803be94ca6c251d
SHA512bed924bff236bf5b6ce1df1db82e86c935e5830a20d9d24697efd82ca331e30604db8d04b0d692ec8541ec6deb2225bcc7d805b79f2db5726642198ecf6348b8
-
Filesize
323KB
MD5b541837e367a03f692169055f192a7a7
SHA183acfeb7ff471f11855d94bedd76edf4558f6780
SHA256240b69280379d45b798f11e44ef2ee61b1b82d8a8a9b3db5268dd3cb5a3613d0
SHA512eac407c652100b1e8d0f871e37cb6c1ecf596fc9d8221fd6d3dc6ca0310bff988ca0cf47b8ee7d3662bd6e895c69941f116567af7200ce990770659af5994192
-
Filesize
150KB
MD5b43cb498b153e6f9b29338d89f51f4c1
SHA1dcac5db99f9c1c1d661776725378bd124836e961
SHA256cdd26f9a92c07624d8a704064e5a3cd4bf0a33dc95306b536f6bb67b5cae4786
SHA512a2116bc64f82eab638c432796b5d461c338321bd6fee8d7f1e831d71aa0aa2bf7f2f76262981abcc1d033bb559687e89fd576c360420919fc120104d10dc010e
-
Filesize
341KB
MD5ec32edc93d27396affd67ea9b857480d
SHA12f2a5d0d0f02ef3869088b42684d8d928d490b74
SHA256e41dfb1348e611843488a4a8f3b939bce7af4652ffa5fc6b6ad0641f2478d3e4
SHA51295b073001b1178f8f7c67cde0b31467e8339cbe31c836a162dd1e786da24928cecc1340b20dffa9b133b7628dcffe836193c28b72b33ecd47da730cabfb0cfc4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
3KB
MD55d574dc518025fad52b7886c1bff0e13
SHA168217a5f9e9a64ca8fed9eefa4171786a8f9f8f7
SHA256755c4768f6e384030805284ab88689a325431667e9ab11d9aeaa55e9739742f2
SHA51221de152e07d269b265dae58d46e8c68a3268b2f78d771d4fc44377a14e0c6e73aadae923dcfd34ce2ef53c2eaa53d4df8f281d9b8a627edee213946c9ef37d13
-
Filesize
1KB
MD5e555c48cb712a9597ecb55a60135d1f8
SHA12081c72d30c34ec3f61f9944545ecdaae11521f7
SHA256815c80df060afa8acf7640ca011735ef77c66666d03901e04a8767827d5da4e9
SHA51232129b5be15217e5400f1e7536270a703d62db60ebb06396b9d74703e6a0dcd2e78f7f42b2019093be1508a9310912f305b88de274a295c9135a4086cd8c8427
-
Filesize
1KB
MD5b0c9db00a53a4682b20faf5c07394899
SHA141292985bf22d0c303da4db2263f31c5a39daf63
SHA25646eee6076ec6aa62af17417697508f4a67289ccff02b739a4efd256091252233
SHA512a70cf7c71773483651994f5ede898d6874cc33cd87e36e0584576d893244566afc985e470cbd299304ed9347910eeb93b7aa019885a31acdff39492550838e8e
-
Filesize
1.1MB
MD5109677787158bb7913c84844415c51ce
SHA1e2ddb6c884e456b2e8bb131ad2525abba41b281c
SHA256750de76e0ec8b879244cb40d97df55fdaa0f582393f539a8d5fe2169406c936b
SHA51259453526479ee8283218dbf1d796122572cd6d0712e8c2a892e9e243a8b5218c3b8e6f13d06d8fba9ddaaf083d100f872ede618eb88bc5f71b4bee6c556df12e
-
Filesize
1.8MB
MD5d47f5061136cbb1fc4d56bc8e0355c12
SHA13829e4804c1e0dcd77dc82cad9490bfaa3258887
SHA256b3cae12b1399883b64871dfb422899f804fb2ae2fcfe073fe783165295b4886d
SHA512ba14be86e71ce577c5e6106208ffb9a58e509ee8a67e94aa6646a93d5bf2691431ba886d28a8de7711005bb144face91a52b2936a749a5de6d539c64655504bf
-
Filesize
1.8MB
MD587e8169e650f30493ca9a395620cce1d
SHA1153a1ec34d2edd3e102f5618e4807be158a0d60d
SHA25674f284fa73cadda54e2b0d90d4f612f725cfff6c20ee5e9560c02d8de8936d3c
SHA512251b6580c776427e6113c62decf83e6ac4984161916aeb6ee88b81afe37f1ea766a8daa52fcb735d952fa81adf1e12098d8486051e837a39f74d54de904e8695
-
Filesize
1.8MB
MD5b369d7b9b209d6a20687967cc218715a
SHA1e6fc8803983c53288d261ab8933aa07684cfcfbd
SHA2565ca1fbe6ea1f6278e17206f28d6e910a1064c072be039eeed3dcd54883f4bca9
SHA512ec7c6982bf5bbfaf2fb2de353a677b3d1b2bcbffed5e0ff8fa112d3c3ba869258242de43fa55b703be76f9d7834d41c76e51dfdd0d6fa501c46c5160b5781518
-
Filesize
3.5MB
MD5b3fd0e1003b1cd38402b6d32829f6135
SHA1c9cedd6322fb83457f56b64b4624b07e2786f702
SHA256e4a36be98f730d706d2ca97a5d687329a1cc7d4848daf698b7e21b6b9b577f31
SHA51204692e0f80a75f78b533677cefe3db6607108abf19963d88e231925cfa13f1ec054811aebe53c82d238e732a999cd8d176107d50cf2ea5694d4177cbfd3b30f1
-
Filesize
1.8MB
MD5bd7abe8f2f298b19d4a91f3ac05d96ac
SHA10a2560343a2f6d28008e409ede3050faff272058
SHA25610c63c1b8a6a9f6123bde8331732946a9ecf54378fa6ffee0a4fd5f0a00d2bed
SHA5124a0fbecbd0098a81724fcb9e930b1256c0b218898c557883572f6c64954932c3479a0b384564ef72e027c425dc4eda0cdbd7abc857025795055d0c9d1c38c09a
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
76KB
MD50e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
Filesize
64B
MD5e48df9ab5855d87a6293f08796b658f6
SHA125bd5d79cf38da970d8ffe60aa954e33c7dc2c68
SHA2562a9792a5c034ccbc3033fe1f6634e1948f2f156a6e78713740f94a0aab192ffa
SHA512d43fa78b0722d0e16819a9782136de8d9496d140d9c56498bdaa0c369d67ff8160f0f9acb2881b8f0d379a1c84eaf140c372b75293d1749483184fd485a077ac
-
Filesize
67B
MD59e6fe11a0008cedfc866bea7a55fc413
SHA19da8bcdf9d2befd29c866f8cda7f03e2380e771b
SHA256ffca11ac34f27b6aa63a98e2f3ac0c88e58529d0804091a5ca472f3331c638d8
SHA5128cde5bf0a3ddca4f95dc4966cc2cedef2f7baf11d4286d1a04533120b8c287abe2c76effc07fa317543979c1b8a2389bda130ff510592e688e558f05380330f0
-
Filesize
67B
MD57c6ad6501f4b102b8b7f4d026773299e
SHA1ff4a75588a261236f954c0e1d62ed7cdb5093bb0
SHA256547ee9f92dcef3fc84b72889d3294b2bda715c0f8d40b5aed9969e7e638c4ff3
SHA51258e43c11d07a235e3207fb77f5ba0fce9f667cd458061cf5b38f600bb5aa6fcfaa4a9fdfb99fb65f98f375672ed384e9139ae061ee05f9e00820f778366fd548