Analysis
-
max time kernel
294s -
max time network
265s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
21-03-2024 22:31
Static task
static1
Behavioral task
behavioral1
Sample
65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exe
Resource
win7-20240319-en
General
-
Target
65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exe
-
Size
1.8MB
-
MD5
6032f26680b360aecab90f5dea7c80c7
-
SHA1
39ad0ddb19db17cf1f1b0d4528e730e78a0e723c
-
SHA256
65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f
-
SHA512
8aa6be3becad1b99fa0a8fa9a9ea393e8a992070faf60632386c841762a2694f67f57c38e8e087d980c97db8f01c8562df2651d060652756fdcf728d1353a09b
-
SSDEEP
49152:EOFJsSdWT5Facn3M2W282Q32htHMFO2FK+HmJr:f5di5Faccl2VQ3XFO2F1H
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
amadey
4.18
http://193.233.132.56
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
Processes:
explorha.exe909d70d29a.exe65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 909d70d29a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exe -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 7 1680 rundll32.exe 9 2252 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
909d70d29a.exe65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exeexplorha.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 909d70d29a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 909d70d29a.exe -
Executes dropped EXE 3 IoCs
Processes:
explorha.exe909d70d29a.exeexplorha.exepid process 2720 explorha.exe 1476 909d70d29a.exe 2028 explorha.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exeexplorha.exe909d70d29a.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Wine 65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exe Key opened \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Wine 909d70d29a.exe -
Loads dropped DLL 15 IoCs
Processes:
65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exeexplorha.exerundll32.exerundll32.exerundll32.exepid process 2080 65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exe 2720 explorha.exe 2720 explorha.exe 736 rundll32.exe 736 rundll32.exe 736 rundll32.exe 736 rundll32.exe 1680 rundll32.exe 1680 rundll32.exe 1680 rundll32.exe 1680 rundll32.exe 2252 rundll32.exe 2252 rundll32.exe 2252 rundll32.exe 2252 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explorha.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Run\909d70d29a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000022001\\909d70d29a.exe" explorha.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exeexplorha.exepid process 2080 65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exe 2720 explorha.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
explorha.exedescription pid process target process PID 2720 set thread context of 2028 2720 explorha.exe explorha.exe -
Drops file in Windows directory 1 IoCs
Processes:
65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exedescription ioc process File created C:\Windows\Tasks\explorha.job 65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exeexplorha.exerundll32.exepowershell.exepid process 2080 65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exe 2720 explorha.exe 1680 rundll32.exe 1680 rundll32.exe 1680 rundll32.exe 1680 rundll32.exe 1680 rundll32.exe 2268 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2268 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exepid process 2080 65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exeexplorha.exerundll32.exerundll32.exedescription pid process target process PID 2080 wrote to memory of 2720 2080 65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exe explorha.exe PID 2080 wrote to memory of 2720 2080 65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exe explorha.exe PID 2080 wrote to memory of 2720 2080 65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exe explorha.exe PID 2080 wrote to memory of 2720 2080 65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exe explorha.exe PID 2720 wrote to memory of 1476 2720 explorha.exe 909d70d29a.exe PID 2720 wrote to memory of 1476 2720 explorha.exe 909d70d29a.exe PID 2720 wrote to memory of 1476 2720 explorha.exe 909d70d29a.exe PID 2720 wrote to memory of 1476 2720 explorha.exe 909d70d29a.exe PID 2720 wrote to memory of 2028 2720 explorha.exe explorha.exe PID 2720 wrote to memory of 2028 2720 explorha.exe explorha.exe PID 2720 wrote to memory of 2028 2720 explorha.exe explorha.exe PID 2720 wrote to memory of 2028 2720 explorha.exe explorha.exe PID 2720 wrote to memory of 2028 2720 explorha.exe explorha.exe PID 2720 wrote to memory of 2028 2720 explorha.exe explorha.exe PID 2720 wrote to memory of 2028 2720 explorha.exe explorha.exe PID 2720 wrote to memory of 2028 2720 explorha.exe explorha.exe PID 2720 wrote to memory of 2028 2720 explorha.exe explorha.exe PID 2720 wrote to memory of 736 2720 explorha.exe rundll32.exe PID 2720 wrote to memory of 736 2720 explorha.exe rundll32.exe PID 2720 wrote to memory of 736 2720 explorha.exe rundll32.exe PID 2720 wrote to memory of 736 2720 explorha.exe rundll32.exe PID 2720 wrote to memory of 736 2720 explorha.exe rundll32.exe PID 2720 wrote to memory of 736 2720 explorha.exe rundll32.exe PID 2720 wrote to memory of 736 2720 explorha.exe rundll32.exe PID 736 wrote to memory of 1680 736 rundll32.exe rundll32.exe PID 736 wrote to memory of 1680 736 rundll32.exe rundll32.exe PID 736 wrote to memory of 1680 736 rundll32.exe rundll32.exe PID 736 wrote to memory of 1680 736 rundll32.exe rundll32.exe PID 2720 wrote to memory of 2028 2720 explorha.exe explorha.exe PID 2720 wrote to memory of 2028 2720 explorha.exe explorha.exe PID 1680 wrote to memory of 2832 1680 rundll32.exe netsh.exe PID 1680 wrote to memory of 2832 1680 rundll32.exe netsh.exe PID 1680 wrote to memory of 2832 1680 rundll32.exe netsh.exe PID 1680 wrote to memory of 2268 1680 rundll32.exe powershell.exe PID 1680 wrote to memory of 2268 1680 rundll32.exe powershell.exe PID 1680 wrote to memory of 2268 1680 rundll32.exe powershell.exe PID 2720 wrote to memory of 2252 2720 explorha.exe rundll32.exe PID 2720 wrote to memory of 2252 2720 explorha.exe rundll32.exe PID 2720 wrote to memory of 2252 2720 explorha.exe rundll32.exe PID 2720 wrote to memory of 2252 2720 explorha.exe rundll32.exe PID 2720 wrote to memory of 2252 2720 explorha.exe rundll32.exe PID 2720 wrote to memory of 2252 2720 explorha.exe rundll32.exe PID 2720 wrote to memory of 2252 2720 explorha.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exe"C:\Users\Admin\AppData\Local\Temp\65243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\1000022001\909d70d29a.exe"C:\Users\Admin\AppData\Local\Temp\1000022001\909d70d29a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:1476
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"3⤵
- Executes dropped EXE
PID:2028
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:2832
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\610426812287_Desktop.zip' -CompressionLevel Optimal5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2252
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD59bbe41e498c079b3747005382776eb95
SHA15d5279aaeeb7007024391807eb3e0e3de9d0908a
SHA25680206d1343ed71fd56ee3f9d016c370302531024646a3df2368179f824572f3e
SHA5122d17f8a0ae1eb8c1f34f8e663372d296e04e1cb993c20367331cadbe078684bf44cacda2025fba5701ada6510e713f1d2a661f20e03d85fee5c24393d34807d9
-
Filesize
1.8MB
MD56032f26680b360aecab90f5dea7c80c7
SHA139ad0ddb19db17cf1f1b0d4528e730e78a0e723c
SHA25665243de91e4e2569751206b88aa65663fdcf0fee0d9358a74230a754f1fe4f0f
SHA5128aa6be3becad1b99fa0a8fa9a9ea393e8a992070faf60632386c841762a2694f67f57c38e8e087d980c97db8f01c8562df2651d060652756fdcf728d1353a09b
-
Filesize
409KB
MD548384ba6025f9f1547e4c750cdf0677d
SHA11870cca983db89ac5384fdf5555584754142ec99
SHA256c334bbb41d632b241f9a9d9f66d0ceef3fa85283ee4f0e333a2010756dc33f4a
SHA51231f71d96739ca3d2b9694e89e36a9af64fedd9a1fe56446fc30086692fd2e138cd015a16a836be4ddb230e2b909d55096d00c87050ff4be7d872498c1959f5e7
-
Filesize
1.7MB
MD5e52cd1a9837757a44ac568edc5f47bf3
SHA1b14293f147c4240bba1ec594d8bb6ce551394aa1
SHA256a829d94ce874193d647ac582c2cadc6a370d87751064d0f27e45cefff8c477ed
SHA51278d54b7081853289807b46a63d4e610a51ca405d85f9014bf075951cc6d7d725a972cc70373dc1bf0ba6329522f4f7e3535952faca9fee96afa234b1cbd69ddd
-
Filesize
2.5MB
MD543c1fb415a7a2b626c30bdc09f34d3af
SHA1524d92eb136d7ab5653ff9d582c939fb3d9c5da3
SHA25689d1f046a67fb57ac719ef3817f809a35f61596e15f4f38941e73320d4cb1719
SHA512ac0c9832da15676441617d49981e3d292ee73e9864c92255cad3596d98cf2112df14373f418360c16a98b19c16d11f5b032695e46874cfd24b368d48d175a95e
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
Filesize
1.6MB
MD5478579357f8a61cb752e5001978545b0
SHA1aafd8c152b0ce49e03d5e3afdbcbfb03772268b1
SHA2569da56afef53606eb2c73b26140af9f47eb5b31a56c80121f245f5638f4c1d173
SHA512b7002a27f63ab842ee14ca1803832b93f7d76831bfc67cd1f84ad0f22bf1324dfb756460253248997124c574a1bfa976e6896111d8cc92471cd8ca1a1364f665
-
Filesize
2.7MB
MD5bb466407a6da6a9d14184b0303ad292d
SHA1a15f7b1b3d5f3f9708cca41f6f1f241e5ff6a608
SHA256b672cb0be7be4734482308054b2527b7c51ed8c8e44c6d899c323b94ef180d3f
SHA512504d1988fbd176d95faec53d8e6bc0b3150035094b28075e94ba45b99e41ae6705348e3e71038f715dca2ded67ff11fad8cd5fe12b2b9eaffb0b771b878af0ab
-
Filesize
879KB
MD5c42730f64451533307d5232d73f0439e
SHA1de9ebd20f4dfa67db54428fad1568b05bb0928e9
SHA2566da02102054d6ba9c218c6c020a30e44c69cc604a18cec709ace299896bfe8dd
SHA5124118da2b3b7d69dacbb338c16903c5fdb9b1ea1799bf1af3d5280f342465a79d4308c1dbfdad9bcc61066312203a1a4149ca3a3784ced9cceea2b09e517f80d6
-
Filesize
998KB
MD5f3f8e21ba762179b492b81004f4ba786
SHA160696e10dc053529c8d555c81c5f18ad148c8b3f
SHA2566cd9aedbf77f4e48a5500912c7505dbcd53277d745e17ef0950f1c86f98b6056
SHA51271a4caa7ad7152fafb23837b8685e15b7068c8f61e65e4cf8009d5dc26105fa19126db53a2abd7f340840a0945b414e27a1e7994451ab3700fa038dc79b82f07
-
Filesize
1.1MB
MD543b736b8713664dbcf31d47136074c66
SHA1606739011994a15818cd8b5dc4df398f801dd91e
SHA25689b2111abedcf8a20c0e42f3717fcf4bae9a750e8481709e98f4936df592f07a
SHA5126d2135571aee0a56cb1b1bf5033f85c07279528969f17b4e00d19574a57c42e9b6c4e6c57e4f515a80407c310cd1d52c0af35ac1ad9048f8dc4a0ff4026e86fd
-
Filesize
730KB
MD5fafb1bbc6962e4110f9407dc81c827ae
SHA1db9fc8f2c0f8f3e02f6e4cf30fe4a2bc810765b1
SHA2569b9de6431405431484f1cc278e696b6581057752f06282e5509febf19f879af5
SHA512b5b68bb57f58fa08a32f103e33b3afaee8fb8ed6f31a890e4960b62e2c9fe65cdd29a2bf99832bc5d98155ec03f55983d9d688357da5daf6cb6164525339bc79
-
Filesize
814KB
MD5432a03a0a6e03a25e8660d612802ac62
SHA1cc4a7ffe08bf376e4d8e1485ae4fa0f0cbbe7170
SHA256c094df8c00b62247baf1269cc635383bd3395d4ac22e63acb5884003cbb187fd
SHA512272097fad04822fa1a06b8d1b33e926fdbf03ff420142790e1383f978da0c8515992573c69b4b1206338765a6d296cf2787387c2b03dd71066335098dae467ee
-
Filesize
881KB
MD53e68e07ed79468ad7022a6554e378ab9
SHA1644979bd78b141c686308bd43c8b1a4687a003b1
SHA256ca25b1833612a5e155ecb7bf340895b056ff711867c91e59a22f726f7aa9e1a6
SHA51218f05c19f074ba835c0e9a37e5f3d1cdbb4d78998f1cd947058b93582744b7bc92dfaa28a1cd6938221dd1c9df369e405ad17a210653c6e4c5def7e822e98a37
-
Filesize
935KB
MD57ed1fd8b7f567daad2698eaea188973f
SHA19dc19b7836d03ce2d7258b239f06cab7c8bf0cce
SHA2568b986409bb6a2700fc6ac3c107ab4f88e5f85333d19bf5e5d31d79ea18afd6ce
SHA51238a4945d2eed8d6ecf09d76f1fa5173f45103e28c4fcd3512dd9f96401fa0ab999a5322c7d79312f04e545d4181757f72bed05b4976a90cd7722565a32789518