Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 08:16
Static task
static1
Behavioral task
behavioral1
Sample
51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7.exe
Resource
win7-20241010-en
General
-
Target
51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7.exe
-
Size
1.8MB
-
MD5
0b20eccc24df80884571a59d9baa22e6
-
SHA1
7e7d09c55a0c5dedc8025711062fb7928f63ad3a
-
SHA256
51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7
-
SHA512
0313eb3f8ecab91c16fb0437abbd22c895d4d50686fa66f3c07262a1c7062de2ae6d8e905df3f8cd9129d682c5a600ae57a0dcbcb680e1e6affe89ba6a1cb650
-
SSDEEP
24576:6+NRtAUxQrMZk3S/LFn+VPUkNgAIdqSMUKMvpHdcPWhAHwf5yPovMH1s964reC9x:62wr5CJn1ke/dqSj9c+Dyz1s9QOxqk
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d20ce05a9d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d20ce05a9d.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection d20ce05a9d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d20ce05a9d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d20ce05a9d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d20ce05a9d.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
description pid Process procid_target PID 1804 created 3448 1804 Qtdedcpuf.exe 56 PID 2944 created 3448 2944 Ixpla.exe 56 PID 3416 created 3448 3416 Gxtuum.exe 56 PID 872 created 3448 872 Gxtuum.exe 56 PID 1612 created 3448 1612 Gxtuum.exe 56 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3d1dfa9e65.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d20ce05a9d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 75 3876 rundll32.exe 76 3876 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3d1dfa9e65.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d20ce05a9d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d20ce05a9d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3d1dfa9e65.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation chrome11.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Qtdedcpuf.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Ixpla.exe -
Drops startup file 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lbroker.vbs Ixpla.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lbroker.vbs Gxtuum.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\l4.exe l4.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\l4.exe l4.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lbroker.vbs Qtdedcpuf.exe -
Executes dropped EXE 19 IoCs
pid Process 2248 axplong.exe 3524 chrome11.exe 4076 l4.exe 3664 l4.exe 1804 Qtdedcpuf.exe 2944 Ixpla.exe 5712 networkmanager.exe 5840 3d1dfa9e65.exe 6088 d20ce05a9d.exe 3972 axplong.exe 808 Qtdedcpuf.exe 3416 Gxtuum.exe 424 Ixpla.exe 872 Gxtuum.exe 512 Gxtuum.exe 4944 Gxtuum.exe 5348 axplong.exe 1612 Gxtuum.exe 2888 Gxtuum.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 3d1dfa9e65.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine d20ce05a9d.exe -
Loads dropped DLL 7 IoCs
pid Process 3664 l4.exe 3664 l4.exe 3664 l4.exe 3664 l4.exe 3664 l4.exe 3664 l4.exe 3876 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d20ce05a9d.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features d20ce05a9d.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d20ce05a9d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006185001\\d20ce05a9d.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetWorkManager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006141001\\networkmanager.exe" networkmanager.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3d1dfa9e65.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006184001\\3d1dfa9e65.exe" axplong.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 5088 51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7.exe 2248 axplong.exe 5840 3d1dfa9e65.exe 6088 d20ce05a9d.exe 3972 axplong.exe 5348 axplong.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1804 set thread context of 808 1804 Qtdedcpuf.exe 104 PID 2944 set thread context of 424 2944 Ixpla.exe 106 PID 3416 set thread context of 512 3416 Gxtuum.exe 108 PID 872 set thread context of 4944 872 Gxtuum.exe 109 PID 1612 set thread context of 2888 1612 Gxtuum.exe 113 -
resource yara_rule behavioral2/files/0x0009000000023c62-2469.dat upx behavioral2/memory/5712-2554-0x0000000000D40000-0x00000000014BB000-memory.dmp upx behavioral2/memory/5712-2595-0x0000000000D40000-0x00000000014BB000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\Application\chrome.exe chrome11.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe chrome11.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\Gxtuum.job Qtdedcpuf.exe File created C:\Windows\Tasks\Gxtuum.job Ixpla.exe File created C:\Windows\Tasks\axplong.job 51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qtdedcpuf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d20ce05a9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qtdedcpuf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ixpla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ixpla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d1dfa9e65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 45 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 5088 51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7.exe 5088 51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7.exe 2248 axplong.exe 2248 axplong.exe 3524 chrome11.exe 5840 3d1dfa9e65.exe 5840 3d1dfa9e65.exe 6088 d20ce05a9d.exe 6088 d20ce05a9d.exe 6088 d20ce05a9d.exe 6088 d20ce05a9d.exe 3972 axplong.exe 3972 axplong.exe 1804 Qtdedcpuf.exe 2944 Ixpla.exe 2944 Ixpla.exe 3416 Gxtuum.exe 872 Gxtuum.exe 5348 axplong.exe 5348 axplong.exe 1612 Gxtuum.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 3524 chrome11.exe Token: SeDebugPrivilege 1804 Qtdedcpuf.exe Token: SeDebugPrivilege 2944 Ixpla.exe Token: SeDebugPrivilege 6088 d20ce05a9d.exe Token: SeDebugPrivilege 1804 Qtdedcpuf.exe Token: SeDebugPrivilege 3416 Gxtuum.exe Token: SeDebugPrivilege 2944 Ixpla.exe Token: SeDebugPrivilege 872 Gxtuum.exe Token: SeDebugPrivilege 3416 Gxtuum.exe Token: SeDebugPrivilege 872 Gxtuum.exe Token: SeDebugPrivilege 1612 Gxtuum.exe Token: SeDebugPrivilege 1612 Gxtuum.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 808 Qtdedcpuf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5088 wrote to memory of 2248 5088 51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7.exe 82 PID 5088 wrote to memory of 2248 5088 51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7.exe 82 PID 5088 wrote to memory of 2248 5088 51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7.exe 82 PID 2248 wrote to memory of 3524 2248 axplong.exe 90 PID 2248 wrote to memory of 3524 2248 axplong.exe 90 PID 3524 wrote to memory of 3076 3524 chrome11.exe 91 PID 3524 wrote to memory of 3076 3524 chrome11.exe 91 PID 2248 wrote to memory of 4076 2248 axplong.exe 94 PID 2248 wrote to memory of 4076 2248 axplong.exe 94 PID 4076 wrote to memory of 3664 4076 l4.exe 96 PID 4076 wrote to memory of 3664 4076 l4.exe 96 PID 2248 wrote to memory of 1804 2248 axplong.exe 97 PID 2248 wrote to memory of 1804 2248 axplong.exe 97 PID 2248 wrote to memory of 1804 2248 axplong.exe 97 PID 2248 wrote to memory of 2944 2248 axplong.exe 99 PID 2248 wrote to memory of 2944 2248 axplong.exe 99 PID 2248 wrote to memory of 2944 2248 axplong.exe 99 PID 2248 wrote to memory of 5712 2248 axplong.exe 100 PID 2248 wrote to memory of 5712 2248 axplong.exe 100 PID 2248 wrote to memory of 5840 2248 axplong.exe 101 PID 2248 wrote to memory of 5840 2248 axplong.exe 101 PID 2248 wrote to memory of 5840 2248 axplong.exe 101 PID 2248 wrote to memory of 6088 2248 axplong.exe 102 PID 2248 wrote to memory of 6088 2248 axplong.exe 102 PID 2248 wrote to memory of 6088 2248 axplong.exe 102 PID 1804 wrote to memory of 808 1804 Qtdedcpuf.exe 104 PID 1804 wrote to memory of 808 1804 Qtdedcpuf.exe 104 PID 1804 wrote to memory of 808 1804 Qtdedcpuf.exe 104 PID 1804 wrote to memory of 808 1804 Qtdedcpuf.exe 104 PID 1804 wrote to memory of 808 1804 Qtdedcpuf.exe 104 PID 1804 wrote to memory of 808 1804 Qtdedcpuf.exe 104 PID 1804 wrote to memory of 808 1804 Qtdedcpuf.exe 104 PID 1804 wrote to memory of 808 1804 Qtdedcpuf.exe 104 PID 1804 wrote to memory of 808 1804 Qtdedcpuf.exe 104 PID 1804 wrote to memory of 808 1804 Qtdedcpuf.exe 104 PID 808 wrote to memory of 3416 808 Qtdedcpuf.exe 105 PID 808 wrote to memory of 3416 808 Qtdedcpuf.exe 105 PID 808 wrote to memory of 3416 808 Qtdedcpuf.exe 105 PID 2944 wrote to memory of 424 2944 Ixpla.exe 106 PID 2944 wrote to memory of 424 2944 Ixpla.exe 106 PID 2944 wrote to memory of 424 2944 Ixpla.exe 106 PID 2944 wrote to memory of 424 2944 Ixpla.exe 106 PID 2944 wrote to memory of 424 2944 Ixpla.exe 106 PID 2944 wrote to memory of 424 2944 Ixpla.exe 106 PID 2944 wrote to memory of 424 2944 Ixpla.exe 106 PID 2944 wrote to memory of 424 2944 Ixpla.exe 106 PID 2944 wrote to memory of 424 2944 Ixpla.exe 106 PID 2944 wrote to memory of 424 2944 Ixpla.exe 106 PID 424 wrote to memory of 872 424 Ixpla.exe 107 PID 424 wrote to memory of 872 424 Ixpla.exe 107 PID 424 wrote to memory of 872 424 Ixpla.exe 107 PID 3416 wrote to memory of 512 3416 Gxtuum.exe 108 PID 3416 wrote to memory of 512 3416 Gxtuum.exe 108 PID 3416 wrote to memory of 512 3416 Gxtuum.exe 108 PID 3416 wrote to memory of 512 3416 Gxtuum.exe 108 PID 3416 wrote to memory of 512 3416 Gxtuum.exe 108 PID 3416 wrote to memory of 512 3416 Gxtuum.exe 108 PID 3416 wrote to memory of 512 3416 Gxtuum.exe 108 PID 3416 wrote to memory of 512 3416 Gxtuum.exe 108 PID 3416 wrote to memory of 512 3416 Gxtuum.exe 108 PID 3416 wrote to memory of 512 3416 Gxtuum.exe 108 PID 872 wrote to memory of 4944 872 Gxtuum.exe 109 PID 872 wrote to memory of 4944 872 Gxtuum.exe 109 PID 872 wrote to memory of 4944 872 Gxtuum.exe 109
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7.exe"C:\Users\Admin\AppData\Local\Temp\51983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\1005970001\chrome11.exe"C:\Users\Admin\AppData\Local\Temp\1005970001\chrome11.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\System32\certutil.exe"C:\Windows\System32\certutil.exe" -silent -importPFX -p "" -f "C:\Users\Admin\AppData\Local\Temp\tmpC621.tmp"5⤵PID:3076
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe"C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\onefile_4076_133784652947683270\l4.exeC:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe5⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
PID:3664
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe"C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1804
-
-
C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\1006141001\networkmanager.exe"C:\Users\Admin\AppData\Local\Temp\1006141001\networkmanager.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5712
-
-
C:\Users\Admin\AppData\Local\Temp\1006184001\3d1dfa9e65.exe"C:\Users\Admin\AppData\Local\Temp\1006184001\3d1dfa9e65.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5840
-
-
C:\Users\Admin\AppData\Local\Temp\1006185001\d20ce05a9d.exe"C:\Users\Admin\AppData\Local\Temp\1006185001\d20ce05a9d.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6088
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe"C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3416
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:872
-
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:512 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\10000470111\123719821238.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3876
-
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Executes dropped EXE
PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Executes dropped EXE
PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5348
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD544163d81bb5710839fb9ba265de2c942
SHA1a7497d6085ed8ce25e9728a0af7e989e026eaf04
SHA256de4e3ff7f7da5d5561e384585a9d0cb66f2c51ea324c184848d125d8792bf666
SHA51297ef4974f41affd04eb960fa873cd9754f31007c3d7239a7fb5b17cc152c01f2050c3b25d107e36ab5c65010610624e773f726de7d39255bb2c0ad5d8b9929a4
-
Filesize
4.5MB
MD55b39766f490f17925defaee5de2f9861
SHA19c89f2951c255117eb3eebcd61dbecf019a4c186
SHA256de615656d7f80b5e01bc6a604a780245ca0ccefd920a6e2f1439bf27c02b7b7a
SHA512d216fa45c98e423f15c2b52f980fc1c439d365b9799e5063e6b09837b419d197ba68d52ea7facf469eae38e531f17bd19eaf25d170465dc41217ca6ab9eb30bf
-
Filesize
5.9MB
MD5d68f79c459ee4ae03b76fa5ba151a41f
SHA1bfa641085d59d58993ba98ac9ee376f898ee5f7b
SHA256aa50c900e210abb6be7d2420d9d5ae34c66818e0491aabd141421d175211fed6
SHA512bd4ef3e3708df81d53b2e9050447032e8dcdcc776cf0353077310f208a30dab8f31d6ec6769d47fb6c05c642bdd7a58fb4f93d9d28e2de0efc01312fbc5e391e
-
Filesize
1.4MB
MD5338cbbffa6028ee1a0beb3e7e6c4abd9
SHA1bd008e415d2d85a124d33d455a2e2b0a0312be39
SHA2561af9406ad522df70d8b59054cbdbef1a267fe199ab0ec1369523cdce9884bea6
SHA512a8bb96d8ab47a3f57d5f1fc48c61392e9b28b379517cd12a468044d42a7ecdf9c099244d94784ff2411b358ea2272f8069a2fee2ea952b693ee460de0f689215
-
Filesize
1.4MB
MD56e7ffd057086e44e4fcc01846cd2b152
SHA105712e7e7b8429b2dd201ea504dc32fefe5795da
SHA256fbc587e990949e428e8ce7a2c74dbf85cd63ffa07370756ad854595fea0033d7
SHA5128cab1824b32c54273658d28738109c8a1ef3170c1fbe02deeee40d40990acb6d45431bfb65a3facebee9a919bd972734012b1e8de035b9c1329f1bd0e709ecd2
-
Filesize
2.1MB
MD5f8d528a37993ed91d2496bab9fc734d3
SHA14b66b225298f776e21f566b758f3897d20b23cad
SHA256bc8458a8d78cf91129c84b153aafe8319410aacb8e14aec506897c8e0793ba02
SHA51275dc1bbb1388f68d121bab26fc7f6bf9dc1226417ad7ed4a7b9718999aa0f9c891fed0db3c9ea6d6ccb34288cc848dc44b20ea83a30afd4ea2e99cff51f30f5a
-
Filesize
1.7MB
MD5fa8bc0aa526b9961adf9260dc7ec9399
SHA1044527ce83eb090a0c1ec2cdaddedc5f5405bf2d
SHA2561722fc2ecb85459ab3e76adc12f5c29d3e3ee2b4b18dd48c5ef0e5d79b77330e
SHA5122f0244f7f3cf90b0dd1e5d04db4e4d443a16e7779bf791dc68ed54f6d734e1d620193967e96ee881b03e5b6ef6a8609efdb890f5345db340d94fe70c2807c31b
-
Filesize
2.7MB
MD5f150e060b781896b4e6e1029ee1f5b74
SHA1ef52c884174df898a956d9a40304e586e2382e2d
SHA2560316ba41b0629155197d29677225f77581c470a5f91aea8dd6a38850cd510516
SHA51240dc0453b3feece1d0ad5ed8de9cfd45465347190c1031791c6a035dc0e74bd842fa21e56b86feebe89892dfbd8bcdbf8d44bc658c0afcfb6deb6d0b5e18c18f
-
Filesize
1.8MB
MD50b20eccc24df80884571a59d9baa22e6
SHA17e7d09c55a0c5dedc8025711062fb7928f63ad3a
SHA25651983f3a2a0ddfb233a314390926ede2a02ecf09c0e51c9f8a46f1b32bb631e7
SHA5120313eb3f8ecab91c16fb0437abbd22c895d4d50686fa66f3c07262a1c7062de2ae6d8e905df3f8cd9129d682c5a600ae57a0dcbcb680e1e6affe89ba6a1cb650
-
Filesize
2KB
MD5bce100d8e667631a6ee1789990308837
SHA1446de8271466d8256fccc31fab2702ea6d82acbb
SHA25611969983a7365183aafab3d9a15605453bfa6b55f200ba3f4f348f3d2d6d3af7
SHA5124e3996e5266547976f84990ea47319ee2b59f6dc3d3f45af1cca80365deb5f66d4cc2a3a3149f76784fa836c5b4f335f9a0e668f9c232765f8e1a93bbe487734
-
Filesize
83KB
MD530f396f8411274f15ac85b14b7b3cd3d
SHA1d3921f39e193d89aa93c2677cbfb47bc1ede949c
SHA256cb15d6cc7268d3a0bd17d9d9cec330a7c1768b1c911553045c73bc6920de987f
SHA5127d997ef18e2cbc5bca20a4730129f69a6d19abdda0261b06ad28ad8a2bddcdecb12e126df9969539216f4f51467c0fe954e4776d842e7b373fe93a8246a5ca3f
-
Filesize
156KB
MD59e94fac072a14ca9ed3f20292169e5b2
SHA11eeac19715ea32a65641d82a380b9fa624e3cf0d
SHA256a46189c5bd0302029847fed934f481835cb8d06470ea3d6b97ada7d325218a9f
SHA512b7b3d0f737dd3b88794f75a8a6614c6fb6b1a64398c6330a52a2680caf7e558038470f6f3fc024ce691f6f51a852c05f7f431ac2687f4525683ff09132a0decb
-
Filesize
81KB
MD569801d1a0809c52db984602ca2653541
SHA10f6e77086f049a7c12880829de051dcbe3d66764
SHA25667aca001d36f2fce6d88dbf46863f60c0b291395b6777c22b642198f98184ba3
SHA5125fce77dd567c046feb5a13baf55fdd8112798818d852dfecc752dac87680ce0b89edfbfbdab32404cf471b70453a33f33488d3104cd82f4e0b94290e83eae7bb
-
Filesize
5.9MB
MD563c4e3f9c7383d039ab4af449372c17f
SHA1f52ff760a098a006c41269ff73abb633b811f18e
SHA256151524f6c1d1aeac530cfd69de15c3336043dc8eb3f5aeaa31513e24bfd7acdd
SHA512dcfb4804c5569ad13e752270d13320f8769601b7092544741e35bc62a22af363b7a5ea7c5a65132c9575540a3e689a6946110502bd0f046385b8739e81761fbf
-
Filesize
6.6MB
MD5166cc2f997cba5fc011820e6b46e8ea7
SHA1d6179213afea084f02566ea190202c752286ca1f
SHA256c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546
SHA51249d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb
-
Filesize
30KB
MD57c14c7bc02e47d5c8158383cb7e14124
SHA15ee9e5968e7b5ce9e4c53a303dac9fc8faf98df3
SHA25600bd8bb6dec8c291ec14c8ddfb2209d85f96db02c7a3c39903803384ff3a65e5
SHA512af70cbdd882b923013cb47545633b1147ce45c547b8202d7555043cfa77c1deee8a51a2bc5f93db4e3b9cbf7818f625ca8e3b367bffc534e26d35f475351a77c
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
2KB
MD52a3e46130d5e55b58deefa67008231b6
SHA1555fc8028e9b2ae49ae92e611a814d6ce785c24d
SHA25642f2dc96c5b93f6c19980bf3fa99f3d9ecea2fbf36a5074a71e64e080a7463be
SHA51260d6064169f1beec166b2535e445cc9fb0dcc6b652047734fd9c66bbbb88704f0b20b666da0bb4903917736e25f1eabba9bcf08afa462963112e071d1699b91d
-
Filesize
82B
MD5107a610c004bfc1ebb8b87365b2c4600
SHA104695e838daaaf45d91f0b51868c8995b80d3392
SHA2563a5be027d623c694cc4874fbb6cd2f434bbaf65033607f6d2acfc1d05c3f6fdc
SHA5124b26a04ec889e149bf4fb974178990804d371d72b239c1d55c5acc32636cfd7ad02f8d21ed9e289358873242493303de25f2a0bca7d1b5da9b0426854ff4a2d2
-
Filesize
284B
MD50676ac554315aadee8035ee8f8f13a6e
SHA1abbdd4272353246d395d780861c289281d2d06d5
SHA2565a305bf821081ce8a92f9935777776ad8042aa84c18c179105aee5377a368490
SHA5120c2da54838ff9afccfcfb4249bb801b4986fcd3a29abd549d8d06fa03821afdf6bdb4a75a481aef81c8ecc0bb933e5338e643020a7cdc647b9bdb3a34dc73809
-
Filesize
1.4MB
MD564d0be834d990e953cb0f56e273f4d64
SHA15b180b5ec4f2aa6a622b182d480900b39b4dd69a
SHA2561ed0ecce8143e459813a01c1195fc9dcbb1239e6d346050b00bb02797a49a924
SHA51296113edb2006f8e81e6496a9a5c5b4dd00e10cedcf22044589bc19e7d71a2510691c9db01e790546ec3d1a5a03c238434f95699f064514cb3cda5adeb681a370