Analysis
-
max time kernel
29s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240215-es -
resource tags
arch:x64arch:x86image:win7-20240215-eslocale:es-esos:windows7-x64systemwindows -
submitted
22-03-2024 23:33
Static task
static1
Behavioral task
behavioral1
Sample
0c749d3ceaaa39497f29bf7917c0c5a2f767776ca055492162ce9153bd21e4dd.exe
Resource
win7-20240215-es
General
-
Target
0c749d3ceaaa39497f29bf7917c0c5a2f767776ca055492162ce9153bd21e4dd.exe
-
Size
1.8MB
-
MD5
f019ca1aef4fffd879a999f79ef7c473
-
SHA1
b0d2632ec5806652789fb02b10486829e7af2b4c
-
SHA256
0c749d3ceaaa39497f29bf7917c0c5a2f767776ca055492162ce9153bd21e4dd
-
SHA512
e93abeebe740edccca6b69121eae1ad13bbf0fe117153408564257d940945605673b6eb9bc480a9f3634c88c2f98c69aca2f5c1ce26bbf43133ce870c68bd6f4
-
SSDEEP
24576:5kLETDQgD35k/p3OD0k8jDj2KBfdeXV0B2LO0NnKXrhUMXkQh8iImNxwT3x7ADLn:G0Qg2U0kMj2uMoGO0oXj38ilxJL
Malware Config
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
0c749d3ceaaa39497f29bf7917c0c5a2f767776ca055492162ce9153bd21e4dd.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0c749d3ceaaa39497f29bf7917c0c5a2f767776ca055492162ce9153bd21e4dd.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
0c749d3ceaaa39497f29bf7917c0c5a2f767776ca055492162ce9153bd21e4dd.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0c749d3ceaaa39497f29bf7917c0c5a2f767776ca055492162ce9153bd21e4dd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0c749d3ceaaa39497f29bf7917c0c5a2f767776ca055492162ce9153bd21e4dd.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
0c749d3ceaaa39497f29bf7917c0c5a2f767776ca055492162ce9153bd21e4dd.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Wine 0c749d3ceaaa39497f29bf7917c0c5a2f767776ca055492162ce9153bd21e4dd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
0c749d3ceaaa39497f29bf7917c0c5a2f767776ca055492162ce9153bd21e4dd.exepid process 2072 0c749d3ceaaa39497f29bf7917c0c5a2f767776ca055492162ce9153bd21e4dd.exe -
Drops file in Windows directory 1 IoCs
Processes:
0c749d3ceaaa39497f29bf7917c0c5a2f767776ca055492162ce9153bd21e4dd.exedescription ioc process File created C:\Windows\Tasks\explorgu.job 0c749d3ceaaa39497f29bf7917c0c5a2f767776ca055492162ce9153bd21e4dd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
notepad.exepid process 2544 notepad.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
0c749d3ceaaa39497f29bf7917c0c5a2f767776ca055492162ce9153bd21e4dd.exepid process 2072 0c749d3ceaaa39497f29bf7917c0c5a2f767776ca055492162ce9153bd21e4dd.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
0c749d3ceaaa39497f29bf7917c0c5a2f767776ca055492162ce9153bd21e4dd.exepid process 2072 0c749d3ceaaa39497f29bf7917c0c5a2f767776ca055492162ce9153bd21e4dd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c749d3ceaaa39497f29bf7917c0c5a2f767776ca055492162ce9153bd21e4dd.exe"C:\Users\Admin\AppData\Local\Temp\0c749d3ceaaa39497f29bf7917c0c5a2f767776ca055492162ce9153bd21e4dd.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2072
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" "C:\Users\Admin\Desktop\RequestDisconnect.ps1"1⤵
- Opens file in notepad (likely ransom note)
PID:2544