Analysis
-
max time kernel
293s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
06-05-2024 23:00
Behavioral task
behavioral1
Sample
ad6c3a1915792bfc0577fd9a458c75d151eff6838a2c6081c2d5ba01ec332de6.exe
Resource
win7-20240221-en
General
-
Target
ad6c3a1915792bfc0577fd9a458c75d151eff6838a2c6081c2d5ba01ec332de6.exe
-
Size
1.7MB
-
MD5
8ac5bf7d653c16dfab906e995e7228f3
-
SHA1
7432d4b623a8f0d153d684e01d6f466b55ac2005
-
SHA256
ad6c3a1915792bfc0577fd9a458c75d151eff6838a2c6081c2d5ba01ec332de6
-
SHA512
2cceffa66fa940f5b6c00462b9f02ba308ba6b61c14763f8f72a4e5f6480f8ddb32f954887d8503200d274340d75b3d2e1296d6f6d35a78bacd2acb1a60e46b5
-
SSDEEP
24576:3IH2KeiY4ZbBCWoXDdYBM7d2pMXxWMm55ejujEWFSX52//5anyw1SJTTghw5vHVI:YeJ+oWoXDGy7dhXxWMmeu+50uShuwr85
Malware Config
Extracted
amadey
4.20
http://193.233.132.139
-
install_dir
5454e6f062
-
install_file
explorta.exe
-
strings_key
c7a869c5ba1d72480093ec207994e2bf
-
url_paths
/sev56rkm/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ad6c3a1915792bfc0577fd9a458c75d151eff6838a2c6081c2d5ba01ec332de6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ad6c3a1915792bfc0577fd9a458c75d151eff6838a2c6081c2d5ba01ec332de6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ad6c3a1915792bfc0577fd9a458c75d151eff6838a2c6081c2d5ba01ec332de6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe -
Executes dropped EXE 6 IoCs
pid Process 220 explorta.exe 212 explorta.exe 3468 explorta.exe 648 explorta.exe 2152 explorta.exe 2488 explorta.exe -
resource yara_rule behavioral2/memory/4180-0-0x0000000000FD0000-0x0000000001526000-memory.dmp themida behavioral2/memory/4180-2-0x0000000000FD0000-0x0000000001526000-memory.dmp themida behavioral2/memory/4180-1-0x0000000000FD0000-0x0000000001526000-memory.dmp themida behavioral2/memory/4180-3-0x0000000000FD0000-0x0000000001526000-memory.dmp themida behavioral2/memory/4180-4-0x0000000000FD0000-0x0000000001526000-memory.dmp themida behavioral2/memory/4180-6-0x0000000000FD0000-0x0000000001526000-memory.dmp themida behavioral2/memory/4180-5-0x0000000000FD0000-0x0000000001526000-memory.dmp themida behavioral2/memory/4180-7-0x0000000000FD0000-0x0000000001526000-memory.dmp themida behavioral2/files/0x000700000001ac66-14.dat themida behavioral2/memory/220-20-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/220-23-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/220-24-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/220-22-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/220-21-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/220-19-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/220-18-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/4180-17-0x0000000000FD0000-0x0000000001526000-memory.dmp themida behavioral2/memory/220-25-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/220-26-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/212-31-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/212-33-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/212-34-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/212-32-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/212-37-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/212-38-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/212-36-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/212-35-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/212-39-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/3468-47-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/3468-49-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/3468-53-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/3468-52-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/3468-51-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/3468-50-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/3468-48-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/3468-54-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/3468-55-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/648-64-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/648-68-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/648-69-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/648-67-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/648-66-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/648-65-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/648-63-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/648-70-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/2152-79-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/2152-80-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/2152-78-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/2152-86-0x00000000011B0000-0x0000000001706000-memory.dmp themida behavioral2/memory/2488-102-0x00000000011B0000-0x0000000001706000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ad6c3a1915792bfc0577fd9a458c75d151eff6838a2c6081c2d5ba01ec332de6.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorta.job ad6c3a1915792bfc0577fd9a458c75d151eff6838a2c6081c2d5ba01ec332de6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4180 wrote to memory of 220 4180 ad6c3a1915792bfc0577fd9a458c75d151eff6838a2c6081c2d5ba01ec332de6.exe 73 PID 4180 wrote to memory of 220 4180 ad6c3a1915792bfc0577fd9a458c75d151eff6838a2c6081c2d5ba01ec332de6.exe 73 PID 4180 wrote to memory of 220 4180 ad6c3a1915792bfc0577fd9a458c75d151eff6838a2c6081c2d5ba01ec332de6.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad6c3a1915792bfc0577fd9a458c75d151eff6838a2c6081c2d5ba01ec332de6.exe"C:\Users\Admin\AppData\Local\Temp\ad6c3a1915792bfc0577fd9a458c75d151eff6838a2c6081c2d5ba01ec332de6.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:220
-
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:212
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3468
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:648
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2152
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD58ac5bf7d653c16dfab906e995e7228f3
SHA17432d4b623a8f0d153d684e01d6f466b55ac2005
SHA256ad6c3a1915792bfc0577fd9a458c75d151eff6838a2c6081c2d5ba01ec332de6
SHA5122cceffa66fa940f5b6c00462b9f02ba308ba6b61c14763f8f72a4e5f6480f8ddb32f954887d8503200d274340d75b3d2e1296d6f6d35a78bacd2acb1a60e46b5