Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 05:59
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
General
-
Target
tmp.exe
-
Size
1.9MB
-
MD5
3754420df3c482019cd40c7796daafc7
-
SHA1
e41398638097b43c7bc923fe860826958a0b713d
-
SHA256
b2c50730f7eb0d32be9d21cf1974c0581bf617de03c3f8afb0548bcebf0eccb2
-
SHA512
709a185f2ee077b334a1da62c37bf5fa8dcf6a218e7ab4c79498f7ec3b9a44e9c073e30bb9057f2aac35429367909e7e66f190c5c492dc1c86052502ae99843c
-
SSDEEP
49152:n27wrlvBU7wbExyf3KC3O3oHTpciOL/ik:n+cla0bE0/KCe3sqF
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
amadey
4.18
http://193.233.132.56
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
amadey
4.17
http://193.233.132.167
-
install_dir
4d0ab15804
-
install_file
chrosha.exe
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
Processes:
tmp.exeexplorha.exe426dbf6e31.exeexplorha.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ tmp.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 426dbf6e31.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 7 2904 rundll32.exe 9 896 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorha.exetmp.exeexplorha.exe426dbf6e31.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 426dbf6e31.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 426dbf6e31.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe -
Executes dropped EXE 4 IoCs
Processes:
explorha.exe426dbf6e31.exeexplorha.exelumma21.exepid process 2796 explorha.exe 1388 426dbf6e31.exe 2204 explorha.exe 2524 lumma21.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
tmp.exeexplorha.exe426dbf6e31.exeexplorha.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Wine tmp.exe Key opened \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Wine 426dbf6e31.exe Key opened \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Wine explorha.exe -
Loads dropped DLL 16 IoCs
Processes:
tmp.exeexplorha.exerundll32.exerundll32.exerundll32.exepid process 2180 tmp.exe 2796 explorha.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2764 rundll32.exe 2904 rundll32.exe 2904 rundll32.exe 2904 rundll32.exe 2904 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 2796 explorha.exe 2796 explorha.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explorha.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\426dbf6e31.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000022001\\426dbf6e31.exe" explorha.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
tmp.exeexplorha.exepid process 2180 tmp.exe 2796 explorha.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
explorha.exedescription pid process target process PID 2796 set thread context of 2204 2796 explorha.exe explorha.exe -
Drops file in Windows directory 2 IoCs
Processes:
lumma21.exetmp.exedescription ioc process File created C:\Windows\Tasks\chrosha.job lumma21.exe File created C:\Windows\Tasks\explorha.job tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
tmp.exeexplorha.exerundll32.exepowershell.exepid process 2180 tmp.exe 2796 explorha.exe 2904 rundll32.exe 2904 rundll32.exe 2904 rundll32.exe 2904 rundll32.exe 2904 rundll32.exe 820 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 820 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
tmp.exelumma21.exepid process 2180 tmp.exe 2524 lumma21.exe -
Suspicious use of WriteProcessMemory 49 IoCs
Processes:
tmp.exeexplorha.exerundll32.exerundll32.exedescription pid process target process PID 2180 wrote to memory of 2796 2180 tmp.exe explorha.exe PID 2180 wrote to memory of 2796 2180 tmp.exe explorha.exe PID 2180 wrote to memory of 2796 2180 tmp.exe explorha.exe PID 2180 wrote to memory of 2796 2180 tmp.exe explorha.exe PID 2796 wrote to memory of 1388 2796 explorha.exe 426dbf6e31.exe PID 2796 wrote to memory of 1388 2796 explorha.exe 426dbf6e31.exe PID 2796 wrote to memory of 1388 2796 explorha.exe 426dbf6e31.exe PID 2796 wrote to memory of 1388 2796 explorha.exe 426dbf6e31.exe PID 2796 wrote to memory of 2764 2796 explorha.exe rundll32.exe PID 2796 wrote to memory of 2764 2796 explorha.exe rundll32.exe PID 2796 wrote to memory of 2764 2796 explorha.exe rundll32.exe PID 2796 wrote to memory of 2764 2796 explorha.exe rundll32.exe PID 2796 wrote to memory of 2764 2796 explorha.exe rundll32.exe PID 2796 wrote to memory of 2764 2796 explorha.exe rundll32.exe PID 2796 wrote to memory of 2764 2796 explorha.exe rundll32.exe PID 2764 wrote to memory of 2904 2764 rundll32.exe rundll32.exe PID 2764 wrote to memory of 2904 2764 rundll32.exe rundll32.exe PID 2764 wrote to memory of 2904 2764 rundll32.exe rundll32.exe PID 2764 wrote to memory of 2904 2764 rundll32.exe rundll32.exe PID 2904 wrote to memory of 2200 2904 rundll32.exe netsh.exe PID 2904 wrote to memory of 2200 2904 rundll32.exe netsh.exe PID 2904 wrote to memory of 2200 2904 rundll32.exe netsh.exe PID 2904 wrote to memory of 820 2904 rundll32.exe powershell.exe PID 2904 wrote to memory of 820 2904 rundll32.exe powershell.exe PID 2904 wrote to memory of 820 2904 rundll32.exe powershell.exe PID 2796 wrote to memory of 896 2796 explorha.exe rundll32.exe PID 2796 wrote to memory of 896 2796 explorha.exe rundll32.exe PID 2796 wrote to memory of 896 2796 explorha.exe rundll32.exe PID 2796 wrote to memory of 896 2796 explorha.exe rundll32.exe PID 2796 wrote to memory of 896 2796 explorha.exe rundll32.exe PID 2796 wrote to memory of 896 2796 explorha.exe rundll32.exe PID 2796 wrote to memory of 896 2796 explorha.exe rundll32.exe PID 2796 wrote to memory of 2204 2796 explorha.exe explorha.exe PID 2796 wrote to memory of 2204 2796 explorha.exe explorha.exe PID 2796 wrote to memory of 2204 2796 explorha.exe explorha.exe PID 2796 wrote to memory of 2204 2796 explorha.exe explorha.exe PID 2796 wrote to memory of 2204 2796 explorha.exe explorha.exe PID 2796 wrote to memory of 2204 2796 explorha.exe explorha.exe PID 2796 wrote to memory of 2204 2796 explorha.exe explorha.exe PID 2796 wrote to memory of 2204 2796 explorha.exe explorha.exe PID 2796 wrote to memory of 2204 2796 explorha.exe explorha.exe PID 2796 wrote to memory of 2204 2796 explorha.exe explorha.exe PID 2796 wrote to memory of 2204 2796 explorha.exe explorha.exe PID 2796 wrote to memory of 2204 2796 explorha.exe explorha.exe PID 2796 wrote to memory of 2204 2796 explorha.exe explorha.exe PID 2796 wrote to memory of 2524 2796 explorha.exe lumma21.exe PID 2796 wrote to memory of 2524 2796 explorha.exe lumma21.exe PID 2796 wrote to memory of 2524 2796 explorha.exe lumma21.exe PID 2796 wrote to memory of 2524 2796 explorha.exe lumma21.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\1000022001\426dbf6e31.exe"C:\Users\Admin\AppData\Local\Temp\1000022001\426dbf6e31.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:1388 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:2200
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\787592910372_Desktop.zip' -CompressionLevel Optimal5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:820 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:896 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\1000036001\lumma21.exe"C:\Users\Admin\AppData\Local\Temp\1000036001\lumma21.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:2524
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
896KB
MD5c19520f31c8a9915bad6f32b007b1947
SHA10a69ed96026eff6e786ae0888596d40b82fa3721
SHA25639378a4c86f4c2b996b4e334d4addf8811034db11ae2b3c129536440747ad6a5
SHA5126054ed38746d5ae76491840a7b510cd3871fe2563821a4c6fcd231d6b095c789a25779c7c9e1f8a76c9174d4e32b4e768cc46a206ab7685f458d431144b3741d
-
Filesize
448KB
MD59323900e529c230c1b78c40f54baa343
SHA11e5bddffb8bce604f1f68926ed521cc2fb08158c
SHA256b6aeba610148b97d35a320d67d32455b94282ea78a78be3f6b7c1061ab5fe7fe
SHA5122c3dd9c2110a91103f2b5a8c6c04eb6ba0d0ea77eb9f0f1017d03c2ea848d7f3a838d4fff2c998700753821330e21f61af222be38c0cb1dcb51ec9c710ae05e2
-
Filesize
192KB
MD55b8def38320cd57b8cf6a9943d09c127
SHA1ba7a5d231a07ca8607ece587620bd93fb726bbbf
SHA256004b857fc3742865cb7ba5ee60aced01d852bbc65ac7d00a64643a5097c5a369
SHA512768c920619cacbf28a3ad1065d8e34b7fa25dba22e422c8bb91252bfcdf0b6cc96474798bd29a9df739cfaa7965e735283b6f051fd5abdd5cd0913cb6356e9eb
-
Filesize
1.9MB
MD53754420df3c482019cd40c7796daafc7
SHA1e41398638097b43c7bc923fe860826958a0b713d
SHA256b2c50730f7eb0d32be9d21cf1974c0581bf617de03c3f8afb0548bcebf0eccb2
SHA512709a185f2ee077b334a1da62c37bf5fa8dcf6a218e7ab4c79498f7ec3b9a44e9c073e30bb9057f2aac35429367909e7e66f190c5c492dc1c86052502ae99843c
-
Filesize
3.0MB
MD5d55881f086622bc20fbee8894ba6c8c2
SHA1784eb93766dccfdadb20454e3e2c45d5487a2c46
SHA2568c24e831b99c3e28ae83a9666d873196118ca4487b7a758d8d8ce7692ca5fd90
SHA51258dfdb2f153a81e6b0e6043ab95eb82ef218856005eb508980d2a9731131c76fa4ec0e55063ff4f737882678855cafaaa09b5b66bfb703274d1472ec1725f120
-
Filesize
2.2MB
MD512790c0a37b25057e6965395bd4c67a1
SHA13476aaa0e4d67815a7b296728a21d7691cb9933f
SHA256f4d2d48438d977009ebf19abc1292726302c8b3d5f922a5ae4b7a39f1d46bee2
SHA512bf5a989fbfff440f6908c4b29a83da08e14cd711041990e2eac49478c513cdbec7c417c1ddab5240d8227109e6dab4249968c9789a6e645e8fde3abc8e5d03b9
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
413KB
MD5d467222c3bd563cb72fa49302f80b079
SHA19335e2a36abb8309d8a2075faf78d66b968b2a91
SHA256fedb08b3ec7034a15e9dee7ed4dec1a854fb78e74285e1ee05c90f9e9e4f8b3e
SHA512484b6c427e28193ddb73dd7062e2bfbd132ddc72ce4811bfe08784669de30e4b92bc27140373f62a4ce651401000a3c505188620c43da410bf6b0799a0791fa7
-
Filesize
128KB
MD5cbc929cb470bad50f7b0ede15a7a85d7
SHA1eb3ad1b2b26a743dfda4e1fda671691ef671573a
SHA256c2039d29d82242e1b864560489403811b37e6f478e4570dde0378c51d74a36e0
SHA512b500b3d8c52bff8b3cccf2f658b567d35f0a5bad0f713b099e34320bd282f7f6e4f79dfdfbbb5609b95abacdb8eced76e7798428f3239de98a3ccb409273ac35
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
37KB
MD5769aa1af4b6342994a532a2b943920e8
SHA10c745832534ac1d77cec88ad1168baa052b1f4f5
SHA2564f945b854c68a3bc08004ee5f9948cd20cdec715e70f905d1c2e37954c3e2337
SHA512fed3e7bf20176bba21db40831f03b40ccdafc06d7212488ce00f3ad1b7da44e0f82c8c8a028a77df8e925aeedcd45cc22e82ae0b7d91665884a92fb53837c9ee
-
Filesize
1.2MB
MD5a16bf86ab9c37035e9898a7ff5db6bfb
SHA1d210e37e16906d8523407ec829bbc79a96b107fb
SHA256edc27ccdd66864b181a48b749e022f9970cb6dd282c238b05bfa07751cc39304
SHA512be233363c16a66ed2e7181a09c59124168d6b5d772b6777b6281bdfd942427a813c039ab9d0e6514f2e9f8ca72d81cc25facb55289576ec4c8fe69ac90106605
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444