Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
11-02-2025 11:47
Static task
static1
Behavioral task
behavioral1
Sample
79ff0c1dc17f2c4e7ef9fa992c07b342f95f57785462b674a2a08ad790524894.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
79ff0c1dc17f2c4e7ef9fa992c07b342f95f57785462b674a2a08ad790524894.exe
Resource
win10v2004-20250207-en
General
-
Target
79ff0c1dc17f2c4e7ef9fa992c07b342f95f57785462b674a2a08ad790524894.exe
-
Size
1.8MB
-
MD5
9721beba0b7a219a35c41371d585a2f5
-
SHA1
f118509f664bab11dbff277d5f8b8c2ff66d3d7c
-
SHA256
79ff0c1dc17f2c4e7ef9fa992c07b342f95f57785462b674a2a08ad790524894
-
SHA512
665b665091ee32fef90627dd28bbf27797e7d0c5a59da197d8f569852642e0d9635946efbfe2987b8de84fba7572f6a74367294f9d6402d7462dfe8d318b66a1
-
SSDEEP
49152:M02cpNq6bgFowaHmDyWPD/I5n7FAv1h5GGy:9gFjDyW7I5npAv1X1
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 79ff0c1dc17f2c4e7ef9fa992c07b342f95f57785462b674a2a08ad790524894.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 587ae44fdd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file 8 IoCs
flow pid Process 94 4220 Process not Found 99 4228 587ae44fdd.exe 109 4228 587ae44fdd.exe 109 4228 587ae44fdd.exe 96 4228 587ae44fdd.exe 102 3580 axplong.exe 5 3580 axplong.exe 86 4228 587ae44fdd.exe -
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4968 chrome.exe 728 msedge.exe 4952 msedge.exe 3968 chrome.exe 2672 chrome.exe 4476 chrome.exe 4936 msedge.exe 3468 msedge.exe 4520 msedge.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 79ff0c1dc17f2c4e7ef9fa992c07b342f95f57785462b674a2a08ad790524894.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 587ae44fdd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 79ff0c1dc17f2c4e7ef9fa992c07b342f95f57785462b674a2a08ad790524894.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 587ae44fdd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Control Panel\International\Geo\Nation 79ff0c1dc17f2c4e7ef9fa992c07b342f95f57785462b674a2a08ad790524894.exe Key value queried \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Control Panel\International\Geo\Nation axplong.exe -
Executes dropped EXE 5 IoCs
pid Process 3580 axplong.exe 4228 587ae44fdd.exe 3172 axplong.exe 924 axplong.exe 3880 axplong.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Software\Wine 587ae44fdd.exe Key opened \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\Software\Wine 79ff0c1dc17f2c4e7ef9fa992c07b342f95f57785462b674a2a08ad790524894.exe -
Loads dropped DLL 2 IoCs
pid Process 4228 587ae44fdd.exe 4228 587ae44fdd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-189444705-1272902858-1305688695-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\587ae44fdd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019824001\\587ae44fdd.exe" axplong.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 1800 79ff0c1dc17f2c4e7ef9fa992c07b342f95f57785462b674a2a08ad790524894.exe 3580 axplong.exe 4228 587ae44fdd.exe 3172 axplong.exe 924 axplong.exe 3880 axplong.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 79ff0c1dc17f2c4e7ef9fa992c07b342f95f57785462b674a2a08ad790524894.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79ff0c1dc17f2c4e7ef9fa992c07b342f95f57785462b674a2a08ad790524894.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 587ae44fdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3540 MicrosoftEdgeUpdate.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 587ae44fdd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 587ae44fdd.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133837480892057907" chrome.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 1800 79ff0c1dc17f2c4e7ef9fa992c07b342f95f57785462b674a2a08ad790524894.exe 1800 79ff0c1dc17f2c4e7ef9fa992c07b342f95f57785462b674a2a08ad790524894.exe 3580 axplong.exe 3580 axplong.exe 4228 587ae44fdd.exe 4228 587ae44fdd.exe 3172 axplong.exe 3172 axplong.exe 4228 587ae44fdd.exe 4228 587ae44fdd.exe 4228 587ae44fdd.exe 4228 587ae44fdd.exe 3968 chrome.exe 3968 chrome.exe 4228 587ae44fdd.exe 4228 587ae44fdd.exe 4228 587ae44fdd.exe 4228 587ae44fdd.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 3996 msedge.exe 4412 msedge.exe 4412 msedge.exe 4936 msedge.exe 4936 msedge.exe 4228 587ae44fdd.exe 4228 587ae44fdd.exe 924 axplong.exe 924 axplong.exe 4228 587ae44fdd.exe 4228 587ae44fdd.exe 3880 axplong.exe 3880 axplong.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1800 wrote to memory of 3580 1800 79ff0c1dc17f2c4e7ef9fa992c07b342f95f57785462b674a2a08ad790524894.exe 89 PID 1800 wrote to memory of 3580 1800 79ff0c1dc17f2c4e7ef9fa992c07b342f95f57785462b674a2a08ad790524894.exe 89 PID 1800 wrote to memory of 3580 1800 79ff0c1dc17f2c4e7ef9fa992c07b342f95f57785462b674a2a08ad790524894.exe 89 PID 3580 wrote to memory of 4228 3580 axplong.exe 91 PID 3580 wrote to memory of 4228 3580 axplong.exe 91 PID 3580 wrote to memory of 4228 3580 axplong.exe 91 PID 4228 wrote to memory of 3968 4228 587ae44fdd.exe 94 PID 4228 wrote to memory of 3968 4228 587ae44fdd.exe 94 PID 3968 wrote to memory of 4412 3968 chrome.exe 96 PID 3968 wrote to memory of 4412 3968 chrome.exe 96 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 4456 3968 chrome.exe 98 PID 3968 wrote to memory of 3320 3968 chrome.exe 99 PID 3968 wrote to memory of 3320 3968 chrome.exe 99 PID 3968 wrote to memory of 4896 3968 chrome.exe 100 PID 3968 wrote to memory of 4896 3968 chrome.exe 100 PID 3968 wrote to memory of 4896 3968 chrome.exe 100 PID 3968 wrote to memory of 4896 3968 chrome.exe 100 PID 3968 wrote to memory of 4896 3968 chrome.exe 100 PID 3968 wrote to memory of 4896 3968 chrome.exe 100 PID 3968 wrote to memory of 4896 3968 chrome.exe 100 PID 3968 wrote to memory of 4896 3968 chrome.exe 100 PID 3968 wrote to memory of 4896 3968 chrome.exe 100 PID 3968 wrote to memory of 4896 3968 chrome.exe 100 PID 3968 wrote to memory of 4896 3968 chrome.exe 100 PID 3968 wrote to memory of 4896 3968 chrome.exe 100 PID 3968 wrote to memory of 4896 3968 chrome.exe 100 PID 3968 wrote to memory of 4896 3968 chrome.exe 100 PID 3968 wrote to memory of 4896 3968 chrome.exe 100 PID 3968 wrote to memory of 4896 3968 chrome.exe 100 PID 3968 wrote to memory of 4896 3968 chrome.exe 100 PID 3968 wrote to memory of 4896 3968 chrome.exe 100 PID 3968 wrote to memory of 4896 3968 chrome.exe 100 PID 3968 wrote to memory of 4896 3968 chrome.exe 100 PID 3968 wrote to memory of 4896 3968 chrome.exe 100 PID 3968 wrote to memory of 4896 3968 chrome.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\79ff0c1dc17f2c4e7ef9fa992c07b342f95f57785462b674a2a08ad790524894.exe"C:\Users\Admin\AppData\Local\Temp\79ff0c1dc17f2c4e7ef9fa992c07b342f95f57785462b674a2a08ad790524894.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\1019824001\587ae44fdd.exe"C:\Users\Admin\AppData\Local\Temp\1019824001\587ae44fdd.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbf3d6cc40,0x7ffbf3d6cc4c,0x7ffbf3d6cc585⤵PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1900,i,15248503739717683886,12405414475643049857,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=1896 /prefetch:25⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,15248503739717683886,12405414475643049857,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=2164 /prefetch:35⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,15248503739717683886,12405414475643049857,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=2460 /prefetch:85⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,15248503739717683886,12405414475643049857,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=3176 /prefetch:15⤵
- Uses browser remote debugging
PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,15248503739717683886,12405414475643049857,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=3232 /prefetch:15⤵
- Uses browser remote debugging
PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4276,i,15248503739717683886,12405414475643049857,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=4540 /prefetch:15⤵
- Uses browser remote debugging
PID:4968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4744,i,15248503739717683886,12405414475643049857,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=4484 /prefetch:85⤵PID:376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4760,i,15248503739717683886,12405414475643049857,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=4572 /prefetch:85⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4808,i,15248503739717683886,12405414475643049857,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=4820 /prefetch:85⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4888,i,15248503739717683886,12405414475643049857,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=4520 /prefetch:85⤵PID:3812
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:4936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbf3d746f8,0x7ffbf3d74708,0x7ffbf3d747185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,2604120522487606413,18009564688536919071,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:25⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,2604120522487606413,18009564688536919071,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,2604120522487606413,18009564688536919071,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2600 /prefetch:85⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2232,2604120522487606413,18009564688536919071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:15⤵
- Uses browser remote debugging
PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2232,2604120522487606413,18009564688536919071,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:15⤵
- Uses browser remote debugging
PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2232,2604120522487606413,18009564688536919071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:15⤵
- Uses browser remote debugging
PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2232,2604120522487606413,18009564688536919071,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:15⤵
- Uses browser remote debugging
PID:4952
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3172
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:436
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1804
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU5MjEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODE5ODA3NzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1Mjg2MjA3MzY4Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3540
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:924
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3880
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Authentication Process
1Modify Registry
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD5448b7c8c3b3464847b28d8a3d56186b3
SHA18d68fb17d1185229fbb11c83e3e1302c2241e80b
SHA2565ac4fe094bdd264cdd05031eaa7b06b94cda44d134c9c1f719a82ad0e258cd05
SHA512eac10e9de38a513b2acc73f695be5e037ffe54d8cde3c5fb032122822de1df5f895b7924a3ab0a05aa644a6a9f4ee6f45f3452ad15dc242eb199d74ccdc532aa
-
Filesize
152B
MD5729bed0edd331ffcfd597470f90f3e66
SHA1a6ff8c58f693fcd9ca68887dfa10c7db29571f1b
SHA2561e19cfa75b8d279d6295258451a6e2e8fde33c529050e8975ad77d38eb901b88
SHA512dc697b5b083d69b98aa75a6ffe402430231ac1bbb2b313218e77937bd1571171859b3532a4b441bb674f591568050a45e3d3a19a97d4dff73dae70e15f8e34be
-
Filesize
6KB
MD5bb971978583e678b5c0ee6194254acb9
SHA1cd3a83b3bb6d6182251a9b040c2c362b27fe5c66
SHA256e2b398325ca821bc3f73ff9a537e7c4e5318cfcd92d56112688918be549ea5fc
SHA5121c060fe678ae198d44f47c9bc198f9b6085feb37bf9171f1727c798d74b800129e88c59c4b46e3f4b99bd8abe38e5cb594f74af4f574b818fe7b5cf07f72c444
-
Filesize
1.7MB
MD540890fdfe7ed373b4f6197d3f6734316
SHA16acceb06f2a396d104909ed2d74bd180bc8f75dc
SHA2560cbcd1bb0f8625af31fc63ae45ef2299c03041eec861cb85fb84da4182313dc2
SHA5127de612f70d12befca3f97363e34f76669551182cf4bdca3136493121e1bf36b1bcb41d41ea7af9e42d3da4b90455bbdfde8e45363df5dd99f5f51779f7407a54
-
Filesize
528KB
MD584a133ea646cbf6965fbc85e78ed2fb3
SHA14c58dc88dd1fb7f05dbe1a4dce735ac8fb2bc815
SHA2568e9a6291601ef2724a29615e2778c86caae721a8217e21a068cdae097e0e83a1
SHA51219b4c79ae608b864ddff5c691de3786b96daec355afb5b83bd3cd546817dc6765204983a0cdc6010a6595e2c27ce260cadb416b9fdc9133f82a4b047212bee49
-
Filesize
1.8MB
MD59721beba0b7a219a35c41371d585a2f5
SHA1f118509f664bab11dbff277d5f8b8c2ff66d3d7c
SHA25679ff0c1dc17f2c4e7ef9fa992c07b342f95f57785462b674a2a08ad790524894
SHA512665b665091ee32fef90627dd28bbf27797e7d0c5a59da197d8f569852642e0d9635946efbfe2987b8de84fba7572f6a74367294f9d6402d7462dfe8d318b66a1