Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 09:34
Static task
static1
Behavioral task
behavioral1
Sample
bfe814222131996f9a1d81515c404d51d237107a3f6013a066da162b58ee4b51.exe
Resource
win7-20240708-en
General
-
Target
bfe814222131996f9a1d81515c404d51d237107a3f6013a066da162b58ee4b51.exe
-
Size
1.8MB
-
MD5
630cb8dd96181e31a8a48ca725d87ecc
-
SHA1
6772ad3bc56956743f6a3a0548e903538b9854be
-
SHA256
bfe814222131996f9a1d81515c404d51d237107a3f6013a066da162b58ee4b51
-
SHA512
654b62afebabd84c2acde93d00d4d56a1083096654d8a111894e04362fab82d19db769dd949d9e293f775b0046d046c22f3228386a57a1c196763a577c347fa4
-
SSDEEP
49152:Rxx1PKED08c7U2i8Tj5cFBEBbG3uo99vdg+PO18YGt:RxrKED/cA2i8v5cFBEbG3ugO1i
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 7249fac0c8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 7249fac0c8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 7249fac0c8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 7249fac0c8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 7249fac0c8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 7249fac0c8.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
description pid Process procid_target PID 2436 created 3440 2436 Qtdedcpuf.exe 56 PID 2680 created 3440 2680 Ixpla.exe 56 PID 2960 created 3440 2960 Gxtuum.exe 56 PID 1040 created 3440 1040 Gxtuum.exe 56 PID 4316 created 3440 4316 Gxtuum.exe 56 PID 4336 created 3440 4336 Gxtuum.exe 56 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7249fac0c8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bfe814222131996f9a1d81515c404d51d237107a3f6013a066da162b58ee4b51.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7d856ae932.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 53 2976 rundll32.exe 54 2976 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bfe814222131996f9a1d81515c404d51d237107a3f6013a066da162b58ee4b51.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7d856ae932.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7249fac0c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bfe814222131996f9a1d81515c404d51d237107a3f6013a066da162b58ee4b51.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7d856ae932.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7249fac0c8.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation bfe814222131996f9a1d81515c404d51d237107a3f6013a066da162b58ee4b51.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Qtdedcpuf.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Ixpla.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Gxtuum.exe -
Drops startup file 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lbroker.vbs Ixpla.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lbroker.vbs Gxtuum.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\l4.exe l4.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\l4.exe l4.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lbroker.vbs Qtdedcpuf.exe -
Executes dropped EXE 20 IoCs
pid Process 5004 axplong.exe 1984 l4.exe 1744 l4.exe 2436 Qtdedcpuf.exe 2680 Ixpla.exe 4124 networkmanager.exe 1976 7d856ae932.exe 4804 7249fac0c8.exe 1404 Qtdedcpuf.exe 2960 Gxtuum.exe 1696 Ixpla.exe 1040 Gxtuum.exe 1776 axplong.exe 4316 Gxtuum.exe 2572 Gxtuum.exe 4264 Gxtuum.exe 1732 Gxtuum.exe 4776 axplong.exe 4336 Gxtuum.exe 396 Gxtuum.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 7249fac0c8.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine bfe814222131996f9a1d81515c404d51d237107a3f6013a066da162b58ee4b51.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 7d856ae932.exe -
Loads dropped DLL 7 IoCs
pid Process 1744 l4.exe 1744 l4.exe 1744 l4.exe 1744 l4.exe 1744 l4.exe 1744 l4.exe 2976 rundll32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 7249fac0c8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 7249fac0c8.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetWorkManager = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006141001\\networkmanager.exe" networkmanager.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7d856ae932.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006190001\\7d856ae932.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7249fac0c8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006191001\\7249fac0c8.exe" axplong.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 4680 bfe814222131996f9a1d81515c404d51d237107a3f6013a066da162b58ee4b51.exe 5004 axplong.exe 1976 7d856ae932.exe 4804 7249fac0c8.exe 1776 axplong.exe 4776 axplong.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2436 set thread context of 1404 2436 Qtdedcpuf.exe 109 PID 2680 set thread context of 1696 2680 Ixpla.exe 111 PID 2960 set thread context of 2572 2960 Gxtuum.exe 115 PID 1040 set thread context of 4264 1040 Gxtuum.exe 118 PID 4316 set thread context of 1732 4316 Gxtuum.exe 121 PID 4336 set thread context of 396 4336 Gxtuum.exe 124 -
resource yara_rule behavioral2/files/0x0007000000023cb6-2200.dat upx behavioral2/memory/4124-2485-0x0000000000010000-0x000000000078B000-memory.dmp upx behavioral2/memory/4124-2527-0x0000000000010000-0x000000000078B000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job bfe814222131996f9a1d81515c404d51d237107a3f6013a066da162b58ee4b51.exe File created C:\Windows\Tasks\Gxtuum.job Qtdedcpuf.exe File created C:\Windows\Tasks\Gxtuum.job Ixpla.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ixpla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfe814222131996f9a1d81515c404d51d237107a3f6013a066da162b58ee4b51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qtdedcpuf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ixpla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qtdedcpuf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d856ae932.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7249fac0c8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 21 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4680 bfe814222131996f9a1d81515c404d51d237107a3f6013a066da162b58ee4b51.exe 4680 bfe814222131996f9a1d81515c404d51d237107a3f6013a066da162b58ee4b51.exe 5004 axplong.exe 5004 axplong.exe 1976 7d856ae932.exe 1976 7d856ae932.exe 4804 7249fac0c8.exe 4804 7249fac0c8.exe 4804 7249fac0c8.exe 4804 7249fac0c8.exe 2436 Qtdedcpuf.exe 2680 Ixpla.exe 1776 axplong.exe 1776 axplong.exe 2960 Gxtuum.exe 1040 Gxtuum.exe 4316 Gxtuum.exe 4776 axplong.exe 4776 axplong.exe 4336 Gxtuum.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2436 Qtdedcpuf.exe Token: SeDebugPrivilege 2680 Ixpla.exe Token: SeDebugPrivilege 4804 7249fac0c8.exe Token: SeDebugPrivilege 2436 Qtdedcpuf.exe Token: SeDebugPrivilege 2960 Gxtuum.exe Token: SeDebugPrivilege 2680 Ixpla.exe Token: SeDebugPrivilege 1040 Gxtuum.exe Token: SeDebugPrivilege 4316 Gxtuum.exe Token: SeDebugPrivilege 2960 Gxtuum.exe Token: SeDebugPrivilege 1040 Gxtuum.exe Token: SeDebugPrivilege 4316 Gxtuum.exe Token: SeDebugPrivilege 4336 Gxtuum.exe Token: SeDebugPrivilege 4336 Gxtuum.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4680 bfe814222131996f9a1d81515c404d51d237107a3f6013a066da162b58ee4b51.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4680 wrote to memory of 5004 4680 bfe814222131996f9a1d81515c404d51d237107a3f6013a066da162b58ee4b51.exe 83 PID 4680 wrote to memory of 5004 4680 bfe814222131996f9a1d81515c404d51d237107a3f6013a066da162b58ee4b51.exe 83 PID 4680 wrote to memory of 5004 4680 bfe814222131996f9a1d81515c404d51d237107a3f6013a066da162b58ee4b51.exe 83 PID 5004 wrote to memory of 1984 5004 axplong.exe 85 PID 5004 wrote to memory of 1984 5004 axplong.exe 85 PID 1984 wrote to memory of 1744 1984 l4.exe 87 PID 1984 wrote to memory of 1744 1984 l4.exe 87 PID 5004 wrote to memory of 2436 5004 axplong.exe 88 PID 5004 wrote to memory of 2436 5004 axplong.exe 88 PID 5004 wrote to memory of 2436 5004 axplong.exe 88 PID 5004 wrote to memory of 2680 5004 axplong.exe 89 PID 5004 wrote to memory of 2680 5004 axplong.exe 89 PID 5004 wrote to memory of 2680 5004 axplong.exe 89 PID 5004 wrote to memory of 4124 5004 axplong.exe 90 PID 5004 wrote to memory of 4124 5004 axplong.exe 90 PID 5004 wrote to memory of 1976 5004 axplong.exe 92 PID 5004 wrote to memory of 1976 5004 axplong.exe 92 PID 5004 wrote to memory of 1976 5004 axplong.exe 92 PID 5004 wrote to memory of 4804 5004 axplong.exe 99 PID 5004 wrote to memory of 4804 5004 axplong.exe 99 PID 5004 wrote to memory of 4804 5004 axplong.exe 99 PID 2436 wrote to memory of 1404 2436 Qtdedcpuf.exe 109 PID 2436 wrote to memory of 1404 2436 Qtdedcpuf.exe 109 PID 2436 wrote to memory of 1404 2436 Qtdedcpuf.exe 109 PID 2436 wrote to memory of 1404 2436 Qtdedcpuf.exe 109 PID 2436 wrote to memory of 1404 2436 Qtdedcpuf.exe 109 PID 2436 wrote to memory of 1404 2436 Qtdedcpuf.exe 109 PID 2436 wrote to memory of 1404 2436 Qtdedcpuf.exe 109 PID 2436 wrote to memory of 1404 2436 Qtdedcpuf.exe 109 PID 2436 wrote to memory of 1404 2436 Qtdedcpuf.exe 109 PID 2436 wrote to memory of 1404 2436 Qtdedcpuf.exe 109 PID 1404 wrote to memory of 2960 1404 Qtdedcpuf.exe 110 PID 1404 wrote to memory of 2960 1404 Qtdedcpuf.exe 110 PID 1404 wrote to memory of 2960 1404 Qtdedcpuf.exe 110 PID 2680 wrote to memory of 1696 2680 Ixpla.exe 111 PID 2680 wrote to memory of 1696 2680 Ixpla.exe 111 PID 2680 wrote to memory of 1696 2680 Ixpla.exe 111 PID 2680 wrote to memory of 1696 2680 Ixpla.exe 111 PID 2680 wrote to memory of 1696 2680 Ixpla.exe 111 PID 2680 wrote to memory of 1696 2680 Ixpla.exe 111 PID 2680 wrote to memory of 1696 2680 Ixpla.exe 111 PID 2680 wrote to memory of 1696 2680 Ixpla.exe 111 PID 2680 wrote to memory of 1696 2680 Ixpla.exe 111 PID 2680 wrote to memory of 1696 2680 Ixpla.exe 111 PID 1696 wrote to memory of 1040 1696 Ixpla.exe 112 PID 1696 wrote to memory of 1040 1696 Ixpla.exe 112 PID 1696 wrote to memory of 1040 1696 Ixpla.exe 112 PID 2960 wrote to memory of 2572 2960 Gxtuum.exe 115 PID 2960 wrote to memory of 2572 2960 Gxtuum.exe 115 PID 2960 wrote to memory of 2572 2960 Gxtuum.exe 115 PID 2960 wrote to memory of 2572 2960 Gxtuum.exe 115 PID 2960 wrote to memory of 2572 2960 Gxtuum.exe 115 PID 2960 wrote to memory of 2572 2960 Gxtuum.exe 115 PID 2960 wrote to memory of 2572 2960 Gxtuum.exe 115 PID 2960 wrote to memory of 2572 2960 Gxtuum.exe 115 PID 2960 wrote to memory of 2572 2960 Gxtuum.exe 115 PID 2960 wrote to memory of 2572 2960 Gxtuum.exe 115 PID 1040 wrote to memory of 4264 1040 Gxtuum.exe 118 PID 1040 wrote to memory of 4264 1040 Gxtuum.exe 118 PID 1040 wrote to memory of 4264 1040 Gxtuum.exe 118 PID 1040 wrote to memory of 4264 1040 Gxtuum.exe 118 PID 1040 wrote to memory of 4264 1040 Gxtuum.exe 118 PID 1040 wrote to memory of 4264 1040 Gxtuum.exe 118 PID 1040 wrote to memory of 4264 1040 Gxtuum.exe 118
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\bfe814222131996f9a1d81515c404d51d237107a3f6013a066da162b58ee4b51.exe"C:\Users\Admin\AppData\Local\Temp\bfe814222131996f9a1d81515c404d51d237107a3f6013a066da162b58ee4b51.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe"C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\onefile_1984_133784696645304585\l4.exeC:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe5⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
PID:1744
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe"C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2436
-
-
C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\1006141001\networkmanager.exe"C:\Users\Admin\AppData\Local\Temp\1006141001\networkmanager.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4124
-
-
C:\Users\Admin\AppData\Local\Temp\1006190001\7d856ae932.exe"C:\Users\Admin\AppData\Local\Temp\1006190001\7d856ae932.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
-
C:\Users\Admin\AppData\Local\Temp\1006191001\7249fac0c8.exe"C:\Users\Admin\AppData\Local\Temp\1006191001\7249fac0c8.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe"C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2960
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1040
-
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2572 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\10000470111\123719821238.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2976
-
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Executes dropped EXE
PID:4264
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Executes dropped EXE
PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"2⤵
- Executes dropped EXE
PID:396
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4336
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD544163d81bb5710839fb9ba265de2c942
SHA1a7497d6085ed8ce25e9728a0af7e989e026eaf04
SHA256de4e3ff7f7da5d5561e384585a9d0cb66f2c51ea324c184848d125d8792bf666
SHA51297ef4974f41affd04eb960fa873cd9754f31007c3d7239a7fb5b17cc152c01f2050c3b25d107e36ab5c65010610624e773f726de7d39255bb2c0ad5d8b9929a4
-
Filesize
5.9MB
MD5d68f79c459ee4ae03b76fa5ba151a41f
SHA1bfa641085d59d58993ba98ac9ee376f898ee5f7b
SHA256aa50c900e210abb6be7d2420d9d5ae34c66818e0491aabd141421d175211fed6
SHA512bd4ef3e3708df81d53b2e9050447032e8dcdcc776cf0353077310f208a30dab8f31d6ec6769d47fb6c05c642bdd7a58fb4f93d9d28e2de0efc01312fbc5e391e
-
Filesize
1.4MB
MD5338cbbffa6028ee1a0beb3e7e6c4abd9
SHA1bd008e415d2d85a124d33d455a2e2b0a0312be39
SHA2561af9406ad522df70d8b59054cbdbef1a267fe199ab0ec1369523cdce9884bea6
SHA512a8bb96d8ab47a3f57d5f1fc48c61392e9b28b379517cd12a468044d42a7ecdf9c099244d94784ff2411b358ea2272f8069a2fee2ea952b693ee460de0f689215
-
Filesize
1.4MB
MD56e7ffd057086e44e4fcc01846cd2b152
SHA105712e7e7b8429b2dd201ea504dc32fefe5795da
SHA256fbc587e990949e428e8ce7a2c74dbf85cd63ffa07370756ad854595fea0033d7
SHA5128cab1824b32c54273658d28738109c8a1ef3170c1fbe02deeee40d40990acb6d45431bfb65a3facebee9a919bd972734012b1e8de035b9c1329f1bd0e709ecd2
-
Filesize
2.1MB
MD5f8d528a37993ed91d2496bab9fc734d3
SHA14b66b225298f776e21f566b758f3897d20b23cad
SHA256bc8458a8d78cf91129c84b153aafe8319410aacb8e14aec506897c8e0793ba02
SHA51275dc1bbb1388f68d121bab26fc7f6bf9dc1226417ad7ed4a7b9718999aa0f9c891fed0db3c9ea6d6ccb34288cc848dc44b20ea83a30afd4ea2e99cff51f30f5a
-
Filesize
1.7MB
MD56731bd7e893f440a5f73edfd40b73112
SHA18e396ca101830e0116881c8d8c81c6d5e7918afe
SHA256599399619509681016345f5e4e50f6edd38a70496201d1a9fbfe5c53d7f4690b
SHA512d0247ad0a1392a9b622d08e22feee7d79854c8f1492f0b4d5d5e669f7efce409e3a3961f8229ebb40aca97ed6e36066b40393b3e9cb78d7356d34d530c125110
-
Filesize
2.7MB
MD59aa3e28acbd0b5a2e045a6d513c93b6b
SHA19381e49745b0e1c2fab053f8d4d2a59bc61988f1
SHA2562f1568be0dd8f9a154b003441a09464578fc012d81f60faab98f8ba9c1913898
SHA512994aacaaafb7a60400aa05ad2524eac325b50b46109a75a71e2907e0dc08b5147ad7f63d308c72b92dc70d232335134815b461b00c18c722a365e6e0f8491471
-
Filesize
1.8MB
MD5630cb8dd96181e31a8a48ca725d87ecc
SHA16772ad3bc56956743f6a3a0548e903538b9854be
SHA256bfe814222131996f9a1d81515c404d51d237107a3f6013a066da162b58ee4b51
SHA512654b62afebabd84c2acde93d00d4d56a1083096654d8a111894e04362fab82d19db769dd949d9e293f775b0046d046c22f3228386a57a1c196763a577c347fa4
-
Filesize
83KB
MD530f396f8411274f15ac85b14b7b3cd3d
SHA1d3921f39e193d89aa93c2677cbfb47bc1ede949c
SHA256cb15d6cc7268d3a0bd17d9d9cec330a7c1768b1c911553045c73bc6920de987f
SHA5127d997ef18e2cbc5bca20a4730129f69a6d19abdda0261b06ad28ad8a2bddcdecb12e126df9969539216f4f51467c0fe954e4776d842e7b373fe93a8246a5ca3f
-
Filesize
81KB
MD569801d1a0809c52db984602ca2653541
SHA10f6e77086f049a7c12880829de051dcbe3d66764
SHA25667aca001d36f2fce6d88dbf46863f60c0b291395b6777c22b642198f98184ba3
SHA5125fce77dd567c046feb5a13baf55fdd8112798818d852dfecc752dac87680ce0b89edfbfbdab32404cf471b70453a33f33488d3104cd82f4e0b94290e83eae7bb
-
Filesize
156KB
MD59e94fac072a14ca9ed3f20292169e5b2
SHA11eeac19715ea32a65641d82a380b9fa624e3cf0d
SHA256a46189c5bd0302029847fed934f481835cb8d06470ea3d6b97ada7d325218a9f
SHA512b7b3d0f737dd3b88794f75a8a6614c6fb6b1a64398c6330a52a2680caf7e558038470f6f3fc024ce691f6f51a852c05f7f431ac2687f4525683ff09132a0decb
-
Filesize
5.9MB
MD563c4e3f9c7383d039ab4af449372c17f
SHA1f52ff760a098a006c41269ff73abb633b811f18e
SHA256151524f6c1d1aeac530cfd69de15c3336043dc8eb3f5aeaa31513e24bfd7acdd
SHA512dcfb4804c5569ad13e752270d13320f8769601b7092544741e35bc62a22af363b7a5ea7c5a65132c9575540a3e689a6946110502bd0f046385b8739e81761fbf
-
Filesize
6.6MB
MD5166cc2f997cba5fc011820e6b46e8ea7
SHA1d6179213afea084f02566ea190202c752286ca1f
SHA256c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546
SHA51249d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb
-
Filesize
30KB
MD57c14c7bc02e47d5c8158383cb7e14124
SHA15ee9e5968e7b5ce9e4c53a303dac9fc8faf98df3
SHA25600bd8bb6dec8c291ec14c8ddfb2209d85f96db02c7a3c39903803384ff3a65e5
SHA512af70cbdd882b923013cb47545633b1147ce45c547b8202d7555043cfa77c1deee8a51a2bc5f93db4e3b9cbf7818f625ca8e3b367bffc534e26d35f475351a77c
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
82B
MD5107a610c004bfc1ebb8b87365b2c4600
SHA104695e838daaaf45d91f0b51868c8995b80d3392
SHA2563a5be027d623c694cc4874fbb6cd2f434bbaf65033607f6d2acfc1d05c3f6fdc
SHA5124b26a04ec889e149bf4fb974178990804d371d72b239c1d55c5acc32636cfd7ad02f8d21ed9e289358873242493303de25f2a0bca7d1b5da9b0426854ff4a2d2
-
Filesize
284B
MD55777118c7085b5f9f695869ac36a6416
SHA13b6fa97d38eb145cfe172f0749bc114a3c2a4711
SHA2567358c7be6906c613591960a6d060b42d3e226afc86d075009f6ee6565ff16a4e
SHA5125ffc207385517cd3e0aea0605e3f3a36f7204611f6f9bf68b425079ef140d69e1f38a65b36863c9984c42aa47e76674138b9ea359cdc9bfe9b11a5d890ad6ad5
-
Filesize
1.1MB
MD571604c7039173c9114b91bc96411f59f
SHA1879afdd8e24107b5af45cbc85bdf1f82c11fd332
SHA256028519b72dcb190ab7f1f0f074aa6ecc5772bd41ff5fd8618f576e9cce303d37
SHA51213c3c3b8d3bb4443a2c6a1439f8bdfa5da3df7db139181b0b7174c921c06a89868ae584572b0c02b5fc7d16cc25312d08ab1fcd2386cd41af0fcee80ff4d3dcb