Analysis
-
max time kernel
142s -
max time network
69s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-04-2024 13:24
Static task
static1
Behavioral task
behavioral1
Sample
256158683a6f1768975bfb27ea9d46ac80dfeb4c27960dfa95ebfc07c5afa5b9.exe
Resource
win10v2004-20240419-en
General
-
Target
256158683a6f1768975bfb27ea9d46ac80dfeb4c27960dfa95ebfc07c5afa5b9.exe
-
Size
1.8MB
-
MD5
ee38ca2353a49754ff29fa865b5190ef
-
SHA1
cf5838cc3d550d3fae6626b6c6a3182f9fc793d8
-
SHA256
256158683a6f1768975bfb27ea9d46ac80dfeb4c27960dfa95ebfc07c5afa5b9
-
SHA512
204ae72a19eb7f5ca98543f63ea94642e69232862b7ba86beab755795888201b7b7621099c33315541c91a0f15fa6ed294f794a6fcae14d19924ec15b661fb89
-
SSDEEP
49152:e3/bnFNCFi8zcQ8PBo2hQHELANEEgjlExuL+rUl8bYj:ejnzgi8pGBouQHH6JExLoWbY
Malware Config
Extracted
amadey
4.20
http://193.233.132.139
-
install_dir
5454e6f062
-
install_file
explorta.exe
-
strings_key
c7a869c5ba1d72480093ec207994e2bf
-
url_paths
/sev56rkm/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 256158683a6f1768975bfb27ea9d46ac80dfeb4c27960dfa95ebfc07c5afa5b9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 256158683a6f1768975bfb27ea9d46ac80dfeb4c27960dfa95ebfc07c5afa5b9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 256158683a6f1768975bfb27ea9d46ac80dfeb4c27960dfa95ebfc07c5afa5b9.exe -
Executes dropped EXE 4 IoCs
pid Process 1096 explorta.exe 3112 explorta.exe 5004 explorta.exe 3696 explorta.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-891789021-684472942-1795878712-1000\Software\Wine explorta.exe Key opened \REGISTRY\USER\S-1-5-21-891789021-684472942-1795878712-1000\Software\Wine explorta.exe Key opened \REGISTRY\USER\S-1-5-21-891789021-684472942-1795878712-1000\Software\Wine 256158683a6f1768975bfb27ea9d46ac80dfeb4c27960dfa95ebfc07c5afa5b9.exe Key opened \REGISTRY\USER\S-1-5-21-891789021-684472942-1795878712-1000\Software\Wine explorta.exe Key opened \REGISTRY\USER\S-1-5-21-891789021-684472942-1795878712-1000\Software\Wine explorta.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2680 256158683a6f1768975bfb27ea9d46ac80dfeb4c27960dfa95ebfc07c5afa5b9.exe 1096 explorta.exe 3112 explorta.exe 5004 explorta.exe 3696 explorta.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorta.job 256158683a6f1768975bfb27ea9d46ac80dfeb4c27960dfa95ebfc07c5afa5b9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2680 256158683a6f1768975bfb27ea9d46ac80dfeb4c27960dfa95ebfc07c5afa5b9.exe 2680 256158683a6f1768975bfb27ea9d46ac80dfeb4c27960dfa95ebfc07c5afa5b9.exe 1096 explorta.exe 1096 explorta.exe 3112 explorta.exe 3112 explorta.exe 5004 explorta.exe 5004 explorta.exe 3696 explorta.exe 3696 explorta.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2680 wrote to memory of 1096 2680 256158683a6f1768975bfb27ea9d46ac80dfeb4c27960dfa95ebfc07c5afa5b9.exe 80 PID 2680 wrote to memory of 1096 2680 256158683a6f1768975bfb27ea9d46ac80dfeb4c27960dfa95ebfc07c5afa5b9.exe 80 PID 2680 wrote to memory of 1096 2680 256158683a6f1768975bfb27ea9d46ac80dfeb4c27960dfa95ebfc07c5afa5b9.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\256158683a6f1768975bfb27ea9d46ac80dfeb4c27960dfa95ebfc07c5afa5b9.exe"C:\Users\Admin\AppData\Local\Temp\256158683a6f1768975bfb27ea9d46ac80dfeb4c27960dfa95ebfc07c5afa5b9.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3112
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5ee38ca2353a49754ff29fa865b5190ef
SHA1cf5838cc3d550d3fae6626b6c6a3182f9fc793d8
SHA256256158683a6f1768975bfb27ea9d46ac80dfeb4c27960dfa95ebfc07c5afa5b9
SHA512204ae72a19eb7f5ca98543f63ea94642e69232862b7ba86beab755795888201b7b7621099c33315541c91a0f15fa6ed294f794a6fcae14d19924ec15b661fb89