Analysis
-
max time kernel
140s -
max time network
130s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-03-2024 09:32
Static task
static1
Behavioral task
behavioral1
Sample
acaf99af97488b025e4d555958491f3061c3ba06d708354499652da553e57872.exe
Resource
win10v2004-20240226-en
General
-
Target
acaf99af97488b025e4d555958491f3061c3ba06d708354499652da553e57872.exe
-
Size
1.8MB
-
MD5
246282ec7bd39eb302e867ad6525549c
-
SHA1
79b51d2097dbd696a51678675e8b7882cf4f8cb9
-
SHA256
acaf99af97488b025e4d555958491f3061c3ba06d708354499652da553e57872
-
SHA512
ca94d37b642c8979ebdf3d33d17f7872c083e3ce6696e2ec1b6bca50f4655dd4a1d1ae4c13252c8babc848bd22a32cf0d32be14c23e99f4a1c0f428431b7fc0f
-
SSDEEP
49152:GNhqszjALfGIV7ZmHr2D2Uhsoq3Y8IhQ6+u/aZ:GNhqIjEfGIVo82UhsoqTl6R/
Malware Config
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
acaf99af97488b025e4d555958491f3061c3ba06d708354499652da553e57872.exeexplorgu.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ acaf99af97488b025e4d555958491f3061c3ba06d708354499652da553e57872.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 6 1800 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
acaf99af97488b025e4d555958491f3061c3ba06d708354499652da553e57872.exeexplorgu.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion acaf99af97488b025e4d555958491f3061c3ba06d708354499652da553e57872.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion acaf99af97488b025e4d555958491f3061c3ba06d708354499652da553e57872.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe -
Executes dropped EXE 1 IoCs
Processes:
explorgu.exepid process 4524 explorgu.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
explorgu.exeacaf99af97488b025e4d555958491f3061c3ba06d708354499652da553e57872.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000\Software\Wine acaf99af97488b025e4d555958491f3061c3ba06d708354499652da553e57872.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1800 rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
acaf99af97488b025e4d555958491f3061c3ba06d708354499652da553e57872.exeexplorgu.exepid process 4020 acaf99af97488b025e4d555958491f3061c3ba06d708354499652da553e57872.exe 4524 explorgu.exe -
Drops file in Windows directory 1 IoCs
Processes:
acaf99af97488b025e4d555958491f3061c3ba06d708354499652da553e57872.exedescription ioc process File created C:\Windows\Tasks\explorgu.job acaf99af97488b025e4d555958491f3061c3ba06d708354499652da553e57872.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
acaf99af97488b025e4d555958491f3061c3ba06d708354499652da553e57872.exeexplorgu.exepid process 4020 acaf99af97488b025e4d555958491f3061c3ba06d708354499652da553e57872.exe 4020 acaf99af97488b025e4d555958491f3061c3ba06d708354499652da553e57872.exe 4524 explorgu.exe 4524 explorgu.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
explorgu.exerundll32.exedescription pid process target process PID 4524 wrote to memory of 3372 4524 explorgu.exe rundll32.exe PID 4524 wrote to memory of 3372 4524 explorgu.exe rundll32.exe PID 4524 wrote to memory of 3372 4524 explorgu.exe rundll32.exe PID 3372 wrote to memory of 900 3372 rundll32.exe rundll32.exe PID 3372 wrote to memory of 900 3372 rundll32.exe rundll32.exe PID 4524 wrote to memory of 1800 4524 explorgu.exe rundll32.exe PID 4524 wrote to memory of 1800 4524 explorgu.exe rundll32.exe PID 4524 wrote to memory of 1800 4524 explorgu.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\acaf99af97488b025e4d555958491f3061c3ba06d708354499652da553e57872.exe"C:\Users\Admin\AppData\Local\Temp\acaf99af97488b025e4d555958491f3061c3ba06d708354499652da553e57872.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4020
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵PID:900
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5246282ec7bd39eb302e867ad6525549c
SHA179b51d2097dbd696a51678675e8b7882cf4f8cb9
SHA256acaf99af97488b025e4d555958491f3061c3ba06d708354499652da553e57872
SHA512ca94d37b642c8979ebdf3d33d17f7872c083e3ce6696e2ec1b6bca50f4655dd4a1d1ae4c13252c8babc848bd22a32cf0d32be14c23e99f4a1c0f428431b7fc0f
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
368KB
MD5c45356126b8245243ae1bf358b54d1bb
SHA1b39e6704e91823fbe995e90f2d546500540de5f4
SHA2564af253b0b981b9f70a52a95c2ad116e43a4fd36942a27c4212f2644b0bccf3e9
SHA512c94086c589e0594e3ddbb5581344cff7785cf39f4120a0a199d0859dc64b94b50511aede3b130927e7ba54a85c4c62a1c6fdabb12f257242d781fef1f6e24b7b