Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
11/02/2025, 09:50
Static task
static1
Behavioral task
behavioral1
Sample
284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe
Resource
win10v2004-20250207-en
General
-
Target
284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe
-
Size
1.8MB
-
MD5
0bd65d719958147c36050e910765ce4d
-
SHA1
ebac484d5a74c02602497779aa5f698c0d6f12de
-
SHA256
284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a
-
SHA512
e2203613eda0b3b85a6267276abaec04d075bd9c3c5d49842c15bf4102788fee1d300cef847796f20156dfcd65fcbf86b495c5943d656af855a57e3885b4c61b
-
SSDEEP
49152:DR7mYJyM4o8oiKo0yXr/eXIikTJMTXouL+Z:DVmYgro8pKvyaYiw4
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1c286dc5c8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file 3 IoCs
flow pid Process 8 1704 axplong.exe 63 1568 Process not Found 112 4380 1c286dc5c8.exe -
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2036 msedge.exe 2876 msedge.exe 1764 msedge.exe 2156 chrome.exe 4820 chrome.exe 2440 msedge.exe 2976 msedge.exe 396 chrome.exe 976 chrome.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1c286dc5c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1c286dc5c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Control Panel\International\Geo\Nation 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe Key value queried \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Control Panel\International\Geo\Nation axplong.exe -
Executes dropped EXE 5 IoCs
pid Process 1704 axplong.exe 2932 axplong.exe 3028 axplong.exe 4380 1c286dc5c8.exe 3820 axplong.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Software\Wine 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe Key opened \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Software\Wine 1c286dc5c8.exe Key opened \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Software\Wine axplong.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1c286dc5c8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019808001\\1c286dc5c8.exe" axplong.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2516 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe 1704 axplong.exe 2932 axplong.exe 3028 axplong.exe 4380 1c286dc5c8.exe 3820 axplong.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c286dc5c8.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2648 MicrosoftEdgeUpdate.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1c286dc5c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1c286dc5c8.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133837411766780970" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2516 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe 2516 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe 1704 axplong.exe 1704 axplong.exe 2932 axplong.exe 2932 axplong.exe 3028 axplong.exe 3028 axplong.exe 4380 1c286dc5c8.exe 4380 1c286dc5c8.exe 4380 1c286dc5c8.exe 4380 1c286dc5c8.exe 4380 1c286dc5c8.exe 4380 1c286dc5c8.exe 396 chrome.exe 396 chrome.exe 3820 axplong.exe 3820 axplong.exe 4380 1c286dc5c8.exe 4380 1c286dc5c8.exe 4380 1c286dc5c8.exe 4380 1c286dc5c8.exe 4888 msedge.exe 4888 msedge.exe 4976 msedge.exe 4888 msedge.exe 4976 msedge.exe 4888 msedge.exe 2440 msedge.exe 2440 msedge.exe 4380 1c286dc5c8.exe 4380 1c286dc5c8.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 396 chrome.exe 396 chrome.exe 396 chrome.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe Token: SeShutdownPrivilege 396 chrome.exe Token: SeCreatePagefilePrivilege 396 chrome.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 2516 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 396 chrome.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2516 wrote to memory of 1704 2516 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe 89 PID 2516 wrote to memory of 1704 2516 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe 89 PID 2516 wrote to memory of 1704 2516 284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe 89 PID 1704 wrote to memory of 4380 1704 axplong.exe 109 PID 1704 wrote to memory of 4380 1704 axplong.exe 109 PID 1704 wrote to memory of 4380 1704 axplong.exe 109 PID 4380 wrote to memory of 396 4380 1c286dc5c8.exe 110 PID 4380 wrote to memory of 396 4380 1c286dc5c8.exe 110 PID 396 wrote to memory of 1524 396 chrome.exe 111 PID 396 wrote to memory of 1524 396 chrome.exe 111 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 3668 396 chrome.exe 112 PID 396 wrote to memory of 2876 396 chrome.exe 113 PID 396 wrote to memory of 2876 396 chrome.exe 113 PID 396 wrote to memory of 3424 396 chrome.exe 114 PID 396 wrote to memory of 3424 396 chrome.exe 114 PID 396 wrote to memory of 3424 396 chrome.exe 114 PID 396 wrote to memory of 3424 396 chrome.exe 114 PID 396 wrote to memory of 3424 396 chrome.exe 114 PID 396 wrote to memory of 3424 396 chrome.exe 114 PID 396 wrote to memory of 3424 396 chrome.exe 114 PID 396 wrote to memory of 3424 396 chrome.exe 114 PID 396 wrote to memory of 3424 396 chrome.exe 114 PID 396 wrote to memory of 3424 396 chrome.exe 114 PID 396 wrote to memory of 3424 396 chrome.exe 114 PID 396 wrote to memory of 3424 396 chrome.exe 114 PID 396 wrote to memory of 3424 396 chrome.exe 114 PID 396 wrote to memory of 3424 396 chrome.exe 114 PID 396 wrote to memory of 3424 396 chrome.exe 114 PID 396 wrote to memory of 3424 396 chrome.exe 114 PID 396 wrote to memory of 3424 396 chrome.exe 114 PID 396 wrote to memory of 3424 396 chrome.exe 114 PID 396 wrote to memory of 3424 396 chrome.exe 114 PID 396 wrote to memory of 3424 396 chrome.exe 114 PID 396 wrote to memory of 3424 396 chrome.exe 114 PID 396 wrote to memory of 3424 396 chrome.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe"C:\Users\Admin\AppData\Local\Temp\284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\1019808001\1c286dc5c8.exe"C:\Users\Admin\AppData\Local\Temp\1019808001\1c286dc5c8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc3fcbcc40,0x7ffc3fcbcc4c,0x7ffc3fcbcc585⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1928,i,6517215182871926223,1599916400565532595,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=1924 /prefetch:25⤵PID:3668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2188,i,6517215182871926223,1599916400565532595,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=2156 /prefetch:35⤵PID:2876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,6517215182871926223,1599916400565532595,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=2436 /prefetch:85⤵PID:3424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3196,i,6517215182871926223,1599916400565532595,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=3216 /prefetch:15⤵
- Uses browser remote debugging
PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3224,i,6517215182871926223,1599916400565532595,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=3256 /prefetch:15⤵
- Uses browser remote debugging
PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3816,i,6517215182871926223,1599916400565532595,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=4512 /prefetch:15⤵
- Uses browser remote debugging
PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4252,i,6517215182871926223,1599916400565532595,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=4708 /prefetch:85⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4708,i,6517215182871926223,1599916400565532595,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=4644 /prefetch:85⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4540,i,6517215182871926223,1599916400565532595,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=4760 /prefetch:85⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4696,i,6517215182871926223,1599916400565532595,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=4772 /prefetch:85⤵PID:1340
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:2440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc3fcc46f8,0x7ffc3fcc4708,0x7ffc3fcc47185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,16515729790656211229,16360776853515449231,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:25⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,16515729790656211229,16360776853515449231,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,16515729790656211229,16360776853515449231,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2976 /prefetch:85⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2180,16515729790656211229,16360776853515449231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:15⤵
- Uses browser remote debugging
PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2180,16515729790656211229,16360776853515449231,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:15⤵
- Uses browser remote debugging
PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2180,16515729790656211229,16360776853515449231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:15⤵
- Uses browser remote debugging
PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2180,16515729790656211229,16360776853515449231,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4584 /prefetch:15⤵
- Uses browser remote debugging
PID:1764
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5MjEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE5ODA3NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MjM3MjM5NTgwIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2648
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4964
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3820
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Authentication Process
1Modify Registry
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD5448b7c8c3b3464847b28d8a3d56186b3
SHA18d68fb17d1185229fbb11c83e3e1302c2241e80b
SHA2565ac4fe094bdd264cdd05031eaa7b06b94cda44d134c9c1f719a82ad0e258cd05
SHA512eac10e9de38a513b2acc73f695be5e037ffe54d8cde3c5fb032122822de1df5f895b7924a3ab0a05aa644a6a9f4ee6f45f3452ad15dc242eb199d74ccdc532aa
-
Filesize
152B
MD5729bed0edd331ffcfd597470f90f3e66
SHA1a6ff8c58f693fcd9ca68887dfa10c7db29571f1b
SHA2561e19cfa75b8d279d6295258451a6e2e8fde33c529050e8975ad77d38eb901b88
SHA512dc697b5b083d69b98aa75a6ffe402430231ac1bbb2b313218e77937bd1571171859b3532a4b441bb674f591568050a45e3d3a19a97d4dff73dae70e15f8e34be
-
Filesize
6KB
MD57795bd23efda2fc2909d3ee153189d67
SHA1997dda3a1597ffeb15cdd1c7eb29daf4f385248a
SHA25689f93278cde85f5fc3bdf64be6607f93c5879787a956ecda0d667ffa85bad1ec
SHA5121ab073d528901fe98521fc7d1a33013b1e9e7be457583d012bcde181a72b98d87994ff36fc103a14d9e4340c84f0ba3f0425719c7ff4497adcf85b749327f077
-
Filesize
266KB
MD50565c88a9c539888f45746e294db347a
SHA1611a1989e4d8cee9eda4aa1f84225bee59b8d24f
SHA256f2f809dc821d243f80d274e1c6ab931f02f32f2df23906532945650c3e18b806
SHA51270b1d7e8780a6f438e490d731212863cde8fdacf3257b921029b8153a97d6ef4ccb6b55820b53d952b98e99a9ca665782310d27aa6bddbf79a787b07ea7e9320
-
Filesize
36B
MD5a1ca4bebcd03fafbe2b06a46a694e29a
SHA1ffc88125007c23ff6711147a12f9bba9c3d197ed
SHA256c3fa59901d56ce8a95a303b22fd119cb94abf4f43c4f6d60a81fd78b7d00fa65
SHA5126fe1730bf2a6bba058c5e1ef309a69079a6acca45c0dbca4e7d79c877257ac08e460af741459d1e335197cf4de209f2a2997816f2a2a3868b2c8d086ef789b0e
-
Filesize
1.7MB
MD5f457af464c54aa2097bdedc459abd266
SHA101ebb59e4ff33ae2948522d5044f00c0c6a13bef
SHA256ff34e13e63efb7df445b92003447ff4689281ec83626594633dc8b61bcb9626a
SHA5123da5c916d3262bcdb29442daf625ea1483e38384e2d9ad83cae9694de4c9da9732e8da2068743d4698d135790088514a5c80235b7002f509556d873938bcc4e8
-
Filesize
1.8MB
MD50bd65d719958147c36050e910765ce4d
SHA1ebac484d5a74c02602497779aa5f698c0d6f12de
SHA256284147e61bac6fc2ba06269f093c753514e844f4bc6b765703d3b902f0768b3a
SHA512e2203613eda0b3b85a6267276abaec04d075bd9c3c5d49842c15bf4102788fee1d300cef847796f20156dfcd65fcbf86b495c5943d656af855a57e3885b4c61b