Analysis
-
max time kernel
297s -
max time network
287s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-03-2024 22:24
Static task
static1
Behavioral task
behavioral1
Sample
398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exe
Resource
win7-20240221-en
General
-
Target
398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exe
-
Size
1.8MB
-
MD5
cfde6a803e4e9e3748718189a8299ac3
-
SHA1
0379f8cf3c7c3d7b6fb7caa88de1a0c6d9ff646c
-
SHA256
398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019
-
SHA512
f6d75e9a2f45f82e04307b10ec6e1a7f0fe3e60faefdc68b471e0c308ca160b84eade39e9451850833311703cde9e36d3bb66ee514a4849fb86ab63e54acd112
-
SSDEEP
49152:8qN7eHlW+d7+jlEzipjz3clXaScnCKPVc:8qZMW+d7o+z3En
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
Processes:
398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exeexplorha.exe1224b18424.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1224b18424.exe -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 7 1976 rundll32.exe 9 648 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
1224b18424.exe398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exeexplorha.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1224b18424.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1224b18424.exe -
Executes dropped EXE 3 IoCs
Processes:
explorha.exe1224b18424.exeexplorha.exepid process 2432 explorha.exe 520 1224b18424.exe 1736 explorha.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exeexplorha.exe1224b18424.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Wine 398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Wine 1224b18424.exe -
Loads dropped DLL 15 IoCs
Processes:
398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exerundll32.exerundll32.exeexplorha.exerundll32.exepid process 2224 398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 2492 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 2432 explorha.exe 648 rundll32.exe 648 rundll32.exe 648 rundll32.exe 648 rundll32.exe 2432 explorha.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explorha.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\1224b18424.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000022001\\1224b18424.exe" explorha.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exeexplorha.exepid process 2224 398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exe 2432 explorha.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
explorha.exedescription pid process target process PID 2432 set thread context of 1736 2432 explorha.exe explorha.exe -
Drops file in Windows directory 1 IoCs
Processes:
398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exedescription ioc process File created C:\Windows\Tasks\explorha.job 398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exeexplorha.exerundll32.exepowershell.exepid process 2224 398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exe 2432 explorha.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 1976 rundll32.exe 524 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 524 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exepid process 2224 398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exeexplorha.exerundll32.exerundll32.exedescription pid process target process PID 2224 wrote to memory of 2432 2224 398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exe explorha.exe PID 2224 wrote to memory of 2432 2224 398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exe explorha.exe PID 2224 wrote to memory of 2432 2224 398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exe explorha.exe PID 2224 wrote to memory of 2432 2224 398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exe explorha.exe PID 2432 wrote to memory of 2492 2432 explorha.exe rundll32.exe PID 2432 wrote to memory of 2492 2432 explorha.exe rundll32.exe PID 2432 wrote to memory of 2492 2432 explorha.exe rundll32.exe PID 2432 wrote to memory of 2492 2432 explorha.exe rundll32.exe PID 2432 wrote to memory of 2492 2432 explorha.exe rundll32.exe PID 2432 wrote to memory of 2492 2432 explorha.exe rundll32.exe PID 2432 wrote to memory of 2492 2432 explorha.exe rundll32.exe PID 2492 wrote to memory of 1976 2492 rundll32.exe rundll32.exe PID 2492 wrote to memory of 1976 2492 rundll32.exe rundll32.exe PID 2492 wrote to memory of 1976 2492 rundll32.exe rundll32.exe PID 2492 wrote to memory of 1976 2492 rundll32.exe rundll32.exe PID 1976 wrote to memory of 1972 1976 rundll32.exe netsh.exe PID 1976 wrote to memory of 1972 1976 rundll32.exe netsh.exe PID 1976 wrote to memory of 1972 1976 rundll32.exe netsh.exe PID 1976 wrote to memory of 524 1976 rundll32.exe powershell.exe PID 1976 wrote to memory of 524 1976 rundll32.exe powershell.exe PID 1976 wrote to memory of 524 1976 rundll32.exe powershell.exe PID 2432 wrote to memory of 520 2432 explorha.exe 1224b18424.exe PID 2432 wrote to memory of 520 2432 explorha.exe 1224b18424.exe PID 2432 wrote to memory of 520 2432 explorha.exe 1224b18424.exe PID 2432 wrote to memory of 520 2432 explorha.exe 1224b18424.exe PID 2432 wrote to memory of 648 2432 explorha.exe rundll32.exe PID 2432 wrote to memory of 648 2432 explorha.exe rundll32.exe PID 2432 wrote to memory of 648 2432 explorha.exe rundll32.exe PID 2432 wrote to memory of 648 2432 explorha.exe rundll32.exe PID 2432 wrote to memory of 648 2432 explorha.exe rundll32.exe PID 2432 wrote to memory of 648 2432 explorha.exe rundll32.exe PID 2432 wrote to memory of 648 2432 explorha.exe rundll32.exe PID 2432 wrote to memory of 1736 2432 explorha.exe explorha.exe PID 2432 wrote to memory of 1736 2432 explorha.exe explorha.exe PID 2432 wrote to memory of 1736 2432 explorha.exe explorha.exe PID 2432 wrote to memory of 1736 2432 explorha.exe explorha.exe PID 2432 wrote to memory of 1736 2432 explorha.exe explorha.exe PID 2432 wrote to memory of 1736 2432 explorha.exe explorha.exe PID 2432 wrote to memory of 1736 2432 explorha.exe explorha.exe PID 2432 wrote to memory of 1736 2432 explorha.exe explorha.exe PID 2432 wrote to memory of 1736 2432 explorha.exe explorha.exe PID 2432 wrote to memory of 1736 2432 explorha.exe explorha.exe PID 2432 wrote to memory of 1736 2432 explorha.exe explorha.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exe"C:\Users\Admin\AppData\Local\Temp\398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:1972
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\309405411416_Desktop.zip' -CompressionLevel Optimal5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:524
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000022001\1224b18424.exe"C:\Users\Admin\AppData\Local\Temp\1000022001\1224b18424.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:520
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:648
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"3⤵
- Executes dropped EXE
PID:1736
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD592b0f6353c1661a424396d349fcce45c
SHA12fae66900cb1d4861d29484196f6432aa09c8a4f
SHA2569a1dc4ecaf4c3de5faea8189f9e0e8f9b2aaede46c813c9b032262cbcf3fbce4
SHA5122c501a75a21b95bde649494723a73c89b04ec658d9cdb7eafab6025fc7e56740643089b56ae75a9eb5bd902683115f0ad04ca992fb05bfc4aad4b84def8b1aaf
-
Filesize
2.0MB
MD5a36ddc80c476b05d8d778284f0bd27f0
SHA17daa3293ff59c8e1a7f864a807b8c9c19559e9ce
SHA256aaf34ae909036d027a30408a444caae86bae12464d3d5097ee225fccbb507e69
SHA5128395f60acbd29f9bb88890b1659230490e33c824c976c37ecfc22a9d77744dfa0caccb4421811f923d0c3de020325326c96e54a09adc5e6dadd34b514334c7de
-
Filesize
558KB
MD55d885270e4bfd5a60073cdb7beb9dfce
SHA16d90eff4fbb71f4b37678e65788fe03f2ba3c34a
SHA256c4c959c8cbb9a8b1eb3f0f2c9a455eff64864145b3f119f1819a588064a685c7
SHA5120e9d7118352cd378eee916a623d39dcbb3881f0805be5f0e8af13a00f4db1d85ba56cee323a83ba57bef509150aabf2ed4fdf581c407448129861a926b25e642
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
80KB
MD5db2f46a1cf4a96a61e60ff014d906c2c
SHA1a7a34b4e29dff2d9efd4154c9006a1022b838cfc
SHA2562eefc30d8f87793f8997c3a85aba1830cfd75ae559f2e53214c7587496815d88
SHA512a4c00bd190c98e7f711dc61a52cf161d6fba9dfb52abf36efcf190bdd1e6f57611978bd3a4fa2eaddbd99300622149639dbfddb0c8b51b13e9c66383f0501def
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
Filesize
759KB
MD5e5fdd88d3a85d2ef9d144388b25f0dea
SHA1af4c476dccea5cd4f8e21e01e554706aaa37cb7e
SHA2564c9ffff6ecd2b3e0ed11c288e64505e476d1b56d08a7f15cf5bd0b691071d98b
SHA512e79b2e4269fecf0a571013948ea65a830b73d6d28032ac07631498d19cdb94641edeb05d404981f775f7e932972bd9ffd42879ee1e7e2f44135df4abe83ff058
-
Filesize
1.8MB
MD5cfde6a803e4e9e3748718189a8299ac3
SHA10379f8cf3c7c3d7b6fb7caa88de1a0c6d9ff646c
SHA256398bc99924cc885cc230cd11ce6209289236072ca0a46f25926c1cee849e4019
SHA512f6d75e9a2f45f82e04307b10ec6e1a7f0fe3e60faefdc68b471e0c308ca160b84eade39e9451850833311703cde9e36d3bb66ee514a4849fb86ab63e54acd112
-
Filesize
781KB
MD5a31593551b80485ef996fac5e1e69654
SHA19dd3db45f2f602563d54d244bda0742f3c0294a3
SHA25685b8de9f97883bde0b63751abe6ad0b141d297ff6c7f5e16e0460bb70755c785
SHA51267da4e26b8cf8abb173236964c98f15fdfa02afd1ee4da361d0ccf462c1b542a501a34da749da797f9a951e8b7e65709d11c668ec9abce181b0f6bf0a022d797
-
Filesize
50KB
MD53b2eded08fbc264f9c6c740e059814a9
SHA1d84ef1567e24a60122aae892d1bb111aa1b247d6
SHA256e41bc99fb59f229d5454b3d5ee20360e62f45d9e6a4c7bb5f076bb7168fbafc6
SHA512e224176b39e5c7086d4068924839e17930bf78e4fdd1d03d63ab554236868a45b0a1bbd50b490edde25ec1dc63b9b9d89aa9d6abea569ab27b04b42944e39fff
-
Filesize
85KB
MD5d504e0ba59c1af50564c80a17dc1922a
SHA10b02b2bc45a37e36467ca8b6a37dedc62096f966
SHA256e8758a222a16b25a4b75de8f9f38ed8af4d22d4d64c9285e119d3f1d6e38237d
SHA512b89d1786b572416436e4d08ccb6ad687b619aeadb33b01764c44f5fa01caef1e2e2f25e008b533a04393324a3470630bbe12fdcdf222539b17157ec47b4a087a
-
Filesize
26KB
MD50cd62aca7044392e0b9947145c8c55ef
SHA12959c56c17e1281b15303a069d0829bdd357a7fa
SHA256806b34236e0945ca32786fe95d229ebb37f348d555ca7a8e11764e3d98c2baa2
SHA5127cae38668c8f7b1ec3742a000ec31aea5eba9437e276773041f6d1a204a9c7fa618f33eb8763d4d47dfdda9a2539814301aa4706cc6b041ee378cf69ec371367
-
Filesize
91KB
MD54f154b022c8acc7bec640a8424cf8fc4
SHA1a5968e98c0920b2bb43fb37ec7323d853c10ffb9
SHA256520c155e945a480ebcfcd5916ab6ce94a5c46174fa931758667c02ce52e439d8
SHA5122384c0bca724fcf59f715225e667789133b3db1273debbd0bea5425643c42c24d6cb5908acb2ff6db9c875d96f866a7ad8dceca82a410371f8d14a20072d1891