Analysis
-
max time kernel
120s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 04:40
Static task
static1
Behavioral task
behavioral1
Sample
c2d8ffd8af0212c249042c4c85d229cbcafa6f883b747b11b1b2d798e89d942e.exe
Resource
win7-20241010-en
General
-
Target
c2d8ffd8af0212c249042c4c85d229cbcafa6f883b747b11b1b2d798e89d942e.exe
-
Size
2.8MB
-
MD5
e24c81aeef95800125b884d2e9471322
-
SHA1
4d19f2c314487b591a5dafc578e4d4f9ea32c755
-
SHA256
c2d8ffd8af0212c249042c4c85d229cbcafa6f883b747b11b1b2d798e89d942e
-
SHA512
78f512e22e88b7ebcbf8c310e3a890062a8a51ae8b4582c271b3f768bb1ec3e0b0a9225bd967de229bee095fa3b2e232cf42f2fdd2f5122249b8a17c4a681b0f
-
SSDEEP
49152:0FIt5wgLMx7tvg4EdSpSNDXBc+t1kc3bOWsF3vcKU3A9:0owgYx7tvhdpSNdckyc3b6/cKU3A9
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 1160 created 1272 1160 33f9a082ae.exe 21 PID 5876 created 1272 5876 e478b27804.exe 21 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3174d64615.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e478b27804.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c2d8ffd8af0212c249042c4c85d229cbcafa6f883b747b11b1b2d798e89d942e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 42337aa3c6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 33f9a082ae.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 42337aa3c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 33f9a082ae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 33f9a082ae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e478b27804.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3174d64615.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e478b27804.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3174d64615.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 42337aa3c6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c2d8ffd8af0212c249042c4c85d229cbcafa6f883b747b11b1b2d798e89d942e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c2d8ffd8af0212c249042c4c85d229cbcafa6f883b747b11b1b2d798e89d942e.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vminfo.vbs bluemail.exe -
Executes dropped EXE 29 IoCs
pid Process 2152 axplong.exe 1200 trunk.exe 1188 42337aa3c6.exe 2276 trunk.exe 1160 33f9a082ae.exe 2256 3174d64615.exe 2304 skotes.exe 1636 8oMoEDZ.exe 964 ON7ZDqr.exe 1572 bluemail.exe 5420 3lthFqd.exe 5532 fc38180ba2.exe 5600 fc38180ba2.exe 5792 9fde021f28.exe 5876 e478b27804.exe 6056 fc38180ba2.exe 2336 481e42b3a9.exe 4984 7z.exe 1092 7z.exe 2820 7z.exe 2772 7z.exe 2136 7z.exe 2388 7z.exe 2640 7z.exe 2240 7z.exe 2456 in.exe 3228 481e42b3a9.exe 3668 3lthFqd.exe 10544 Intel_PTT_EK_Recertification.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 42337aa3c6.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 33f9a082ae.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine 3174d64615.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine e478b27804.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine c2d8ffd8af0212c249042c4c85d229cbcafa6f883b747b11b1b2d798e89d942e.exe -
Loads dropped DLL 54 IoCs
pid Process 2376 c2d8ffd8af0212c249042c4c85d229cbcafa6f883b747b11b1b2d798e89d942e.exe 2376 c2d8ffd8af0212c249042c4c85d229cbcafa6f883b747b11b1b2d798e89d942e.exe 2152 axplong.exe 2152 axplong.exe 1200 trunk.exe 2276 trunk.exe 2152 axplong.exe 2152 axplong.exe 2152 axplong.exe 2256 3174d64615.exe 2304 skotes.exe 2304 skotes.exe 2304 skotes.exe 2304 skotes.exe 2304 skotes.exe 2304 skotes.exe 2304 skotes.exe 2304 skotes.exe 2304 skotes.exe 5532 fc38180ba2.exe 2304 skotes.exe 2304 skotes.exe 2304 skotes.exe 5876 e478b27804.exe 5876 e478b27804.exe 2304 skotes.exe 2304 skotes.exe 1692 cmd.exe 4984 7z.exe 1692 cmd.exe 1092 7z.exe 1692 cmd.exe 2820 7z.exe 1692 cmd.exe 2772 7z.exe 1692 cmd.exe 2136 7z.exe 1692 cmd.exe 2388 7z.exe 1692 cmd.exe 2640 7z.exe 1692 cmd.exe 2240 7z.exe 1692 cmd.exe 1692 cmd.exe 2336 481e42b3a9.exe 3524 WerFault.exe 3524 WerFault.exe 3524 WerFault.exe 3524 WerFault.exe 5420 3lthFqd.exe 3524 WerFault.exe 10508 taskeng.exe 10508 taskeng.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\42337aa3c6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007141001\\42337aa3c6.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\3174d64615.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007143001\\3174d64615.exe" axplong.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2376 c2d8ffd8af0212c249042c4c85d229cbcafa6f883b747b11b1b2d798e89d942e.exe 2152 axplong.exe 1188 42337aa3c6.exe 1160 33f9a082ae.exe 2256 3174d64615.exe 2304 skotes.exe 5876 e478b27804.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 5532 set thread context of 5600 5532 fc38180ba2.exe 50 PID 2336 set thread context of 3228 2336 481e42b3a9.exe 78 PID 5420 set thread context of 3668 5420 3lthFqd.exe 81 PID 10544 set thread context of 10560 10544 Intel_PTT_EK_Recertification.exe 84 -
resource yara_rule behavioral1/memory/2456-1647-0x000000013F080000-0x000000013F510000-memory.dmp upx behavioral1/memory/2456-1649-0x000000013F080000-0x000000013F510000-memory.dmp upx behavioral1/memory/10544-3757-0x000000013F240000-0x000000013F6D0000-memory.dmp upx behavioral1/memory/10544-3768-0x000000013F240000-0x000000013F6D0000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job c2d8ffd8af0212c249042c4c85d229cbcafa6f883b747b11b1b2d798e89d942e.exe File created C:\Windows\Tasks\skotes.job 3174d64615.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3524 1572 WerFault.exe 46 -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3174d64615.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc38180ba2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e478b27804.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc38180ba2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3lthFqd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42337aa3c6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 33f9a082ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3lthFqd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fde021f28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 481e42b3a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 481e42b3a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bluemail.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc38180ba2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2d8ffd8af0212c249042c4c85d229cbcafa6f883b747b11b1b2d798e89d942e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ON7ZDqr.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1516 powershell.exe 2008 PING.EXE 10604 powershell.exe 10696 PING.EXE -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2008 PING.EXE 10696 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2324 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2376 c2d8ffd8af0212c249042c4c85d229cbcafa6f883b747b11b1b2d798e89d942e.exe 2152 axplong.exe 1188 42337aa3c6.exe 1160 33f9a082ae.exe 1160 33f9a082ae.exe 1160 33f9a082ae.exe 1160 33f9a082ae.exe 1160 33f9a082ae.exe 2516 dialer.exe 2516 dialer.exe 2256 3174d64615.exe 2516 dialer.exe 2516 dialer.exe 2304 skotes.exe 964 ON7ZDqr.exe 964 ON7ZDqr.exe 964 ON7ZDqr.exe 964 ON7ZDqr.exe 5876 e478b27804.exe 5876 e478b27804.exe 5876 e478b27804.exe 5876 e478b27804.exe 5876 e478b27804.exe 6056 fc38180ba2.exe 6056 fc38180ba2.exe 6056 fc38180ba2.exe 6056 fc38180ba2.exe 1572 bluemail.exe 1516 powershell.exe 3668 3lthFqd.exe 3668 3lthFqd.exe 10544 Intel_PTT_EK_Recertification.exe 10604 powershell.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeDebugPrivilege 1572 bluemail.exe Token: SeRestorePrivilege 4984 7z.exe Token: 35 4984 7z.exe Token: SeSecurityPrivilege 4984 7z.exe Token: SeSecurityPrivilege 4984 7z.exe Token: SeRestorePrivilege 1092 7z.exe Token: 35 1092 7z.exe Token: SeSecurityPrivilege 1092 7z.exe Token: SeSecurityPrivilege 1092 7z.exe Token: SeRestorePrivilege 2820 7z.exe Token: 35 2820 7z.exe Token: SeSecurityPrivilege 2820 7z.exe Token: SeSecurityPrivilege 2820 7z.exe Token: SeRestorePrivilege 2772 7z.exe Token: 35 2772 7z.exe Token: SeSecurityPrivilege 2772 7z.exe Token: SeSecurityPrivilege 2772 7z.exe Token: SeRestorePrivilege 2136 7z.exe Token: 35 2136 7z.exe Token: SeSecurityPrivilege 2136 7z.exe Token: SeSecurityPrivilege 2136 7z.exe Token: SeRestorePrivilege 2388 7z.exe Token: 35 2388 7z.exe Token: SeSecurityPrivilege 2388 7z.exe Token: SeSecurityPrivilege 2388 7z.exe Token: SeRestorePrivilege 2640 7z.exe Token: 35 2640 7z.exe Token: SeSecurityPrivilege 2640 7z.exe Token: SeSecurityPrivilege 2640 7z.exe Token: SeRestorePrivilege 2240 7z.exe Token: 35 2240 7z.exe Token: SeSecurityPrivilege 2240 7z.exe Token: SeSecurityPrivilege 2240 7z.exe Token: SeDebugPrivilege 1572 bluemail.exe Token: SeDebugPrivilege 1516 powershell.exe Token: SeDebugPrivilege 3668 3lthFqd.exe Token: SeDebugPrivilege 10604 powershell.exe Token: SeLockMemoryPrivilege 10560 explorer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2376 c2d8ffd8af0212c249042c4c85d229cbcafa6f883b747b11b1b2d798e89d942e.exe 2256 3174d64615.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2152 2376 c2d8ffd8af0212c249042c4c85d229cbcafa6f883b747b11b1b2d798e89d942e.exe 30 PID 2376 wrote to memory of 2152 2376 c2d8ffd8af0212c249042c4c85d229cbcafa6f883b747b11b1b2d798e89d942e.exe 30 PID 2376 wrote to memory of 2152 2376 c2d8ffd8af0212c249042c4c85d229cbcafa6f883b747b11b1b2d798e89d942e.exe 30 PID 2376 wrote to memory of 2152 2376 c2d8ffd8af0212c249042c4c85d229cbcafa6f883b747b11b1b2d798e89d942e.exe 30 PID 2152 wrote to memory of 1200 2152 axplong.exe 33 PID 2152 wrote to memory of 1200 2152 axplong.exe 33 PID 2152 wrote to memory of 1200 2152 axplong.exe 33 PID 2152 wrote to memory of 1200 2152 axplong.exe 33 PID 2152 wrote to memory of 1188 2152 axplong.exe 35 PID 2152 wrote to memory of 1188 2152 axplong.exe 35 PID 2152 wrote to memory of 1188 2152 axplong.exe 35 PID 2152 wrote to memory of 1188 2152 axplong.exe 35 PID 1200 wrote to memory of 2276 1200 trunk.exe 36 PID 1200 wrote to memory of 2276 1200 trunk.exe 36 PID 1200 wrote to memory of 2276 1200 trunk.exe 36 PID 2152 wrote to memory of 1160 2152 axplong.exe 37 PID 2152 wrote to memory of 1160 2152 axplong.exe 37 PID 2152 wrote to memory of 1160 2152 axplong.exe 37 PID 2152 wrote to memory of 1160 2152 axplong.exe 37 PID 2152 wrote to memory of 2256 2152 axplong.exe 38 PID 2152 wrote to memory of 2256 2152 axplong.exe 38 PID 2152 wrote to memory of 2256 2152 axplong.exe 38 PID 2152 wrote to memory of 2256 2152 axplong.exe 38 PID 1160 wrote to memory of 2516 1160 33f9a082ae.exe 39 PID 1160 wrote to memory of 2516 1160 33f9a082ae.exe 39 PID 1160 wrote to memory of 2516 1160 33f9a082ae.exe 39 PID 1160 wrote to memory of 2516 1160 33f9a082ae.exe 39 PID 1160 wrote to memory of 2516 1160 33f9a082ae.exe 39 PID 1160 wrote to memory of 2516 1160 33f9a082ae.exe 39 PID 2256 wrote to memory of 2304 2256 3174d64615.exe 40 PID 2256 wrote to memory of 2304 2256 3174d64615.exe 40 PID 2256 wrote to memory of 2304 2256 3174d64615.exe 40 PID 2256 wrote to memory of 2304 2256 3174d64615.exe 40 PID 2304 wrote to memory of 1636 2304 skotes.exe 42 PID 2304 wrote to memory of 1636 2304 skotes.exe 42 PID 2304 wrote to memory of 1636 2304 skotes.exe 42 PID 2304 wrote to memory of 1636 2304 skotes.exe 42 PID 2304 wrote to memory of 964 2304 skotes.exe 44 PID 2304 wrote to memory of 964 2304 skotes.exe 44 PID 2304 wrote to memory of 964 2304 skotes.exe 44 PID 2304 wrote to memory of 964 2304 skotes.exe 44 PID 2304 wrote to memory of 1572 2304 skotes.exe 46 PID 2304 wrote to memory of 1572 2304 skotes.exe 46 PID 2304 wrote to memory of 1572 2304 skotes.exe 46 PID 2304 wrote to memory of 1572 2304 skotes.exe 46 PID 2304 wrote to memory of 5420 2304 skotes.exe 47 PID 2304 wrote to memory of 5420 2304 skotes.exe 47 PID 2304 wrote to memory of 5420 2304 skotes.exe 47 PID 2304 wrote to memory of 5420 2304 skotes.exe 47 PID 2304 wrote to memory of 5532 2304 skotes.exe 48 PID 2304 wrote to memory of 5532 2304 skotes.exe 48 PID 2304 wrote to memory of 5532 2304 skotes.exe 48 PID 2304 wrote to memory of 5532 2304 skotes.exe 48 PID 5532 wrote to memory of 5600 5532 fc38180ba2.exe 50 PID 5532 wrote to memory of 5600 5532 fc38180ba2.exe 50 PID 5532 wrote to memory of 5600 5532 fc38180ba2.exe 50 PID 5532 wrote to memory of 5600 5532 fc38180ba2.exe 50 PID 5532 wrote to memory of 5600 5532 fc38180ba2.exe 50 PID 5532 wrote to memory of 5600 5532 fc38180ba2.exe 50 PID 5532 wrote to memory of 5600 5532 fc38180ba2.exe 50 PID 5532 wrote to memory of 5600 5532 fc38180ba2.exe 50 PID 5532 wrote to memory of 5600 5532 fc38180ba2.exe 50 PID 5532 wrote to memory of 5600 5532 fc38180ba2.exe 50 PID 2304 wrote to memory of 5792 2304 skotes.exe 51 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 2632 attrib.exe 2956 attrib.exe 2600 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\c2d8ffd8af0212c249042c4c85d229cbcafa6f883b747b11b1b2d798e89d942e.exe"C:\Users\Admin\AppData\Local\Temp\c2d8ffd8af0212c249042c4c85d229cbcafa6f883b747b11b1b2d798e89d942e.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe"C:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\onefile_1200_133789704496220000\trunk.exeC:\Users\Admin\AppData\Local\Temp\1007054001\trunk.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2276
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007141001\42337aa3c6.exe"C:\Users\Admin\AppData\Local\Temp\1007141001\42337aa3c6.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1188
-
-
C:\Users\Admin\AppData\Local\Temp\1007142001\33f9a082ae.exe"C:\Users\Admin\AppData\Local\Temp\1007142001\33f9a082ae.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1160
-
-
C:\Users\Admin\AppData\Local\Temp\1007143001\3174d64615.exe"C:\Users\Admin\AppData\Local\Temp\1007143001\3174d64615.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\1016608001\8oMoEDZ.exe"C:\Users\Admin\AppData\Local\Temp\1016608001\8oMoEDZ.exe"6⤵
- Executes dropped EXE
PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\1016655001\ON7ZDqr.exe"C:\Users\Admin\AppData\Local\Temp\1016655001\ON7ZDqr.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:964
-
-
C:\Users\Admin\AppData\Local\Temp\1016757001\bluemail.exe"C:\Users\Admin\AppData\Local\Temp\1016757001\bluemail.exe"6⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 6367⤵
- Loads dropped DLL
- Program crash
PID:3524
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016799001\3lthFqd.exe"C:\Users\Admin\AppData\Local\Temp\1016799001\3lthFqd.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5420 -
C:\Users\Admin\AppData\Local\Temp\1016799001\3lthFqd.exe"C:\Users\Admin\AppData\Local\Temp\1016799001\3lthFqd.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016819001\fc38180ba2.exe"C:\Users\Admin\AppData\Local\Temp\1016819001\fc38180ba2.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5532 -
C:\Users\Admin\AppData\Local\Temp\1016819001\fc38180ba2.exe"C:\Users\Admin\AppData\Local\Temp\1016819001\fc38180ba2.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5600
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016822001\9fde021f28.exe"C:\Users\Admin\AppData\Local\Temp\1016822001\9fde021f28.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5792 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"7⤵
- Loads dropped DLL
PID:1692 -
C:\Windows\system32\mode.commode 65,108⤵PID:1328
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p24291711423417250691697322505 -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Windows\system32\attrib.exeattrib +H "in.exe"8⤵
- Views/modifies file attributes
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\main\in.exe"in.exe"8⤵
- Executes dropped EXE
PID:2456 -
C:\Windows\system32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe9⤵
- Views/modifies file attributes
PID:2600
-
-
C:\Windows\system32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe9⤵
- Views/modifies file attributes
PID:2956
-
-
C:\Windows\system32\schtasks.exeschtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE9⤵
- Scheduled Task/Job: Scheduled Task
PID:2324
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del in.exe9⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1516 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.110⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2008
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1016823001\e478b27804.exe"C:\Users\Admin\AppData\Local\Temp\1016823001\e478b27804.exe"6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5876
-
-
C:\Users\Admin\AppData\Local\Temp\1016824001\481e42b3a9.exe"C:\Users\Admin\AppData\Local\Temp\1016824001\481e42b3a9.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\1016824001\481e42b3a9.exe"C:\Users\Admin\AppData\Local\Temp\1016824001\481e42b3a9.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3228
-
-
-
-
-
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\1016819001\fc38180ba2.exe"C:\Users\Admin\AppData\Local\Temp\1016819001\fc38180ba2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6056
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {963D54DE-CB03-42AA-B99C-9A41498EE924} S-1-5-21-3692679935-4019334568-335155002-1000:BCXRJFKE\Admin:Interactive:[1]1⤵
- Loads dropped DLL
PID:10508 -
C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exeC:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:10544 -
C:\Windows\explorer.exeexplorer.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:10560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe3⤵
- Drops file in System32 directory
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:10604 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.1.10.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10696
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Query Registry
5Remote System Discovery
1System Information Discovery
2System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.2MB
MD5d3b39a6b63c3822be6f8af9b3813bbad
SHA100b020e5a1c05442612f2cec7950c2814b59b1b6
SHA256786f1331a0618485b31ba763911b14fcec691bf9897bee8f42680076092b7a2f
SHA512a5c7504b29798fdabf610cf65716ec1d7745956f470d86de12a52b3c8731f858764fdf78647e50b3111622e7e65f05f82cd258b98c1a0f45ef7fdc088647d4ff
-
Filesize
2.7MB
MD5262c66b6505ee29edbb900c3839c1926
SHA1e284cf04c8ac337f78a2031bd053b014846ac91f
SHA256e1b4e09a2c957837ee5edc9b2fb3843bf7f6277eee65aa5e03e52576eec0c2bc
SHA5120e27ba1b36f9f4e9c179ec75c5755aceab23ff38532d637046fa6e15e4a253e6cbd6acceb94660e03a0704dadcfdbcb2202c7cf91fee24df75fc8cf09bece696
-
Filesize
1.9MB
MD5abc29b112ae548afa2e5625c7dbcf8d1
SHA134c6dc2444c2ffcb5b17c03cb744af0193a81c01
SHA256e5922c1c981c014df2cb5a9b999d7e6dbd649cefe46eab9aa8bd64a305be0f4e
SHA512fc7b2f99d271cd03f27b89fe8b899c560627ff9750ed9049d0d16295296e8ac4fde8e85c5e6a9f4a3eeb0c32ad858522074e2df70ce0f66fa8cd41708dbe6d9b
-
Filesize
2.9MB
MD5b9925fe365cc19ec01d9ada7f7333677
SHA1db37100f5d464de7dd4191b7836aebb07f95e6a0
SHA256ebd551402285a1b1ebd92225c8aa06247156d2f661bf3966dd21542697b22a28
SHA51235f4324b2d6f18129ce04b11e4fca9821c00354ad36e6e8835445906d64d3b225737bf77b88805984522e5297f44d6d175af245f4daba77230a984a11bd46a37
-
Filesize
747KB
MD58a9cb17c0224a01bd34b46495983c50a
SHA100296ea6a56f6e10a0f1450a20c5fb329b8856c1
SHA2563d51b9523b387859bc0d94246dfb216cfa82f9d650c8d11be11ed67f70e7440b
SHA5121472e4670f469c43227b965984ecc223a526f6284363d8e08a3b5b55e602ccce62df4bc49939ee5bd7df7b0c26e20da896b084eccab767f8728e6bf14d71c840
-
Filesize
295KB
MD53fd3550db5a93086bbff8d0ba8e62dd8
SHA13ac4fc26073ae82bce294b184b689d22a745191b
SHA256c2ab516bb3a39832d963770d813ab77027d454a087ad9fae8ce24336a78f9073
SHA512dc57658e7f38643ba99d3c5ff48af493f6ad88ae40720f571879416f45d4d47c4372d829a3829578c72e5a27316220431c239e85c904a9f0f84e1a2851ddfffa
-
Filesize
1.6MB
MD58060f777b0c7b4cd37d3d0e0409c5633
SHA1e13520519a8dec506e5fdd5aeb958e32b0e1f055
SHA256270deb9dea612b34a0ab55325a036b05c7f0275eb7931b8adec777030d51bd51
SHA5120a1fc50f7eed2bd17e52683e590085efabd3a94843a4ae2623075f05ffb26c1b06115fb38a3bc7ad0ae7a88259011ca04eb236c44da622e316cec3dd73e95de7
-
Filesize
941KB
MD5541967864e3bbe8c0258186e7f9a7489
SHA101db1b034184d31c03003ab7f81cf872e68b44d8
SHA25663ff1a1be734e83c37ff7039e8b7a2b303a5e2df7b53ce2158a75c2e26d6906a
SHA51287abbf7afeb4c40926884d346412280883e74ebe1214cd04a9e56ff058f8c2bc183bebf32a0120e10fa75b250659d9da0fa8c2fc4495b970e451330a574fe2ba
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
4.2MB
MD53a425626cbd40345f5b8dddd6b2b9efa
SHA17b50e108e293e54c15dce816552356f424eea97a
SHA256ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1
SHA512a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
3.3MB
MD5045b0a3d5be6f10ddf19ae6d92dfdd70
SHA10387715b6681d7097d372cd0005b664f76c933c7
SHA25694b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d
SHA51258255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b
-
Filesize
440B
MD53626532127e3066df98e34c3d56a1869
SHA15fa7102f02615afde4efd4ed091744e842c63f78
SHA2562a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca
SHA512dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd
-
Filesize
6.6MB
MD5166cc2f997cba5fc011820e6b46e8ea7
SHA1d6179213afea084f02566ea190202c752286ca1f
SHA256c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546
SHA51249d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PKPHQ5OCCMUXCST2K2LY.temp
Filesize7KB
MD586d39eae47c073688c3881340e565be7
SHA12591785d1e1dbff9f0f3b50c869300a727327568
SHA256c7fb45bf0ca985ed65bbd71df9cd159a3b5c697d2e4b7905dd73a95f5363f38f
SHA5128221f47de79ac0fd4645498b2357a5d1a404cd3a8a621511222730f73d62a78f101f49bbc7d137a46e2aa7363da666d06e09d7e041a6a9448fd4f5bb48f7c62d
-
Filesize
2.8MB
MD5e24c81aeef95800125b884d2e9471322
SHA14d19f2c314487b591a5dafc578e4d4f9ea32c755
SHA256c2d8ffd8af0212c249042c4c85d229cbcafa6f883b747b11b1b2d798e89d942e
SHA51278f512e22e88b7ebcbf8c310e3a890062a8a51ae8b4582c271b3f768bb1ec3e0b0a9225bd967de229bee095fa3b2e232cf42f2fdd2f5122249b8a17c4a681b0f
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
18.0MB
MD586ddf66d8651d0baa1cc13d6f8c18dc1
SHA1ee15109134300e555085811f4060048e245269f9
SHA256ee045dffee8b48356106a2105803b73776b73bf7462d364b1f82540fcf72f4cf
SHA512385fce7ded01cba93f842a1b698b78e3eb1d73833c282669ebe6bea22ec6c4957b179325614f17ecb7c7357051fb7381e011cf2ebc0f5ca2f24414f0e23a0c6c