Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 20:01
Static task
static1
Behavioral task
behavioral1
Sample
fd991242964f1d851fc1277658d40a357c87e2032d813ec86ad3503fd40d7db3.exe
Resource
win10v2004-20240412-en
General
-
Target
fd991242964f1d851fc1277658d40a357c87e2032d813ec86ad3503fd40d7db3.exe
-
Size
1.8MB
-
MD5
4f924d31ec92af6ef6250e7723f098e0
-
SHA1
f3c6119a04b8266d3b13363f5bb82c4190a5f626
-
SHA256
fd991242964f1d851fc1277658d40a357c87e2032d813ec86ad3503fd40d7db3
-
SHA512
ec27b19fff72acec46a49c6c3043c1d8ea34c8b00891656bafab46ff2ea6aad7c4a4c7aeb8f592e796106a977ef48939826512ccc6c227e7fc5eca79aa9faa63
-
SSDEEP
24576:Uj4nOe4ELs64tQaGkM72fJyFzdnhxln+XoTwzZfy4iwRqf1atqzfry7q0D3VB4:U8Pps6cdM72fJwhx5+nzVysmaqzjURB
Malware Config
Extracted
amadey
4.17
http://193.233.132.167
-
install_dir
4d0ab15804
-
install_file
chrosha.exe
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
Extracted
xehook
https://unotree.ru/
https://aiwhcpoaw.ru/
Signatures
-
Detect Xehook Payload 3 IoCs
resource yara_rule behavioral1/memory/2444-43-0x0000000000B10000-0x0000000000B58000-memory.dmp family_xehook behavioral1/memory/1040-44-0x0000000000400000-0x000000000041C000-memory.dmp family_xehook behavioral1/memory/2444-45-0x0000000000B10000-0x0000000000B58000-memory.dmp family_xehook -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ chrosha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fd991242964f1d851fc1277658d40a357c87e2032d813ec86ad3503fd40d7db3.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 118 2420 rundll32.exe 122 2532 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chrosha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chrosha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fd991242964f1d851fc1277658d40a357c87e2032d813ec86ad3503fd40d7db3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fd991242964f1d851fc1277658d40a357c87e2032d813ec86ad3503fd40d7db3.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation chrosha.exe Key value queried \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Executes dropped EXE 2 IoCs
pid Process 116 chrosha.exe 2444 dirtquire.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Software\Wine fd991242964f1d851fc1277658d40a357c87e2032d813ec86ad3503fd40d7db3.exe Key opened \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\Software\Wine chrosha.exe -
Loads dropped DLL 3 IoCs
pid Process 3164 rundll32.exe 2420 rundll32.exe 2532 rundll32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 88 ip-api.com -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2844 fd991242964f1d851fc1277658d40a357c87e2032d813ec86ad3503fd40d7db3.exe 116 chrosha.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2444 set thread context of 1040 2444 dirtquire.exe 108 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\chrosha.job fd991242964f1d851fc1277658d40a357c87e2032d813ec86ad3503fd40d7db3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2844 fd991242964f1d851fc1277658d40a357c87e2032d813ec86ad3503fd40d7db3.exe 2844 fd991242964f1d851fc1277658d40a357c87e2032d813ec86ad3503fd40d7db3.exe 116 chrosha.exe 116 chrosha.exe 1040 RegAsm.exe 1040 RegAsm.exe 2768 powershell.exe 2768 powershell.exe 2768 powershell.exe 2420 rundll32.exe 2420 rundll32.exe 2420 rundll32.exe 2420 rundll32.exe 2420 rundll32.exe 2420 rundll32.exe 2420 rundll32.exe 2420 rundll32.exe 2420 rundll32.exe 2420 rundll32.exe 4960 powershell.exe 4960 powershell.exe 4960 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1040 RegAsm.exe Token: SeDebugPrivilege 2768 powershell.exe Token: SeDebugPrivilege 4960 powershell.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 116 wrote to memory of 2444 116 chrosha.exe 105 PID 116 wrote to memory of 2444 116 chrosha.exe 105 PID 116 wrote to memory of 2444 116 chrosha.exe 105 PID 2444 wrote to memory of 1380 2444 dirtquire.exe 107 PID 2444 wrote to memory of 1380 2444 dirtquire.exe 107 PID 2444 wrote to memory of 1380 2444 dirtquire.exe 107 PID 2444 wrote to memory of 1040 2444 dirtquire.exe 108 PID 2444 wrote to memory of 1040 2444 dirtquire.exe 108 PID 2444 wrote to memory of 1040 2444 dirtquire.exe 108 PID 2444 wrote to memory of 1040 2444 dirtquire.exe 108 PID 2444 wrote to memory of 1040 2444 dirtquire.exe 108 PID 2444 wrote to memory of 1040 2444 dirtquire.exe 108 PID 2444 wrote to memory of 1040 2444 dirtquire.exe 108 PID 2444 wrote to memory of 1040 2444 dirtquire.exe 108 PID 1040 wrote to memory of 2768 1040 RegAsm.exe 109 PID 1040 wrote to memory of 2768 1040 RegAsm.exe 109 PID 1040 wrote to memory of 2768 1040 RegAsm.exe 109 PID 116 wrote to memory of 3164 116 chrosha.exe 116 PID 116 wrote to memory of 3164 116 chrosha.exe 116 PID 116 wrote to memory of 3164 116 chrosha.exe 116 PID 3164 wrote to memory of 2420 3164 rundll32.exe 117 PID 3164 wrote to memory of 2420 3164 rundll32.exe 117 PID 2420 wrote to memory of 456 2420 rundll32.exe 118 PID 2420 wrote to memory of 456 2420 rundll32.exe 118 PID 2420 wrote to memory of 4960 2420 rundll32.exe 120 PID 2420 wrote to memory of 4960 2420 rundll32.exe 120 PID 116 wrote to memory of 2532 116 chrosha.exe 122 PID 116 wrote to memory of 2532 116 chrosha.exe 122 PID 116 wrote to memory of 2532 116 chrosha.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd991242964f1d851fc1277658d40a357c87e2032d813ec86ad3503fd40d7db3.exe"C:\Users\Admin\AppData\Local\Temp\fd991242964f1d851fc1277658d40a357c87e2032d813ec86ad3503fd40d7db3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2844
-
C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exeC:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\1000193001\dirtquire.exe"C:\Users\Admin\AppData\Local\Temp\1000193001\dirtquire.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1380
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Start-Process 'C:\Users\Admin\AppData\Roaming\RQAAIXIK4M.exe'"4⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:456
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\288054676187_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5bc8a940db32e53105696d2da3ced6795
SHA1e55d7705ac3c1030f4d6eb0ee908e56393ae3f8a
SHA256e079ffb584a6f7be041d61ec873c6391602bcc2210c4958dca19fcf8fcea36bd
SHA5125d8a4f32903635046a1a9dac88022ef543b3b1e6f46f94ec80758e6cc23020dff1734277a184e3316a7544658accf822abc9c482d50877b95ad71c46702a18c3
-
Filesize
273KB
MD5e795115169cc800de0392d6a675d58fd
SHA18dd75837e360ba1cb8acf5a3d348dd020a5da482
SHA25617f929c1d40a7fd6f897c0b15ca9c44b2059cbccb3037c31619d87954659478e
SHA5125fb6543e91de175bd365462a1cc87d6772e43b0effd3757b3e408b08a4de5a004de9a85e7f1d09578fa3bc6b6486c5f5016c1b879496582dbb39b2e62e168f38
-
Filesize
1.8MB
MD54f924d31ec92af6ef6250e7723f098e0
SHA1f3c6119a04b8266d3b13363f5bb82c4190a5f626
SHA256fd991242964f1d851fc1277658d40a357c87e2032d813ec86ad3503fd40d7db3
SHA512ec27b19fff72acec46a49c6c3043c1d8ea34c8b00891656bafab46ff2ea6aad7c4a4c7aeb8f592e796106a977ef48939826512ccc6c227e7fc5eca79aa9faa63
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
65KB
MD509810294805f38480245f9bdf38a6b78
SHA1a6a0143ad9251d49c086afd8f6ec0a6e7fb737cf
SHA2563bfbdfd525c485a6c3e0f63ffaa9f3b877b43d219f1a79656f9bd2007c5bee00
SHA5126a612e02a3c9c6adb245f5d0092051ce2a7936cf40c961d503b9f7e922ffcca051c6dac08a36b8fa5af2ffd21b5986cde23ffc80508931a2e9ed78221468d98b
-
Filesize
109KB
MD5154c3f1334dd435f562672f2664fea6b
SHA151dd25e2ba98b8546de163b8f26e2972a90c2c79
SHA2565f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f
SHA5121bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841
-
Filesize
1.2MB
MD5f35b671fda2603ec30ace10946f11a90
SHA1059ad6b06559d4db581b1879e709f32f80850872
SHA25683e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7
SHA512b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705