Analysis
-
max time kernel
293s -
max time network
286s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
06-05-2024 22:55
Behavioral task
behavioral1
Sample
9703bbdda3662aaf15fc1560755018d7eb1c6c9e4ef32f6404cf67f28f9cf281.exe
Resource
win7-20240220-en
General
-
Target
9703bbdda3662aaf15fc1560755018d7eb1c6c9e4ef32f6404cf67f28f9cf281.exe
-
Size
1.7MB
-
MD5
41ad0676b1c31f977991d464b09bc462
-
SHA1
33aa733131e31ec6b51959c695efc01571c5d94f
-
SHA256
9703bbdda3662aaf15fc1560755018d7eb1c6c9e4ef32f6404cf67f28f9cf281
-
SHA512
9973691e4bcbceb8bfa60aef6588a37d8b6458d05366f8f3c36e1ed5c6c7eba3f03c61938cd477b4ac76fbfcd2c0ecb7280f63940a93621d627f550903eb8db1
-
SSDEEP
49152:1xsM/zxjlW0iIgkzp8QocLJoBut4BCtyJyZVF2c:1HbxzijmiWJRtnh2c
Malware Config
Extracted
amadey
4.20
http://193.233.132.139
-
install_dir
5454e6f062
-
install_file
explorta.exe
-
strings_key
c7a869c5ba1d72480093ec207994e2bf
-
url_paths
/sev56rkm/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9703bbdda3662aaf15fc1560755018d7eb1c6c9e4ef32f6404cf67f28f9cf281.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9703bbdda3662aaf15fc1560755018d7eb1c6c9e4ef32f6404cf67f28f9cf281.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9703bbdda3662aaf15fc1560755018d7eb1c6c9e4ef32f6404cf67f28f9cf281.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe -
Executes dropped EXE 6 IoCs
pid Process 1896 explorta.exe 1508 explorta.exe 1852 explorta.exe 4480 explorta.exe 2648 explorta.exe 2636 explorta.exe -
resource yara_rule behavioral2/memory/412-0-0x0000000000DB0000-0x0000000001304000-memory.dmp themida behavioral2/memory/412-1-0x0000000000DB0000-0x0000000001304000-memory.dmp themida behavioral2/memory/412-2-0x0000000000DB0000-0x0000000001304000-memory.dmp themida behavioral2/memory/412-4-0x0000000000DB0000-0x0000000001304000-memory.dmp themida behavioral2/memory/412-5-0x0000000000DB0000-0x0000000001304000-memory.dmp themida behavioral2/memory/412-7-0x0000000000DB0000-0x0000000001304000-memory.dmp themida behavioral2/memory/412-6-0x0000000000DB0000-0x0000000001304000-memory.dmp themida behavioral2/memory/412-8-0x0000000000DB0000-0x0000000001304000-memory.dmp themida behavioral2/memory/412-3-0x0000000000DB0000-0x0000000001304000-memory.dmp themida behavioral2/memory/1896-23-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1896-27-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1896-26-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1896-24-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1896-22-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1896-25-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1896-20-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1896-21-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/files/0x000700000001ac5b-16.dat themida behavioral2/memory/1896-19-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/412-18-0x0000000000DB0000-0x0000000001304000-memory.dmp themida behavioral2/memory/1896-28-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1508-36-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1508-37-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1508-38-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1508-35-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1508-33-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1508-34-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1508-32-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1508-31-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1508-40-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1852-50-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1852-49-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1852-51-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1852-48-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1852-52-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1852-55-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1852-54-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1852-53-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/1852-56-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/4480-64-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/4480-69-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/4480-70-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/4480-68-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/4480-66-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/4480-65-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/4480-67-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/4480-71-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/4480-73-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/2648-81-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/2648-83-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/2648-84-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/2648-82-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/2648-90-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida behavioral2/memory/2636-106-0x0000000000DA0000-0x00000000012F4000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9703bbdda3662aaf15fc1560755018d7eb1c6c9e4ef32f6404cf67f28f9cf281.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorta.job 9703bbdda3662aaf15fc1560755018d7eb1c6c9e4ef32f6404cf67f28f9cf281.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 412 wrote to memory of 1896 412 9703bbdda3662aaf15fc1560755018d7eb1c6c9e4ef32f6404cf67f28f9cf281.exe 73 PID 412 wrote to memory of 1896 412 9703bbdda3662aaf15fc1560755018d7eb1c6c9e4ef32f6404cf67f28f9cf281.exe 73 PID 412 wrote to memory of 1896 412 9703bbdda3662aaf15fc1560755018d7eb1c6c9e4ef32f6404cf67f28f9cf281.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\9703bbdda3662aaf15fc1560755018d7eb1c6c9e4ef32f6404cf67f28f9cf281.exe"C:\Users\Admin\AppData\Local\Temp\9703bbdda3662aaf15fc1560755018d7eb1c6c9e4ef32f6404cf67f28f9cf281.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1896
-
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1508
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1852
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4480
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2648
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD541ad0676b1c31f977991d464b09bc462
SHA133aa733131e31ec6b51959c695efc01571c5d94f
SHA2569703bbdda3662aaf15fc1560755018d7eb1c6c9e4ef32f6404cf67f28f9cf281
SHA5129973691e4bcbceb8bfa60aef6588a37d8b6458d05366f8f3c36e1ed5c6c7eba3f03c61938cd477b4ac76fbfcd2c0ecb7280f63940a93621d627f550903eb8db1