Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-03-2024 08:31
Static task
static1
Behavioral task
behavioral1
Sample
22e4c9489e8ea70cf049a923e4c5684ef452c06478330e92c5aff915c59edd21.exe
Resource
win10v2004-20240226-en
General
-
Target
22e4c9489e8ea70cf049a923e4c5684ef452c06478330e92c5aff915c59edd21.exe
-
Size
1.8MB
-
MD5
9f1131b52d56f4674109fb3024622484
-
SHA1
f52d12d6b2cb20faa8efb2b907acc00ea17b10bb
-
SHA256
22e4c9489e8ea70cf049a923e4c5684ef452c06478330e92c5aff915c59edd21
-
SHA512
3c33640e15fc45006d3ece9282a49f0c7f279062f4317deabacb381dc7e0ee8215faf8b93d93b7c4ad01bd6ed9bb6e0a735d0caff77c44684a4a246e4540d825
-
SSDEEP
24576:9DtaCLTFYHoOlfbWlScp/D9oO4h/+ay3uIThqNQpLWrzGizkqJrWko3QUKqxcL4i:9DtaCnFq5ZXhi+vQiNriY4Y8mUob
Malware Config
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
22e4c9489e8ea70cf049a923e4c5684ef452c06478330e92c5aff915c59edd21.exeexplorgu.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 22e4c9489e8ea70cf049a923e4c5684ef452c06478330e92c5aff915c59edd21.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 188 1736 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorgu.exe22e4c9489e8ea70cf049a923e4c5684ef452c06478330e92c5aff915c59edd21.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 22e4c9489e8ea70cf049a923e4c5684ef452c06478330e92c5aff915c59edd21.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 22e4c9489e8ea70cf049a923e4c5684ef452c06478330e92c5aff915c59edd21.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
explorgu.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation explorgu.exe -
Executes dropped EXE 1 IoCs
Processes:
explorgu.exepid process 2628 explorgu.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
22e4c9489e8ea70cf049a923e4c5684ef452c06478330e92c5aff915c59edd21.exeexplorgu.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Software\Wine 22e4c9489e8ea70cf049a923e4c5684ef452c06478330e92c5aff915c59edd21.exe Key opened \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Software\Wine explorgu.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1736 rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
22e4c9489e8ea70cf049a923e4c5684ef452c06478330e92c5aff915c59edd21.exeexplorgu.exepid process 332 22e4c9489e8ea70cf049a923e4c5684ef452c06478330e92c5aff915c59edd21.exe 2628 explorgu.exe -
Drops file in Windows directory 1 IoCs
Processes:
22e4c9489e8ea70cf049a923e4c5684ef452c06478330e92c5aff915c59edd21.exedescription ioc process File created C:\Windows\Tasks\explorgu.job 22e4c9489e8ea70cf049a923e4c5684ef452c06478330e92c5aff915c59edd21.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
22e4c9489e8ea70cf049a923e4c5684ef452c06478330e92c5aff915c59edd21.exeexplorgu.exepid process 332 22e4c9489e8ea70cf049a923e4c5684ef452c06478330e92c5aff915c59edd21.exe 332 22e4c9489e8ea70cf049a923e4c5684ef452c06478330e92c5aff915c59edd21.exe 2628 explorgu.exe 2628 explorgu.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeManageVolumePrivilege 4860 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
22e4c9489e8ea70cf049a923e4c5684ef452c06478330e92c5aff915c59edd21.exepid process 332 22e4c9489e8ea70cf049a923e4c5684ef452c06478330e92c5aff915c59edd21.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
explorgu.exerundll32.exedescription pid process target process PID 2628 wrote to memory of 2324 2628 explorgu.exe rundll32.exe PID 2628 wrote to memory of 2324 2628 explorgu.exe rundll32.exe PID 2628 wrote to memory of 2324 2628 explorgu.exe rundll32.exe PID 2324 wrote to memory of 5004 2324 rundll32.exe rundll32.exe PID 2324 wrote to memory of 5004 2324 rundll32.exe rundll32.exe PID 2628 wrote to memory of 1736 2628 explorgu.exe rundll32.exe PID 2628 wrote to memory of 1736 2628 explorgu.exe rundll32.exe PID 2628 wrote to memory of 1736 2628 explorgu.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\22e4c9489e8ea70cf049a923e4c5684ef452c06478330e92c5aff915c59edd21.exe"C:\Users\Admin\AppData\Local\Temp\22e4c9489e8ea70cf049a923e4c5684ef452c06478330e92c5aff915c59edd21.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:332
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵PID:5004
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1736
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3172
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD59f1131b52d56f4674109fb3024622484
SHA1f52d12d6b2cb20faa8efb2b907acc00ea17b10bb
SHA25622e4c9489e8ea70cf049a923e4c5684ef452c06478330e92c5aff915c59edd21
SHA5123c33640e15fc45006d3ece9282a49f0c7f279062f4317deabacb381dc7e0ee8215faf8b93d93b7c4ad01bd6ed9bb6e0a735d0caff77c44684a4a246e4540d825
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
336KB
MD57423014bd33d1d590c750e4ea4e38dd3
SHA1691940ffb1b6ec4b8484ae19a27aa5c8f552504e
SHA2565c775d12142d92f45770aa4a14ac50cdf352690a62beaba90ca58e7cb4dbbf10
SHA512d8bac2b825b332a41762421eca6a69e4bea5c5c5984877513c3a5bd28c8ed2eb65403d194e8bdac8b6cf43666fbbb8f0ca51f2b970693c8c2388a8841c661be1