Analysis
-
max time kernel
50s -
max time network
52s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250207-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250207-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
08-02-2025 21:01
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://185.215.113.97/files/SQL_gulong1/random.exe
Resource
win10ltsc2021-20250207-en
General
-
Target
http://185.215.113.97/files/SQL_gulong1/random.exe
Malware Config
Extracted
redline
cheat
103.84.89.222:33791
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 6 IoCs
resource yara_rule behavioral1/memory/3792-114-0x0000000000300000-0x0000000000770000-memory.dmp family_sectoprat behavioral1/memory/3792-115-0x0000000000300000-0x0000000000770000-memory.dmp family_sectoprat behavioral1/memory/1612-123-0x0000000000300000-0x0000000000770000-memory.dmp family_sectoprat behavioral1/memory/1612-124-0x0000000000300000-0x0000000000770000-memory.dmp family_sectoprat behavioral1/memory/5356-148-0x0000000000300000-0x0000000000770000-memory.dmp family_sectoprat behavioral1/memory/5356-150-0x0000000000300000-0x0000000000770000-memory.dmp family_sectoprat -
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe -
Downloads MZ/PE file 2 IoCs
flow pid Process 41 1860 Process not Found 8 4572 msedge.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe -
Executes dropped EXE 3 IoCs
pid Process 3792 random.exe 1612 random.exe 5356 random.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1549004827-922980081-1811511435-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-1549004827-922980081-1811511435-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-1549004827-922980081-1811511435-1000\Software\Wine random.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 3792 random.exe 1612 random.exe 5356 random.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3104 MicrosoftEdgeUpdate.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1549004827-922980081-1811511435-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 274307.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 944 msedge.exe 944 msedge.exe 4264 identity_helper.exe 4264 identity_helper.exe 3272 msedge.exe 3272 msedge.exe 3792 random.exe 3792 random.exe 1612 random.exe 1612 random.exe 5356 random.exe 5356 random.exe 3792 random.exe 3792 random.exe 3792 random.exe 5356 random.exe 5356 random.exe 5356 random.exe 1612 random.exe 1612 random.exe 1612 random.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3792 random.exe Token: SeDebugPrivilege 1612 random.exe Token: SeDebugPrivilege 5356 random.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
pid Process 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 944 wrote to memory of 824 944 msedge.exe 86 PID 944 wrote to memory of 824 944 msedge.exe 86 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 2020 944 msedge.exe 88 PID 944 wrote to memory of 4572 944 msedge.exe 89 PID 944 wrote to memory of 4572 944 msedge.exe 89 PID 944 wrote to memory of 5096 944 msedge.exe 90 PID 944 wrote to memory of 5096 944 msedge.exe 90 PID 944 wrote to memory of 5096 944 msedge.exe 90 PID 944 wrote to memory of 5096 944 msedge.exe 90 PID 944 wrote to memory of 5096 944 msedge.exe 90 PID 944 wrote to memory of 5096 944 msedge.exe 90 PID 944 wrote to memory of 5096 944 msedge.exe 90 PID 944 wrote to memory of 5096 944 msedge.exe 90 PID 944 wrote to memory of 5096 944 msedge.exe 90 PID 944 wrote to memory of 5096 944 msedge.exe 90 PID 944 wrote to memory of 5096 944 msedge.exe 90 PID 944 wrote to memory of 5096 944 msedge.exe 90 PID 944 wrote to memory of 5096 944 msedge.exe 90 PID 944 wrote to memory of 5096 944 msedge.exe 90 PID 944 wrote to memory of 5096 944 msedge.exe 90 PID 944 wrote to memory of 5096 944 msedge.exe 90 PID 944 wrote to memory of 5096 944 msedge.exe 90 PID 944 wrote to memory of 5096 944 msedge.exe 90 PID 944 wrote to memory of 5096 944 msedge.exe 90 PID 944 wrote to memory of 5096 944 msedge.exe 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://185.215.113.97/files/SQL_gulong1/random.exe1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ff9eb7246f8,0x7ff9eb724708,0x7ff9eb7247182⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,12283859179571958190,13131224463293578159,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,12283859179571958190,13131224463293578159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,12283859179571958190,13131224463293578159,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12283859179571958190,13131224463293578159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12283859179571958190,13131224463293578159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,12283859179571958190,13131224463293578159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 /prefetch:82⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,12283859179571958190,13131224463293578159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12283859179571958190,13131224463293578159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12283859179571958190,13131224463293578159,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12283859179571958190,13131224463293578159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12283859179571958190,13131224463293578159,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2128,12283859179571958190,13131224463293578159,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5684 /prefetch:82⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12283859179571958190,13131224463293578159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,12283859179571958190,13131224463293578159,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6360 /prefetch:12⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,12283859179571958190,13131224463293578159,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2128,12283859179571958190,13131224463293578159,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6392 /prefetch:82⤵PID:4380
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3328
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2072
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3104
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2164
-
C:\Users\Admin\Downloads\random.exe"C:\Users\Admin\Downloads\random.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3792
-
C:\Users\Admin\Downloads\random.exe"C:\Users\Admin\Downloads\random.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
C:\Users\Admin\Downloads\random.exe"C:\Users\Admin\Downloads\random.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5356
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553e6a19ede8b1b7d4b857339ad1bd672
SHA10bc70f552dc43a925d943b29b46c6c3b850ac07d
SHA2564e6a4338a9997017b7f6c281eade742e3cb3fa1805655876cca44f18a27e242b
SHA51265d27ceab40f1dd610f762bcc5ec84ad303a2334fbe34798d21fcf5a90e60fd51dd59b48a7fc199e3ba3b156f2d47c825ed49aa0336c0496ee4226543e37d368
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5ac389cd417999fb412e11f0b88a971ec
SHA1bdca2603592a5ced7f838d6e47341d41c6da9aa0
SHA25664c2ec6930b3dd3fd97e1987160ee1eb960528ecccfc59c6ac59d4688401f865
SHA512afa0a7ad69bc92c35e7fdae0f37c6604d0512677c421914e8f01e465ba49e2757a3a2a2f055dda23e9c1fd4dd86571bf7d49aa862f5cc5ff3f91a03f92f0e4ef
-
Filesize
5KB
MD5c84e2234027b0f7f96fb5c81dc829e1e
SHA1ad15311b48e7f9b9bef61f711e8b0a99f96572ef
SHA256088be5f3e1d042fcad11aad5f81a3b841a7f1ab9b805e74697939d42df6ecc9c
SHA512a995f5b85e410727cbde77b549eec5a00495959aff2d3716e5676214ea8b15825ba5caeafab0cf7f5f8a08eaccdcfa35a314858d4d2fd440fe4f583d55da9659
-
Filesize
5KB
MD5211a0546b0d6072f0fa335cc76359e7e
SHA1d57cee2594ee9c3a77d70eed75febf924e39accf
SHA256d2c4d9bd868b982ab1edef17785235f4c9920aa243120e90dd5f17ef8417717e
SHA512c702acbb542266dc80fc012d458b790f485ff80d535e70da36133cdd1835bd841f8afee32aec44edb9eb1d0582bf7bc2838f225a28f5917ac302ad675785b269
-
Filesize
24KB
MD5a375e5f2e07b78bd0cd6dc2a0ba28a12
SHA1f8876845af42a391ae5f2299a17015feca32f855
SHA256d0f2a93a18511021b0197b2f79aeffc59d8ee5aeb524f997b2b6f7bf1e7a6f26
SHA512d35f1f6f5071db4c394f4a79c651fb28dbaf5ba7f8b7aae35fd6ebbf18b2c2c8c3f37c39e27fa4e46786385c48f5b0090fb9dd6ced73fb8e681e60eb7d3624b6
-
Filesize
112KB
MD5e03fc0ff83fdfa203efc0eb3d2b8ed35
SHA1c705b1aa42d84b3414fdc5058e0fa0a3dc9e1664
SHA25608d550d1866b479c6c41ebbda7b453dba198ee8744a52c530ff34458024ee1fe
SHA512c0840930d7a9cf16e8fbefefd09c564eabfcfb6e9df1f9b906b830e8218a818c3f9721f9ce1fc2a96b2e6ce725baba0dcd5810a9b55d20b3c9d6f4569b9008a2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD562b2e26068f3ff2995023c41eeef8e32
SHA17d444aa622b2f16f227563579a1ec77138b6afb8
SHA2566e83711e221cb1c54d2d8541535ca6ff2c10e989526eb9db7110195232a4f932
SHA51250f05e4750dbc5057a9e40ba61ee389dc288befd3caabe2fad3a81c8d12a208ee063696895b032b0f078302fc0ebaf5dc02a99bbc7aa3ebedb3e39f20cbb0cc6
-
Filesize
10KB
MD5fa3c6fbea76707f05f882254d3a9fdce
SHA12c73dcdfb7b893ae3c6b19429ee740ee0e84f2df
SHA256a7648a93f551b400e6f5cb6ee990fb9e835f091552c712ad0f41e83a25718c1d
SHA512933ca9d7ce233beb84022023878de19360244b21aa31aaefa5471539fb66792aca4008d4c28d5f8412ce50ca1ae1a03da79d2b8cac82424fc0b7e220e51ccc6a
-
Filesize
1.7MB
MD5d273d12dc296e79d126d48ebb47d36ac
SHA1dd80053412695dedd70bc2e4d8f323f9ab271262
SHA25661330ad31a62b68fa8ad55346c900c431520ae3f36784ca083cfff6271faaa24
SHA512bb705e3cabafedd68a2f99a79861547f976bc862644fd3bdddc9e91020189a9b42c6d8883e393588c65090776e5cf631928e17a846c8d514bbda2be04109b8aa