Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 05:09
Static task
static1
Behavioral task
behavioral1
Sample
870cdf639a6dd069bac616b77b0cb1a7.exe
Resource
win7-20240419-en
General
-
Target
870cdf639a6dd069bac616b77b0cb1a7.exe
-
Size
1.8MB
-
MD5
870cdf639a6dd069bac616b77b0cb1a7
-
SHA1
1f63671412b0638f6abaebfb35f16d03b5ba09e0
-
SHA256
69ca3ddf71a6496576e5730364dc2f8bef8a54b78538fa4c1c38b9f64f19890b
-
SHA512
a3752e2e49254adc4dcd6b6c055bb8e4d3df8bec0c5a971f82c1d410b8bcdabfb383b4bb06fe3b6e676362fc467a6595ba6f5ce1f7051ecc294a79a74885f903
-
SSDEEP
49152:AHTytLPyy8Wz07dojIzrsKWTH5NqJrt67ERA:I4LP5RY7SjIzrsKsXmrt67Ee
Malware Config
Extracted
amadey
4.20
http://5.42.96.7
-
install_dir
7af68cdb52
-
install_file
axplons.exe
-
strings_key
e2ce58e78f631ed97d01fe7b70e85d5e
-
url_paths
/zamo7h/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 870cdf639a6dd069bac616b77b0cb1a7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 870cdf639a6dd069bac616b77b0cb1a7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 870cdf639a6dd069bac616b77b0cb1a7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 870cdf639a6dd069bac616b77b0cb1a7.exe -
Executes dropped EXE 3 IoCs
pid Process 3736 axplons.exe 4584 axplons.exe 340 axplons.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Wine 870cdf639a6dd069bac616b77b0cb1a7.exe Key opened \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Software\Wine axplons.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3064 870cdf639a6dd069bac616b77b0cb1a7.exe 3736 axplons.exe 4584 axplons.exe 340 axplons.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplons.job 870cdf639a6dd069bac616b77b0cb1a7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3064 870cdf639a6dd069bac616b77b0cb1a7.exe 3064 870cdf639a6dd069bac616b77b0cb1a7.exe 3736 axplons.exe 3736 axplons.exe 4584 axplons.exe 4584 axplons.exe 340 axplons.exe 340 axplons.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3064 wrote to memory of 3736 3064 870cdf639a6dd069bac616b77b0cb1a7.exe 85 PID 3064 wrote to memory of 3736 3064 870cdf639a6dd069bac616b77b0cb1a7.exe 85 PID 3064 wrote to memory of 3736 3064 870cdf639a6dd069bac616b77b0cb1a7.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\870cdf639a6dd069bac616b77b0cb1a7.exe"C:\Users\Admin\AppData\Local\Temp\870cdf639a6dd069bac616b77b0cb1a7.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3736
-
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4584
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5870cdf639a6dd069bac616b77b0cb1a7
SHA11f63671412b0638f6abaebfb35f16d03b5ba09e0
SHA25669ca3ddf71a6496576e5730364dc2f8bef8a54b78538fa4c1c38b9f64f19890b
SHA512a3752e2e49254adc4dcd6b6c055bb8e4d3df8bec0c5a971f82c1d410b8bcdabfb383b4bb06fe3b6e676362fc467a6595ba6f5ce1f7051ecc294a79a74885f903