Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 17:35
Static task
static1
General
-
Target
17f29ebe12b697ea77345bb9c0cf3c55c411783dc717c4bf5fa65e9af42686fa.exe
-
Size
1.8MB
-
MD5
4cf346373d331ff441b71ae12c4420ff
-
SHA1
e4d53520a0b925b9122cba1f9f7cac6661ac014c
-
SHA256
17f29ebe12b697ea77345bb9c0cf3c55c411783dc717c4bf5fa65e9af42686fa
-
SHA512
d82d681438a1df724b3b698d12049f0b4b11c829ec94de15bbf7c68a1b456675b4a5e2fa0f25a67d8daf6da28310df508f88b3cc0906fe02eb43a0c36dcb7a09
-
SSDEEP
49152:9fRIz2Mkd2gce9Umg7kce1AmWp6/9V/eIxe2Lj4zVUw5xJS:1R6vkd2synNbm4k9V/eMeIwP5xJ
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 6b9e4cc150.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 6b9e4cc150.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 6b9e4cc150.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 6b9e4cc150.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 6b9e4cc150.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 6b9e4cc150.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
description pid Process procid_target PID 3640 created 3396 3640 Ixpla.exe 56 PID 3488 created 3396 3488 Gxtuum.exe 56 PID 2108 created 3396 2108 Gxtuum.exe 56 PID 4756 created 3396 4756 Gxtuum.exe 56 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 17f29ebe12b697ea77345bb9c0cf3c55c411783dc717c4bf5fa65e9af42686fa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9e4feb4c2a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6b9e4cc150.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 49 2488 rundll32.exe 50 2488 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 17f29ebe12b697ea77345bb9c0cf3c55c411783dc717c4bf5fa65e9af42686fa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9e4feb4c2a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6b9e4cc150.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6b9e4cc150.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 17f29ebe12b697ea77345bb9c0cf3c55c411783dc717c4bf5fa65e9af42686fa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9e4feb4c2a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 17f29ebe12b697ea77345bb9c0cf3c55c411783dc717c4bf5fa65e9af42686fa.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Ixpla.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Gxtuum.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lbroker.vbs Ixpla.exe -
Executes dropped EXE 14 IoCs
pid Process 4056 axplong.exe 3640 Ixpla.exe 512 networkmanager.exe 3688 9e4feb4c2a.exe 4736 6b9e4cc150.exe 4720 Ixpla.exe 3488 Gxtuum.exe 4728 axplong.exe 2108 Gxtuum.exe 2664 Gxtuum.exe 4816 Gxtuum.exe 2032 axplong.exe 4756 Gxtuum.exe 3584 Gxtuum.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 17f29ebe12b697ea77345bb9c0cf3c55c411783dc717c4bf5fa65e9af42686fa.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 9e4feb4c2a.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 6b9e4cc150.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine axplong.exe -
Loads dropped DLL 1 IoCs
pid Process 2488 rundll32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 6b9e4cc150.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 6b9e4cc150.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetWorkManager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006141001\\networkmanager.exe" networkmanager.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9e4feb4c2a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006182001\\9e4feb4c2a.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6b9e4cc150.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006183001\\6b9e4cc150.exe" axplong.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2116 17f29ebe12b697ea77345bb9c0cf3c55c411783dc717c4bf5fa65e9af42686fa.exe 4056 axplong.exe 3688 9e4feb4c2a.exe 4736 6b9e4cc150.exe 4728 axplong.exe 2032 axplong.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3640 set thread context of 4720 3640 Ixpla.exe 96 PID 3488 set thread context of 2664 3488 Gxtuum.exe 100 PID 2108 set thread context of 4816 2108 Gxtuum.exe 102 PID 4756 set thread context of 3584 4756 Gxtuum.exe 105 -
resource yara_rule behavioral2/files/0x000a000000023b8a-1229.dat upx behavioral2/memory/512-1241-0x0000000000B10000-0x000000000128B000-memory.dmp upx behavioral2/memory/512-1283-0x0000000000B10000-0x000000000128B000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 17f29ebe12b697ea77345bb9c0cf3c55c411783dc717c4bf5fa65e9af42686fa.exe File created C:\Windows\Tasks\Gxtuum.job Ixpla.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e4feb4c2a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ixpla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ixpla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b9e4cc150.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17f29ebe12b697ea77345bb9c0cf3c55c411783dc717c4bf5fa65e9af42686fa.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 16 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2116 17f29ebe12b697ea77345bb9c0cf3c55c411783dc717c4bf5fa65e9af42686fa.exe 2116 17f29ebe12b697ea77345bb9c0cf3c55c411783dc717c4bf5fa65e9af42686fa.exe 4056 axplong.exe 4056 axplong.exe 3688 9e4feb4c2a.exe 3688 9e4feb4c2a.exe 4736 6b9e4cc150.exe 4736 6b9e4cc150.exe 4736 6b9e4cc150.exe 4736 6b9e4cc150.exe 3640 Ixpla.exe 4728 axplong.exe 4728 axplong.exe 3488 Gxtuum.exe 2108 Gxtuum.exe 2032 axplong.exe 2032 axplong.exe 4756 Gxtuum.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 3640 Ixpla.exe Token: SeDebugPrivilege 4736 6b9e4cc150.exe Token: SeDebugPrivilege 3640 Ixpla.exe Token: SeDebugPrivilege 3488 Gxtuum.exe Token: SeDebugPrivilege 2108 Gxtuum.exe Token: SeDebugPrivilege 3488 Gxtuum.exe Token: SeDebugPrivilege 2108 Gxtuum.exe Token: SeDebugPrivilege 4756 Gxtuum.exe Token: SeDebugPrivilege 4756 Gxtuum.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 17f29ebe12b697ea77345bb9c0cf3c55c411783dc717c4bf5fa65e9af42686fa.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2116 wrote to memory of 4056 2116 17f29ebe12b697ea77345bb9c0cf3c55c411783dc717c4bf5fa65e9af42686fa.exe 82 PID 2116 wrote to memory of 4056 2116 17f29ebe12b697ea77345bb9c0cf3c55c411783dc717c4bf5fa65e9af42686fa.exe 82 PID 2116 wrote to memory of 4056 2116 17f29ebe12b697ea77345bb9c0cf3c55c411783dc717c4bf5fa65e9af42686fa.exe 82 PID 4056 wrote to memory of 3640 4056 axplong.exe 83 PID 4056 wrote to memory of 3640 4056 axplong.exe 83 PID 4056 wrote to memory of 3640 4056 axplong.exe 83 PID 4056 wrote to memory of 512 4056 axplong.exe 84 PID 4056 wrote to memory of 512 4056 axplong.exe 84 PID 4056 wrote to memory of 3688 4056 axplong.exe 85 PID 4056 wrote to memory of 3688 4056 axplong.exe 85 PID 4056 wrote to memory of 3688 4056 axplong.exe 85 PID 4056 wrote to memory of 4736 4056 axplong.exe 90 PID 4056 wrote to memory of 4736 4056 axplong.exe 90 PID 4056 wrote to memory of 4736 4056 axplong.exe 90 PID 3640 wrote to memory of 4720 3640 Ixpla.exe 96 PID 3640 wrote to memory of 4720 3640 Ixpla.exe 96 PID 3640 wrote to memory of 4720 3640 Ixpla.exe 96 PID 3640 wrote to memory of 4720 3640 Ixpla.exe 96 PID 3640 wrote to memory of 4720 3640 Ixpla.exe 96 PID 3640 wrote to memory of 4720 3640 Ixpla.exe 96 PID 3640 wrote to memory of 4720 3640 Ixpla.exe 96 PID 3640 wrote to memory of 4720 3640 Ixpla.exe 96 PID 3640 wrote to memory of 4720 3640 Ixpla.exe 96 PID 3640 wrote to memory of 4720 3640 Ixpla.exe 96 PID 4720 wrote to memory of 3488 4720 Ixpla.exe 97 PID 4720 wrote to memory of 3488 4720 Ixpla.exe 97 PID 4720 wrote to memory of 3488 4720 Ixpla.exe 97 PID 3488 wrote to memory of 2664 3488 Gxtuum.exe 100 PID 3488 wrote to memory of 2664 3488 Gxtuum.exe 100 PID 3488 wrote to memory of 2664 3488 Gxtuum.exe 100 PID 3488 wrote to memory of 2664 3488 Gxtuum.exe 100 PID 3488 wrote to memory of 2664 3488 Gxtuum.exe 100 PID 3488 wrote to memory of 2664 3488 Gxtuum.exe 100 PID 3488 wrote to memory of 2664 3488 Gxtuum.exe 100 PID 3488 wrote to memory of 2664 3488 Gxtuum.exe 100 PID 3488 wrote to memory of 2664 3488 Gxtuum.exe 100 PID 3488 wrote to memory of 2664 3488 Gxtuum.exe 100 PID 2664 wrote to memory of 2488 2664 Gxtuum.exe 101 PID 2664 wrote to memory of 2488 2664 Gxtuum.exe 101 PID 2664 wrote to memory of 2488 2664 Gxtuum.exe 101 PID 2108 wrote to memory of 4816 2108 Gxtuum.exe 102 PID 2108 wrote to memory of 4816 2108 Gxtuum.exe 102 PID 2108 wrote to memory of 4816 2108 Gxtuum.exe 102 PID 2108 wrote to memory of 4816 2108 Gxtuum.exe 102 PID 2108 wrote to memory of 4816 2108 Gxtuum.exe 102 PID 2108 wrote to memory of 4816 2108 Gxtuum.exe 102 PID 2108 wrote to memory of 4816 2108 Gxtuum.exe 102 PID 2108 wrote to memory of 4816 2108 Gxtuum.exe 102 PID 2108 wrote to memory of 4816 2108 Gxtuum.exe 102 PID 2108 wrote to memory of 4816 2108 Gxtuum.exe 102 PID 4756 wrote to memory of 3584 4756 Gxtuum.exe 105 PID 4756 wrote to memory of 3584 4756 Gxtuum.exe 105 PID 4756 wrote to memory of 3584 4756 Gxtuum.exe 105 PID 4756 wrote to memory of 3584 4756 Gxtuum.exe 105 PID 4756 wrote to memory of 3584 4756 Gxtuum.exe 105 PID 4756 wrote to memory of 3584 4756 Gxtuum.exe 105 PID 4756 wrote to memory of 3584 4756 Gxtuum.exe 105 PID 4756 wrote to memory of 3584 4756 Gxtuum.exe 105 PID 4756 wrote to memory of 3584 4756 Gxtuum.exe 105 PID 4756 wrote to memory of 3584 4756 Gxtuum.exe 105
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\17f29ebe12b697ea77345bb9c0cf3c55c411783dc717c4bf5fa65e9af42686fa.exe"C:\Users\Admin\AppData\Local\Temp\17f29ebe12b697ea77345bb9c0cf3c55c411783dc717c4bf5fa65e9af42686fa.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3640
-
-
C:\Users\Admin\AppData\Local\Temp\1006141001\networkmanager.exe"C:\Users\Admin\AppData\Local\Temp\1006141001\networkmanager.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:512
-
-
C:\Users\Admin\AppData\Local\Temp\1006182001\9e4feb4c2a.exe"C:\Users\Admin\AppData\Local\Temp\1006182001\9e4feb4c2a.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3688
-
-
C:\Users\Admin\AppData\Local\Temp\1006183001\6b9e4cc150.exe"C:\Users\Admin\AppData\Local\Temp\1006183001\6b9e4cc150.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3488
-
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\10000470111\123719821238.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2488
-
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Executes dropped EXE
PID:4816
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Executes dropped EXE
PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4756
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD544163d81bb5710839fb9ba265de2c942
SHA1a7497d6085ed8ce25e9728a0af7e989e026eaf04
SHA256de4e3ff7f7da5d5561e384585a9d0cb66f2c51ea324c184848d125d8792bf666
SHA51297ef4974f41affd04eb960fa873cd9754f31007c3d7239a7fb5b17cc152c01f2050c3b25d107e36ab5c65010610624e773f726de7d39255bb2c0ad5d8b9929a4
-
Filesize
1.4MB
MD56e7ffd057086e44e4fcc01846cd2b152
SHA105712e7e7b8429b2dd201ea504dc32fefe5795da
SHA256fbc587e990949e428e8ce7a2c74dbf85cd63ffa07370756ad854595fea0033d7
SHA5128cab1824b32c54273658d28738109c8a1ef3170c1fbe02deeee40d40990acb6d45431bfb65a3facebee9a919bd972734012b1e8de035b9c1329f1bd0e709ecd2
-
Filesize
2.1MB
MD5f8d528a37993ed91d2496bab9fc734d3
SHA14b66b225298f776e21f566b758f3897d20b23cad
SHA256bc8458a8d78cf91129c84b153aafe8319410aacb8e14aec506897c8e0793ba02
SHA51275dc1bbb1388f68d121bab26fc7f6bf9dc1226417ad7ed4a7b9718999aa0f9c891fed0db3c9ea6d6ccb34288cc848dc44b20ea83a30afd4ea2e99cff51f30f5a
-
Filesize
1.8MB
MD5d21609e703999b87040f7a9b6237f5e8
SHA11fe2bd28aa876fa28fa9cd33f51f00fc82b8b3d5
SHA256e9b37653e9dc29f692778fbbb88e970afbeaad574855255ca278eda13d79e001
SHA51207ce349bfd56a57c5e5524781d34f2df0ec0d65f88934114100f8094d3f0fa47b029dac14c55f2864207fbd7923cdbda3fda5df7bcaf9c41c9b1417ec1d08b3c
-
Filesize
2.7MB
MD5011c92ee809e050ffe9560fdc3c16706
SHA18fb19f1559cf61126212675a11c154de4a9bc98a
SHA256a0ee8cb0819ee13fbacd3bdc3621c0f9b930bc7085b22118b93eb7e2d8500b8d
SHA5129a99e9d5c3006dc58ce0e732ed7eac7a21247335c8bd99c3c00af28ca19457780a8e6b30dca3caa651558172c810d9065a92854c5e47534f60366f4970a6895c
-
Filesize
1.8MB
MD54cf346373d331ff441b71ae12c4420ff
SHA1e4d53520a0b925b9122cba1f9f7cac6661ac014c
SHA25617f29ebe12b697ea77345bb9c0cf3c55c411783dc717c4bf5fa65e9af42686fa
SHA512d82d681438a1df724b3b698d12049f0b4b11c829ec94de15bbf7c68a1b456675b4a5e2fa0f25a67d8daf6da28310df508f88b3cc0906fe02eb43a0c36dcb7a09