Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-05-2024 09:37
Static task
static1
Behavioral task
behavioral1
Sample
61079bbfcf63859a57e3e30f783c168199942ce7a4cbd7331954c375c9cf9df9.exe
Resource
win10v2004-20240426-en
General
-
Target
61079bbfcf63859a57e3e30f783c168199942ce7a4cbd7331954c375c9cf9df9.exe
-
Size
1.8MB
-
MD5
7f38c9925572a5fa738c2c6bf365c0e6
-
SHA1
5ff3a27bf6e2281eee612accd20b0502a51ded70
-
SHA256
61079bbfcf63859a57e3e30f783c168199942ce7a4cbd7331954c375c9cf9df9
-
SHA512
9caa41001535df15c566e8502860ca4ad1cf1df6c150771e5cb63bc08e5b585b4cef0c52af625deb1f62a56a3da79a0a17a698b56ab1cd298c1cdc0b64ca7fd8
-
SSDEEP
24576:Rl5JMeP7S5sNnzhAKm8WUlYvjh58KqQkvRLP5aESgEaWXeEB54+6k2Lxpxn2yjg9:7E5s/I8N4jD85vVHZSe+54+7apxry+b
Malware Config
Extracted
amadey
4.20
http://5.42.96.141
http://5.42.96.7
-
install_dir
908f070dff
-
install_file
explorku.exe
-
strings_key
b25a9385246248a95c600f9a061438e1
-
url_paths
/go34ko8/index.php
Extracted
risepro
147.45.47.126:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5f66ca3fc5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 61079bbfcf63859a57e3e30f783c168199942ce7a4cbd7331954c375c9cf9df9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amers.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5f66ca3fc5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 61079bbfcf63859a57e3e30f783c168199942ce7a4cbd7331954c375c9cf9df9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5f66ca3fc5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amers.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 61079bbfcf63859a57e3e30f783c168199942ce7a4cbd7331954c375c9cf9df9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amers.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe -
Executes dropped EXE 8 IoCs
pid Process 3604 explorku.exe 1132 amers.exe 2208 axplons.exe 4708 5f66ca3fc5.exe 3516 axplons.exe 1852 explorku.exe 3936 axplons.exe 2936 explorku.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3062789476-783164490-2318012559-1000\Software\Wine 61079bbfcf63859a57e3e30f783c168199942ce7a4cbd7331954c375c9cf9df9.exe Key opened \REGISTRY\USER\S-1-5-21-3062789476-783164490-2318012559-1000\Software\Wine explorku.exe Key opened \REGISTRY\USER\S-1-5-21-3062789476-783164490-2318012559-1000\Software\Wine amers.exe Key opened \REGISTRY\USER\S-1-5-21-3062789476-783164490-2318012559-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-3062789476-783164490-2318012559-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-3062789476-783164490-2318012559-1000\Software\Wine explorku.exe Key opened \REGISTRY\USER\S-1-5-21-3062789476-783164490-2318012559-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-3062789476-783164490-2318012559-1000\Software\Wine explorku.exe -
resource yara_rule behavioral2/files/0x000100000002a9fb-58.dat themida behavioral2/memory/4708-72-0x0000000000C60000-0x00000000012EF000-memory.dmp themida behavioral2/memory/4708-73-0x0000000000C60000-0x00000000012EF000-memory.dmp themida behavioral2/memory/4708-75-0x0000000000C60000-0x00000000012EF000-memory.dmp themida behavioral2/memory/4708-74-0x0000000000C60000-0x00000000012EF000-memory.dmp themida behavioral2/memory/4708-76-0x0000000000C60000-0x00000000012EF000-memory.dmp themida behavioral2/memory/4708-79-0x0000000000C60000-0x00000000012EF000-memory.dmp themida behavioral2/memory/4708-80-0x0000000000C60000-0x00000000012EF000-memory.dmp themida behavioral2/memory/4708-78-0x0000000000C60000-0x00000000012EF000-memory.dmp themida behavioral2/memory/4708-77-0x0000000000C60000-0x00000000012EF000-memory.dmp themida behavioral2/memory/4708-85-0x0000000000C60000-0x00000000012EF000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3062789476-783164490-2318012559-1000\Software\Microsoft\Windows\CurrentVersion\Run\5f66ca3fc5.exe = "C:\\Users\\Admin\\1000006002\\5f66ca3fc5.exe" explorku.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5f66ca3fc5.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 2656 61079bbfcf63859a57e3e30f783c168199942ce7a4cbd7331954c375c9cf9df9.exe 3604 explorku.exe 1132 amers.exe 2208 axplons.exe 3516 axplons.exe 1852 explorku.exe 3936 axplons.exe 2936 explorku.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\explorku.job 61079bbfcf63859a57e3e30f783c168199942ce7a4cbd7331954c375c9cf9df9.exe File created C:\Windows\Tasks\axplons.job amers.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2656 61079bbfcf63859a57e3e30f783c168199942ce7a4cbd7331954c375c9cf9df9.exe 2656 61079bbfcf63859a57e3e30f783c168199942ce7a4cbd7331954c375c9cf9df9.exe 3604 explorku.exe 3604 explorku.exe 1132 amers.exe 1132 amers.exe 2208 axplons.exe 2208 axplons.exe 3516 axplons.exe 3516 axplons.exe 1852 explorku.exe 1852 explorku.exe 3936 axplons.exe 3936 axplons.exe 2936 explorku.exe 2936 explorku.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2656 wrote to memory of 3604 2656 61079bbfcf63859a57e3e30f783c168199942ce7a4cbd7331954c375c9cf9df9.exe 81 PID 2656 wrote to memory of 3604 2656 61079bbfcf63859a57e3e30f783c168199942ce7a4cbd7331954c375c9cf9df9.exe 81 PID 2656 wrote to memory of 3604 2656 61079bbfcf63859a57e3e30f783c168199942ce7a4cbd7331954c375c9cf9df9.exe 81 PID 3604 wrote to memory of 1620 3604 explorku.exe 82 PID 3604 wrote to memory of 1620 3604 explorku.exe 82 PID 3604 wrote to memory of 1620 3604 explorku.exe 82 PID 3604 wrote to memory of 1132 3604 explorku.exe 83 PID 3604 wrote to memory of 1132 3604 explorku.exe 83 PID 3604 wrote to memory of 1132 3604 explorku.exe 83 PID 1132 wrote to memory of 2208 1132 amers.exe 84 PID 1132 wrote to memory of 2208 1132 amers.exe 84 PID 1132 wrote to memory of 2208 1132 amers.exe 84 PID 3604 wrote to memory of 4708 3604 explorku.exe 85 PID 3604 wrote to memory of 4708 3604 explorku.exe 85 PID 3604 wrote to memory of 4708 3604 explorku.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\61079bbfcf63859a57e3e30f783c168199942ce7a4cbd7331954c375c9cf9df9.exe"C:\Users\Admin\AppData\Local\Temp\61079bbfcf63859a57e3e30f783c168199942ce7a4cbd7331954c375c9cf9df9.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"3⤵PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\amers.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\amers.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2208
-
-
-
C:\Users\Admin\1000006002\5f66ca3fc5.exe"C:\Users\Admin\1000006002\5f66ca3fc5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4708
-
-
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exeC:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1852
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exeC:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD527184aad85872cba6923397d46c51ba1
SHA12ae1615c3537a5fcb8f0494f2c50a68df9d4848a
SHA2568d5a1f1004eac10e81e8e0a781ade56ac0f84b2096f82b1500910e78ff946852
SHA51272c1011078d523bb4074c7e80d28a53cacf452e6a0a37729fabd655150523e070ff25943ad26a36cefb2a8025c7382bd2e5edb0bdbb82ecec24ef82c3c04b0d6
-
Filesize
1.8MB
MD5553d621ec1f218c7a070df8d1e086b74
SHA15a65a7b8fb43492fae918fd8f5041fbd4a93ed7c
SHA256b5875159e53c5a639ef41560de62a7601773c1eb36ef271c6b88b46224f5cd89
SHA512f8ba9cc45af49c7cb384ec257306d8c70745fa44b86ac931d369e11167dea2d3fc54a2210e0bc91ff875d061ae5f2243276b7015385809af824f361f6308cd48
-
Filesize
1.8MB
MD57f38c9925572a5fa738c2c6bf365c0e6
SHA15ff3a27bf6e2281eee612accd20b0502a51ded70
SHA25661079bbfcf63859a57e3e30f783c168199942ce7a4cbd7331954c375c9cf9df9
SHA5129caa41001535df15c566e8502860ca4ad1cf1df6c150771e5cb63bc08e5b585b4cef0c52af625deb1f62a56a3da79a0a17a698b56ab1cd298c1cdc0b64ca7fd8