Analysis
-
max time kernel
42s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/12/2024, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe
Resource
win7-20240903-en
General
-
Target
13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe
-
Size
2.9MB
-
MD5
117d5bc15e223805f55b2890713cd193
-
SHA1
a01bcb2fbea608834b0d644bc7cdcd9d304eca5b
-
SHA256
13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade
-
SHA512
f9d2668b08702dc76d4e7aa52938b3765a13bb4b71413ff3d328b5675bfc8cfd92b25dee4db68df84037410ae2d32f431921628d3238186bdbe2f41e6d36523d
-
SSDEEP
49152:7PIOh+mCXpv9KjHkwJIaImhEFm49THMCOV5V8yjODNO:7f0pvSE8IaIUEFkC65Vb6D
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
https://tacitglibbr.biz/api
https://shineugler.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
cryptbot
Extracted
lumma
https://tacitglibbr.biz/api
Signatures
-
Amadey family
-
Cryptbot family
-
Lumma family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f4c940b739.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dc5ae68837.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f4c940b739.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dc5ae68837.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dc5ae68837.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f4c940b739.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GoogleChrome.lnk g6aAPRGUMbVDWu99.exe -
Executes dropped EXE 30 IoCs
pid Process 1856 skotes.exe 2884 ShtrayEasy35.exe 2964 g6aAPRGUMbVDWu99.exe 2612 8ftzdpRC5GCJRtSg.exe 1688 wZeHZBDjL01KR4ut.exe 1936 4VxXVS3egtSGOtN0.exe 2216 rHn6ymqvS9GSB2Xh.exe 1196 rYpwXgMpVbmUlDgE.exe 1144 bQ9ogZ8Sa4YSsJcx.exe 908 i9G6KcT8xrXI5aQy.exe 1468 20f2k2UdYiZ1kGk7.exe 2308 trc5sdfjAAEhEi5a.exe 1908 ONDhziA1wBQc8MLG.exe 1760 YO4Zvu6dkBiEsvkY.exe 1900 F5461hu8lA2hzyC7.exe 1416 IQ7ux2z.exe 2384 Xd1ugVEz4fXbf3Cx.exe 1528 sUSFJjY.exe 2588 dLvMi3X3weOJUYt0.exe 2660 NXwW7VhgAxyH7Esy.exe 2796 f4c940b739.exe 2644 izhE5KV3FQfR4zxf.exe 1248 BFKOYwt3qQGfpTzN.exe 604 WH8dxaZwjig6w3k0.exe 2972 7SYgcNJZTXS6Zg0e.exe 1836 qgRNNZta45NJiT2T.exe 2224 b8jCheL15MlSaRjf.exe 2728 JehQWfjp5U6UzN80.exe 1852 Mwx2ErahA8JKh0Rg.exe 2348 dc5ae68837.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine f4c940b739.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine dc5ae68837.exe -
Loads dropped DLL 29 IoCs
pid Process 2692 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe 2692 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe 1856 skotes.exe 2884 ShtrayEasy35.exe 2884 ShtrayEasy35.exe 2964 g6aAPRGUMbVDWu99.exe 2884 ShtrayEasy35.exe 2884 ShtrayEasy35.exe 2884 ShtrayEasy35.exe 2884 ShtrayEasy35.exe 2884 ShtrayEasy35.exe 2884 ShtrayEasy35.exe 2884 ShtrayEasy35.exe 2884 ShtrayEasy35.exe 2884 ShtrayEasy35.exe 1856 skotes.exe 2884 ShtrayEasy35.exe 1856 skotes.exe 2884 ShtrayEasy35.exe 2884 ShtrayEasy35.exe 1856 skotes.exe 2884 ShtrayEasy35.exe 2884 ShtrayEasy35.exe 2884 ShtrayEasy35.exe 2884 ShtrayEasy35.exe 2884 ShtrayEasy35.exe 2884 ShtrayEasy35.exe 2884 ShtrayEasy35.exe 1856 skotes.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\GoogleChrome = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8UVSR8lK\\g6aAPRGUMbVDWu99.exe" g6aAPRGUMbVDWu99.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\f4c940b739.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1015870001\\f4c940b739.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\dc5ae68837.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1015871001\\dc5ae68837.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\1820046172.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1015872001\\1820046172.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001a48c-286.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2692 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe 1856 skotes.exe 2796 f4c940b739.exe 2348 dc5ae68837.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ShtrayEasy35.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language g6aAPRGUMbVDWu99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IQ7ux2z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4c940b739.exe -
Kills process with taskkill 3 IoCs
pid Process 3184 taskkill.exe 3980 taskkill.exe 5144 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2692 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe 1856 skotes.exe 2884 ShtrayEasy35.exe 2964 g6aAPRGUMbVDWu99.exe 2612 8ftzdpRC5GCJRtSg.exe 2612 8ftzdpRC5GCJRtSg.exe 2612 8ftzdpRC5GCJRtSg.exe 1688 wZeHZBDjL01KR4ut.exe 1688 wZeHZBDjL01KR4ut.exe 1688 wZeHZBDjL01KR4ut.exe 1688 wZeHZBDjL01KR4ut.exe 1936 4VxXVS3egtSGOtN0.exe 1936 4VxXVS3egtSGOtN0.exe 1936 4VxXVS3egtSGOtN0.exe 2216 rHn6ymqvS9GSB2Xh.exe 2216 rHn6ymqvS9GSB2Xh.exe 2216 rHn6ymqvS9GSB2Xh.exe 2216 rHn6ymqvS9GSB2Xh.exe 1936 4VxXVS3egtSGOtN0.exe 2216 rHn6ymqvS9GSB2Xh.exe 2216 rHn6ymqvS9GSB2Xh.exe 1936 4VxXVS3egtSGOtN0.exe 1936 4VxXVS3egtSGOtN0.exe 1196 rYpwXgMpVbmUlDgE.exe 1196 rYpwXgMpVbmUlDgE.exe 1196 rYpwXgMpVbmUlDgE.exe 1196 rYpwXgMpVbmUlDgE.exe 1196 rYpwXgMpVbmUlDgE.exe 1196 rYpwXgMpVbmUlDgE.exe 1196 rYpwXgMpVbmUlDgE.exe 1144 bQ9ogZ8Sa4YSsJcx.exe 1144 bQ9ogZ8Sa4YSsJcx.exe 1144 bQ9ogZ8Sa4YSsJcx.exe 1144 bQ9ogZ8Sa4YSsJcx.exe 1144 bQ9ogZ8Sa4YSsJcx.exe 1144 bQ9ogZ8Sa4YSsJcx.exe 1144 bQ9ogZ8Sa4YSsJcx.exe 1144 bQ9ogZ8Sa4YSsJcx.exe 908 i9G6KcT8xrXI5aQy.exe 908 i9G6KcT8xrXI5aQy.exe 908 i9G6KcT8xrXI5aQy.exe 908 i9G6KcT8xrXI5aQy.exe 908 i9G6KcT8xrXI5aQy.exe 908 i9G6KcT8xrXI5aQy.exe 908 i9G6KcT8xrXI5aQy.exe 908 i9G6KcT8xrXI5aQy.exe 908 i9G6KcT8xrXI5aQy.exe 1468 20f2k2UdYiZ1kGk7.exe 1468 20f2k2UdYiZ1kGk7.exe 1468 20f2k2UdYiZ1kGk7.exe 1468 20f2k2UdYiZ1kGk7.exe 1468 20f2k2UdYiZ1kGk7.exe 1468 20f2k2UdYiZ1kGk7.exe 1468 20f2k2UdYiZ1kGk7.exe 1468 20f2k2UdYiZ1kGk7.exe 1468 20f2k2UdYiZ1kGk7.exe 1468 20f2k2UdYiZ1kGk7.exe 1468 20f2k2UdYiZ1kGk7.exe 1468 20f2k2UdYiZ1kGk7.exe 2308 trc5sdfjAAEhEi5a.exe 2308 trc5sdfjAAEhEi5a.exe 2308 trc5sdfjAAEhEi5a.exe 2308 trc5sdfjAAEhEi5a.exe 2308 trc5sdfjAAEhEi5a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1416 IQ7ux2z.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2692 wrote to memory of 1856 2692 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe 31 PID 2692 wrote to memory of 1856 2692 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe 31 PID 2692 wrote to memory of 1856 2692 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe 31 PID 2692 wrote to memory of 1856 2692 13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe 31 PID 1856 wrote to memory of 2884 1856 skotes.exe 33 PID 1856 wrote to memory of 2884 1856 skotes.exe 33 PID 1856 wrote to memory of 2884 1856 skotes.exe 33 PID 1856 wrote to memory of 2884 1856 skotes.exe 33 PID 2884 wrote to memory of 2964 2884 ShtrayEasy35.exe 34 PID 2884 wrote to memory of 2964 2884 ShtrayEasy35.exe 34 PID 2884 wrote to memory of 2964 2884 ShtrayEasy35.exe 34 PID 2884 wrote to memory of 2964 2884 ShtrayEasy35.exe 34 PID 2884 wrote to memory of 2612 2884 ShtrayEasy35.exe 35 PID 2884 wrote to memory of 2612 2884 ShtrayEasy35.exe 35 PID 2884 wrote to memory of 2612 2884 ShtrayEasy35.exe 35 PID 2884 wrote to memory of 2612 2884 ShtrayEasy35.exe 35 PID 2884 wrote to memory of 1688 2884 ShtrayEasy35.exe 36 PID 2884 wrote to memory of 1688 2884 ShtrayEasy35.exe 36 PID 2884 wrote to memory of 1688 2884 ShtrayEasy35.exe 36 PID 2884 wrote to memory of 1688 2884 ShtrayEasy35.exe 36 PID 2884 wrote to memory of 1936 2884 ShtrayEasy35.exe 37 PID 2884 wrote to memory of 1936 2884 ShtrayEasy35.exe 37 PID 2884 wrote to memory of 1936 2884 ShtrayEasy35.exe 37 PID 2884 wrote to memory of 1936 2884 ShtrayEasy35.exe 37 PID 2884 wrote to memory of 2216 2884 ShtrayEasy35.exe 38 PID 2884 wrote to memory of 2216 2884 ShtrayEasy35.exe 38 PID 2884 wrote to memory of 2216 2884 ShtrayEasy35.exe 38 PID 2884 wrote to memory of 2216 2884 ShtrayEasy35.exe 38 PID 2884 wrote to memory of 1196 2884 ShtrayEasy35.exe 39 PID 2884 wrote to memory of 1196 2884 ShtrayEasy35.exe 39 PID 2884 wrote to memory of 1196 2884 ShtrayEasy35.exe 39 PID 2884 wrote to memory of 1196 2884 ShtrayEasy35.exe 39 PID 2884 wrote to memory of 1144 2884 ShtrayEasy35.exe 40 PID 2884 wrote to memory of 1144 2884 ShtrayEasy35.exe 40 PID 2884 wrote to memory of 1144 2884 ShtrayEasy35.exe 40 PID 2884 wrote to memory of 1144 2884 ShtrayEasy35.exe 40 PID 2884 wrote to memory of 908 2884 ShtrayEasy35.exe 41 PID 2884 wrote to memory of 908 2884 ShtrayEasy35.exe 41 PID 2884 wrote to memory of 908 2884 ShtrayEasy35.exe 41 PID 2884 wrote to memory of 908 2884 ShtrayEasy35.exe 41 PID 2884 wrote to memory of 1468 2884 ShtrayEasy35.exe 42 PID 2884 wrote to memory of 1468 2884 ShtrayEasy35.exe 42 PID 2884 wrote to memory of 1468 2884 ShtrayEasy35.exe 42 PID 2884 wrote to memory of 1468 2884 ShtrayEasy35.exe 42 PID 2884 wrote to memory of 1760 2884 ShtrayEasy35.exe 43 PID 2884 wrote to memory of 1760 2884 ShtrayEasy35.exe 43 PID 2884 wrote to memory of 1760 2884 ShtrayEasy35.exe 43 PID 2884 wrote to memory of 1760 2884 ShtrayEasy35.exe 43 PID 2884 wrote to memory of 2308 2884 ShtrayEasy35.exe 44 PID 2884 wrote to memory of 2308 2884 ShtrayEasy35.exe 44 PID 2884 wrote to memory of 2308 2884 ShtrayEasy35.exe 44 PID 2884 wrote to memory of 2308 2884 ShtrayEasy35.exe 44 PID 2884 wrote to memory of 1900 2884 ShtrayEasy35.exe 45 PID 2884 wrote to memory of 1900 2884 ShtrayEasy35.exe 45 PID 2884 wrote to memory of 1900 2884 ShtrayEasy35.exe 45 PID 2884 wrote to memory of 1900 2884 ShtrayEasy35.exe 45 PID 2884 wrote to memory of 1908 2884 ShtrayEasy35.exe 46 PID 2884 wrote to memory of 1908 2884 ShtrayEasy35.exe 46 PID 2884 wrote to memory of 1908 2884 ShtrayEasy35.exe 46 PID 2884 wrote to memory of 1908 2884 ShtrayEasy35.exe 46 PID 1856 wrote to memory of 1416 1856 skotes.exe 47 PID 1856 wrote to memory of 1416 1856 skotes.exe 47 PID 1856 wrote to memory of 1416 1856 skotes.exe 47 PID 1856 wrote to memory of 1416 1856 skotes.exe 47 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5692 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe"C:\Users\Admin\AppData\Local\Temp\13da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\1015564001\ShtrayEasy35.exe"C:\Users\Admin\AppData\Local\Temp\1015564001\ShtrayEasy35.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\8UVSR8lK\g6aAPRGUMbVDWu99.exeC:\Users\Admin\AppData\Local\Temp\8UVSR8lK\g6aAPRGUMbVDWu99.exe 28844⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\8ftzdpRC5GCJRtSg.exeC:\Users\Admin\AppData\Local\Temp\1015564001\8ftzdpRC5GCJRtSg.exe 28844⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\wZeHZBDjL01KR4ut.exeC:\Users\Admin\AppData\Local\Temp\1015564001\wZeHZBDjL01KR4ut.exe 28844⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\4VxXVS3egtSGOtN0.exeC:\Users\Admin\AppData\Local\Temp\1015564001\4VxXVS3egtSGOtN0.exe 28844⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\rHn6ymqvS9GSB2Xh.exeC:\Users\Admin\AppData\Local\Temp\1015564001\rHn6ymqvS9GSB2Xh.exe 28844⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\rYpwXgMpVbmUlDgE.exeC:\Users\Admin\AppData\Local\Temp\1015564001\rYpwXgMpVbmUlDgE.exe 28844⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1196
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\bQ9ogZ8Sa4YSsJcx.exeC:\Users\Admin\AppData\Local\Temp\1015564001\bQ9ogZ8Sa4YSsJcx.exe 28844⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1144
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\i9G6KcT8xrXI5aQy.exeC:\Users\Admin\AppData\Local\Temp\1015564001\i9G6KcT8xrXI5aQy.exe 28844⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:908
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\20f2k2UdYiZ1kGk7.exeC:\Users\Admin\AppData\Local\Temp\1015564001\20f2k2UdYiZ1kGk7.exe 28844⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1468
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\YO4Zvu6dkBiEsvkY.exeC:\Users\Admin\AppData\Local\Temp\1015564001\YO4Zvu6dkBiEsvkY.exe 28844⤵
- Executes dropped EXE
PID:1760
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\trc5sdfjAAEhEi5a.exeC:\Users\Admin\AppData\Local\Temp\1015564001\trc5sdfjAAEhEi5a.exe 28844⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2308
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\F5461hu8lA2hzyC7.exeC:\Users\Admin\AppData\Local\Temp\1015564001\F5461hu8lA2hzyC7.exe 28844⤵
- Executes dropped EXE
PID:1900
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\ONDhziA1wBQc8MLG.exeC:\Users\Admin\AppData\Local\Temp\1015564001\ONDhziA1wBQc8MLG.exe 28844⤵
- Executes dropped EXE
PID:1908
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\Xd1ugVEz4fXbf3Cx.exeC:\Users\Admin\AppData\Local\Temp\1015564001\Xd1ugVEz4fXbf3Cx.exe 28844⤵
- Executes dropped EXE
PID:2384
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\dLvMi3X3weOJUYt0.exeC:\Users\Admin\AppData\Local\Temp\1015564001\dLvMi3X3weOJUYt0.exe 28844⤵
- Executes dropped EXE
PID:2588
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\NXwW7VhgAxyH7Esy.exeC:\Users\Admin\AppData\Local\Temp\1015564001\NXwW7VhgAxyH7Esy.exe 28844⤵
- Executes dropped EXE
PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\WH8dxaZwjig6w3k0.exeC:\Users\Admin\AppData\Local\Temp\1015564001\WH8dxaZwjig6w3k0.exe 28844⤵
- Executes dropped EXE
PID:604
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\izhE5KV3FQfR4zxf.exeC:\Users\Admin\AppData\Local\Temp\1015564001\izhE5KV3FQfR4zxf.exe 28844⤵
- Executes dropped EXE
PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\7SYgcNJZTXS6Zg0e.exeC:\Users\Admin\AppData\Local\Temp\1015564001\7SYgcNJZTXS6Zg0e.exe 28844⤵
- Executes dropped EXE
PID:2972
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\BFKOYwt3qQGfpTzN.exeC:\Users\Admin\AppData\Local\Temp\1015564001\BFKOYwt3qQGfpTzN.exe 28844⤵
- Executes dropped EXE
PID:1248
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\qgRNNZta45NJiT2T.exeC:\Users\Admin\AppData\Local\Temp\1015564001\qgRNNZta45NJiT2T.exe 28844⤵
- Executes dropped EXE
PID:1836
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\b8jCheL15MlSaRjf.exeC:\Users\Admin\AppData\Local\Temp\1015564001\b8jCheL15MlSaRjf.exe 28844⤵
- Executes dropped EXE
PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\Mwx2ErahA8JKh0Rg.exeC:\Users\Admin\AppData\Local\Temp\1015564001\Mwx2ErahA8JKh0Rg.exe 28844⤵
- Executes dropped EXE
PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\JehQWfjp5U6UzN80.exeC:\Users\Admin\AppData\Local\Temp\1015564001\JehQWfjp5U6UzN80.exe 28844⤵
- Executes dropped EXE
PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\FaguxCZ5HOYK8e9K.exeC:\Users\Admin\AppData\Local\Temp\1015564001\FaguxCZ5HOYK8e9K.exe 28844⤵PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\FT8KrbGhELWYeWTb.exeC:\Users\Admin\AppData\Local\Temp\1015564001\FT8KrbGhELWYeWTb.exe 28844⤵PID:344
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\v4iycR0ZpXN5cyC3.exeC:\Users\Admin\AppData\Local\Temp\1015564001\v4iycR0ZpXN5cyC3.exe 28844⤵PID:840
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\mFkBJ5gsK3LjB7q3.exeC:\Users\Admin\AppData\Local\Temp\1015564001\mFkBJ5gsK3LjB7q3.exe 28844⤵PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\dzMwBOubScEuXYdZ.exeC:\Users\Admin\AppData\Local\Temp\1015564001\dzMwBOubScEuXYdZ.exe 28844⤵PID:328
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\VmSpZ4a1UxVObiQD.exeC:\Users\Admin\AppData\Local\Temp\1015564001\VmSpZ4a1UxVObiQD.exe 28844⤵PID:3124
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\4KX0UK3iKJ0ZzI6Z.exeC:\Users\Admin\AppData\Local\Temp\1015564001\4KX0UK3iKJ0ZzI6Z.exe 28844⤵PID:3520
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\1IqNVbkRoQg0uLdM.exeC:\Users\Admin\AppData\Local\Temp\1015564001\1IqNVbkRoQg0uLdM.exe 28844⤵PID:3672
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\uyVdqdJk8yHEWngo.exeC:\Users\Admin\AppData\Local\Temp\1015564001\uyVdqdJk8yHEWngo.exe 28844⤵PID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\EHD30SPOLzL2DlB9.exeC:\Users\Admin\AppData\Local\Temp\1015564001\EHD30SPOLzL2DlB9.exe 28844⤵PID:5272
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\10VZixPrhOIhV6FT.exeC:\Users\Admin\AppData\Local\Temp\1015564001\10VZixPrhOIhV6FT.exe 28844⤵PID:5292
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\AKXyRfvOZeVbqvdD.exeC:\Users\Admin\AppData\Local\Temp\1015564001\AKXyRfvOZeVbqvdD.exe 28844⤵PID:7816
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\ZQcZ9KMqXwePexPV.exeC:\Users\Admin\AppData\Local\Temp\1015564001\ZQcZ9KMqXwePexPV.exe 28844⤵PID:8084
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\SHUklLgwIsJWVdXy.exeC:\Users\Admin\AppData\Local\Temp\1015564001\SHUklLgwIsJWVdXy.exe 28844⤵PID:8148
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\fjZIBLJeTpJbwxsN.exeC:\Users\Admin\AppData\Local\Temp\1015564001\fjZIBLJeTpJbwxsN.exe 28844⤵PID:5620
-
-
-
C:\Users\Admin\AppData\Local\Temp\1015665001\IQ7ux2z.exe"C:\Users\Admin\AppData\Local\Temp\1015665001\IQ7ux2z.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\1015665001\IQ7ux2z.exe"C:\Users\Admin\AppData\Local\Temp\1015665001\IQ7ux2z.exe"4⤵PID:6984
-
-
-
C:\Users\Admin\AppData\Local\Temp\1015781001\sUSFJjY.exe"C:\Users\Admin\AppData\Local\Temp\1015781001\sUSFJjY.exe"3⤵
- Executes dropped EXE
PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\1015870001\f4c940b739.exe"C:\Users\Admin\AppData\Local\Temp\1015870001\f4c940b739.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\1015871001\dc5ae68837.exe"C:\Users\Admin\AppData\Local\Temp\1015871001\dc5ae68837.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\1015872001\1820046172.exe"C:\Users\Admin\AppData\Local\Temp\1015872001\1820046172.exe"3⤵PID:2572
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- Kills process with taskkill
PID:3184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- Kills process with taskkill
PID:3980
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- Kills process with taskkill
PID:5144
-
-
-
C:\Users\Admin\AppData\Local\Temp\1015873001\f71f21f94c.exe"C:\Users\Admin\AppData\Local\Temp\1015873001\f71f21f94c.exe"3⤵PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\1015874001\5e6899d697.exe"C:\Users\Admin\AppData\Local\Temp\1015874001\5e6899d697.exe"3⤵PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\1015875001\a19cd40679.exe"C:\Users\Admin\AppData\Local\Temp\1015875001\a19cd40679.exe"3⤵PID:3456
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"4⤵PID:1972
-
C:\Windows\system32\mode.commode 65,105⤵PID:7840
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p24291711423417250691697322505 -oextracted5⤵PID:7884
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted5⤵PID:7948
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted5⤵PID:8004
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted5⤵PID:8036
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted5⤵PID:8108
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted5⤵PID:3948
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted5⤵PID:5348
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted5⤵PID:7048
-
-
C:\Windows\system32\attrib.exeattrib +H "in.exe"5⤵
- Views/modifies file attributes
PID:5692
-
-
C:\Users\Admin\AppData\Local\Temp\main\in.exe"in.exe"5⤵PID:5772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1015876001\430b6b221d.exe"C:\Users\Admin\AppData\Local\Temp\1015876001\430b6b221d.exe"3⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\1015876001\430b6b221d.exe"C:\Users\Admin\AppData\Local\Temp\1015876001\430b6b221d.exe"4⤵PID:6672
-
-
-
C:\Users\Admin\AppData\Local\Temp\1015877001\df41cea226.exe"C:\Users\Admin\AppData\Local\Temp\1015877001\df41cea226.exe"3⤵PID:5264
-
-
C:\Users\Admin\AppData\Local\Temp\1015878001\294f4e8214.exe"C:\Users\Admin\AppData\Local\Temp\1015878001\294f4e8214.exe"3⤵PID:4672
-
-
C:\Users\Admin\AppData\Local\Temp\1015879001\e35b971207.exe"C:\Users\Admin\AppData\Local\Temp\1015879001\e35b971207.exe"3⤵PID:4712
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5c37a981bc24c4aba6454da4eecb7acbe
SHA12bffdf27d0d4f7c810e323c1671a87ed2d6b644f
SHA256d6fc121d54e4cdf3a1b6b0505c4f691f16d91fdd421bf96c04388b1c6f19e361
SHA5122f44b5218b323bc2bad3ee37426b5bbcbb089b1a561e5f2f48fd455fed0a395b50a6cbb3783bf06e25b144b3f77078629ab1d86fb2c8df1a532230c81a3b2ab8
-
Filesize
2.8MB
MD50dad190f420a0a09ed8c262ca18b1097
SHA1b97535bf2960278b19bda8cad9e885b8eefbdc85
SHA25629e1e95110c03e84720e213a2bb0dcdff95af85a8a894d71518e06c62131e64a
SHA5128ae92676fc5539899414f0a70cba1ed01685b30af9002c68114720d6a7213e4e9c2368e17717c4e3e02650781a022001e4a2e43f83afbd709e7f1ab81003b646
-
Filesize
87KB
MD53c104350cc2661c345673e91ed672c4c
SHA1d205e94d47949cf3bc3f5226978f6d370c3d3b94
SHA2561fb9f279263c252a09f12b69c7238c18d2325f7cf7250ebe24ad9149abe62cf4
SHA5129c02bde2d096e181f00e906f4e242905d0e54dd207f309764805c7444c9f43073106812ade97fca9fc2363f59ed071371276880ce85e9a307fcdb03d3250cf6a
-
Filesize
1.8MB
MD5f9694cb15c258cf8125cf0c317c77479
SHA1ad7ab004164e247a32fb8eb4187103a1eaf73657
SHA25637aafa95a96bdc9144593c820466f3f063cd0e9fb3c6d2bcfab4c1bf0b61e51b
SHA51241504ae13f21e126508b91cdacc3d993790b7ce6001a0d58353860ad4eccb76858f553f4dd49d1960fae09a777160493932c0bb9acebd3bad3aae6e0dc2e2351
-
Filesize
1.7MB
MD5f660a7ff99befe7ae52d2636a0e8db46
SHA141b7e90dbf2ce54bd4e3048d0dc1b7e9d59d81ee
SHA256526d8ce745c14bac28de547ee616d66bec13517e558da772982b41cb9d6dda62
SHA5124f13dc0b5c8003b3dc7a5f3faa02c4e103da106722d53494a74e419756d1ce8c35b308641e7690bb932002b0d16411caedb60e63138d33cbfe78520ca8bd0240
-
Filesize
946KB
MD56bf59db9dafe72201466700ea8cb334d
SHA1e3649b55eb5141245e634374aa4a6385dba214e6
SHA256acdc360a0c9680c407d43df48f143af92d99d5c034a152e78b5da5220dbeb249
SHA512f44354e412d85b7025c486d2582976f684a57216267c37dbc2fea2b6ba5e9808a098f663258569a5a998d849e97b15a15d617f834e9b768e01391daf0ff261bd
-
Filesize
2.6MB
MD5e5cfad81f5397d7eeed2e7251b7e6e7a
SHA184184161e1b542773e5c74909ce37bb1f8f2238e
SHA25646cb31f14f15b4f13d203fe4138401adccf3163cf405fe907e7ee86bbd1c2387
SHA512fad966d925810d75be01d20b2b2bbf45755a30d385754878764fec0f1d45100490ba8c4ea279429f91c627cfa8f6b0e2abc70abdb8b645dddf1abd4cf021656a
-
Filesize
1.7MB
MD56c1d0dabe1ec5e928f27b3223f25c26b
SHA1e25ab704a6e9b3e4c30a6c1f7043598a13856ad9
SHA25692228a0012605351cf08df9a2ad4b93fa552d7a75991f81fb80f1ae854a0e57d
SHA5123a3f7af4f6018fcbd8c6f2871270504731cf269134453c9a146351c3e4a5c89165ecccafb3655d8b39c1ff1ec68f06e1851c0abd66d47602e1f0f8e36d4acfe9
-
Filesize
4.2MB
MD53a425626cbd40345f5b8dddd6b2b9efa
SHA17b50e108e293e54c15dce816552356f424eea97a
SHA256ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1
SHA512a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668
-
Filesize
710KB
MD528e568616a7b792cac1726deb77d9039
SHA139890a418fb391b823ed5084533e2e24dff021e1
SHA2569597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2
SHA51285048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5
-
Filesize
4.2MB
MD53617bfad36063c68a129b7e2bd89ceef
SHA16621e1f1403b9fa874124c374021034a3c86421e
SHA256e5637e64459e1868bf6318ea3b48b76ecf3f5669992ba882a7ddab2567af8b24
SHA512fdf2d08361b48faccf5ee0e2f04104f07f4677a0299a80d49cf50aabd952a6bb23332f51b12102d87c01ee3291bf1bc3833035e42d613e4c35e657dc06044c21
-
Filesize
4.3MB
MD5c5f945671aec219fd0af66f72065a536
SHA17956212b4272158ebf29243e79067cc73066fee6
SHA2567fdc637cd02ad95b233c17569424fe28b53228f5d7dc853dc1449527ad2fd05d
SHA5121cf363e35bbdaa90af47ff79e59a3175559b81d6ec63b296534793b1b406b883dd0b89412b0115be4a42041d27c15e97e494b284e092397d1878b8dfb544144a
-
Filesize
384KB
MD5dfd5f78a711fa92337010ecc028470b4
SHA11a389091178f2be8ce486cd860de16263f8e902e
SHA256da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d
SHA512a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656
-
Filesize
2.9MB
MD5117d5bc15e223805f55b2890713cd193
SHA1a01bcb2fbea608834b0d644bc7cdcd9d304eca5b
SHA25613da1ea004efe3af75113c29b1de6d3a63d86e9f54c4a4e422e2a509099aaade
SHA512f9d2668b08702dc76d4e7aa52938b3765a13bb4b71413ff3d328b5675bfc8cfd92b25dee4db68df84037410ae2d32f431921628d3238186bdbe2f41e6d36523d
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
440B
MD53626532127e3066df98e34c3d56a1869
SHA15fa7102f02615afde4efd4ed091744e842c63f78
SHA2562a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca
SHA512dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd