Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    12-05-2024 10:57

General

  • Target

    58134967418e4a447dc034ff889b209fe64e455e71359abba7e5234a0de96f26.exe

  • Size

    1.9MB

  • MD5

    29eb6a81c9f2144d0674d158777f264c

  • SHA1

    3e6306c104d171315994785c2dfb35413fd45295

  • SHA256

    58134967418e4a447dc034ff889b209fe64e455e71359abba7e5234a0de96f26

  • SHA512

    d09516c618ae3ea2ed9ecf64fa41adb2bdce7038823da4e7f9eccee6120d10e9afebe0d72481e2201a3c978e3697e16d4bcf28c362a610d397230ec1afcdda0b

  • SSDEEP

    49152:xqnoxIEKZRhytKrKW7e/XLF31nSUAQ74AAgRtP6Xx:Eox/KZoLDXAQ7xa

Malware Config

Extracted

Family

amadey

Version

4.20

C2

http://5.42.96.141

http://5.42.96.7

Attributes
  • install_dir

    908f070dff

  • install_file

    explorku.exe

  • strings_key

    b25a9385246248a95c600f9a061438e1

  • url_paths

    /go34ko8/index.php

rc4.plain
rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Themida packer 11 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58134967418e4a447dc034ff889b209fe64e455e71359abba7e5234a0de96f26.exe
    "C:\Users\Admin\AppData\Local\Temp\58134967418e4a447dc034ff889b209fe64e455e71359abba7e5234a0de96f26.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe
      "C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4576
      • C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe
        "C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:4252
      • C:\Users\Admin\AppData\Local\Temp\1000005001\amers.exe
        "C:\Users\Admin\AppData\Local\Temp\1000005001\amers.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3936
        • C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe
          "C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:4848
      • C:\Users\Admin\1000006002\285ae7ed13.exe
        "C:\Users\Admin\1000006002\285ae7ed13.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        PID:3972
  • C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe
    C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:912
  • C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe
    C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:2092
  • C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe
    C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:1580
  • C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe
    C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    PID:3276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\1000006002\285ae7ed13.exe

    Filesize

    2.2MB

    MD5

    94a5f1266160eee811be13d48dd1c4da

    SHA1

    87cceb5d3cb2e536dcd9beafde68128509112563

    SHA256

    057144313c68f178d1137a55bada189ef19c566f23400193a9086e27106b328b

    SHA512

    200b8b46b81ed80d9c8d87d70e02d0e669affaa0a9d1fce283382794062268fc5accad3a67ff15878b4a31560d57da141f7590039723a243f76d0802b746ddd5

  • C:\Users\Admin\AppData\Local\Temp\1000005001\amers.exe

    Filesize

    1.8MB

    MD5

    84162e61913b053c3b8bc63ecc21388e

    SHA1

    a41fefd2ec97533aa09bc86a945e81a5a0a09c33

    SHA256

    9bf9a3cfc0f1e99b59b5d8a0710610d81b6549f892a36f48a648fe1c3a52ca81

    SHA512

    0dd7988106312a274e4c9c1c21d15d7bdc38344dce34b7e72057c145c702a3a8c48c1093ae386277ede4475b505ab78799bf9e0cec6dec6327c5909a299ce677

  • C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe

    Filesize

    1.9MB

    MD5

    29eb6a81c9f2144d0674d158777f264c

    SHA1

    3e6306c104d171315994785c2dfb35413fd45295

    SHA256

    58134967418e4a447dc034ff889b209fe64e455e71359abba7e5234a0de96f26

    SHA512

    d09516c618ae3ea2ed9ecf64fa41adb2bdce7038823da4e7f9eccee6120d10e9afebe0d72481e2201a3c978e3697e16d4bcf28c362a610d397230ec1afcdda0b

  • memory/912-129-0x0000000000C80000-0x000000000112F000-memory.dmp

    Filesize

    4.7MB

  • memory/912-133-0x0000000000C80000-0x000000000112F000-memory.dmp

    Filesize

    4.7MB

  • memory/1240-17-0x0000000000C30000-0x0000000001108000-memory.dmp

    Filesize

    4.8MB

  • memory/1240-1-0x0000000077C26000-0x0000000077C28000-memory.dmp

    Filesize

    8KB

  • memory/1240-0-0x0000000000C30000-0x0000000001108000-memory.dmp

    Filesize

    4.8MB

  • memory/1240-2-0x0000000000C31000-0x0000000000C5F000-memory.dmp

    Filesize

    184KB

  • memory/1240-3-0x0000000000C30000-0x0000000001108000-memory.dmp

    Filesize

    4.8MB

  • memory/1240-5-0x0000000000C30000-0x0000000001108000-memory.dmp

    Filesize

    4.8MB

  • memory/1580-154-0x0000000000C80000-0x000000000112F000-memory.dmp

    Filesize

    4.7MB

  • memory/1580-158-0x0000000000C80000-0x000000000112F000-memory.dmp

    Filesize

    4.7MB

  • memory/2092-134-0x0000000000CA0000-0x0000000001178000-memory.dmp

    Filesize

    4.8MB

  • memory/2092-131-0x0000000000CA0000-0x0000000001178000-memory.dmp

    Filesize

    4.8MB

  • memory/3276-156-0x0000000000CA0000-0x0000000001178000-memory.dmp

    Filesize

    4.8MB

  • memory/3276-160-0x0000000000CA0000-0x0000000001178000-memory.dmp

    Filesize

    4.8MB

  • memory/3936-73-0x0000000000AB0000-0x0000000000F5F000-memory.dmp

    Filesize

    4.7MB

  • memory/3936-86-0x0000000000AB0000-0x0000000000F5F000-memory.dmp

    Filesize

    4.7MB

  • memory/3972-115-0x0000000000EA0000-0x000000000153C000-memory.dmp

    Filesize

    6.6MB

  • memory/3972-112-0x0000000000EA0000-0x000000000153C000-memory.dmp

    Filesize

    6.6MB

  • memory/3972-114-0x0000000000EA0000-0x000000000153C000-memory.dmp

    Filesize

    6.6MB

  • memory/3972-113-0x0000000000EA0000-0x000000000153C000-memory.dmp

    Filesize

    6.6MB

  • memory/3972-110-0x0000000000EA0000-0x000000000153C000-memory.dmp

    Filesize

    6.6MB

  • memory/3972-108-0x0000000000EA0000-0x000000000153C000-memory.dmp

    Filesize

    6.6MB

  • memory/3972-111-0x0000000000EA0000-0x000000000153C000-memory.dmp

    Filesize

    6.6MB

  • memory/3972-109-0x0000000000EA0000-0x000000000153C000-memory.dmp

    Filesize

    6.6MB

  • memory/3972-107-0x0000000000EA0000-0x000000000153C000-memory.dmp

    Filesize

    6.6MB

  • memory/3972-121-0x0000000000EA0000-0x000000000153C000-memory.dmp

    Filesize

    6.6MB

  • memory/4252-44-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-40-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-53-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-51-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-55-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-56-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-57-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-54-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-49-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-50-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-48-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-46-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-43-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-47-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-45-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-34-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-31-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-28-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-32-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-25-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-37-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-35-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-36-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-38-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-39-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-42-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-41-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-52-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-33-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4252-29-0x0000000000CA0000-0x0000000001178000-memory.dmp

    Filesize

    4.8MB

  • memory/4252-30-0x0000000000400000-0x00000000009E8000-memory.dmp

    Filesize

    5.9MB

  • memory/4576-144-0x0000000000CA0000-0x0000000001178000-memory.dmp

    Filesize

    4.8MB

  • memory/4576-141-0x0000000000CA0000-0x0000000001178000-memory.dmp

    Filesize

    4.8MB

  • memory/4576-120-0x0000000000CA0000-0x0000000001178000-memory.dmp

    Filesize

    4.8MB

  • memory/4576-117-0x0000000000CA0000-0x0000000001178000-memory.dmp

    Filesize

    4.8MB

  • memory/4576-122-0x0000000000CA0000-0x0000000001178000-memory.dmp

    Filesize

    4.8MB

  • memory/4576-19-0x0000000000CA1000-0x0000000000CCF000-memory.dmp

    Filesize

    184KB

  • memory/4576-22-0x0000000000CA0000-0x0000000001178000-memory.dmp

    Filesize

    4.8MB

  • memory/4576-126-0x0000000000CA0000-0x0000000001178000-memory.dmp

    Filesize

    4.8MB

  • memory/4576-116-0x0000000000CA0000-0x0000000001178000-memory.dmp

    Filesize

    4.8MB

  • memory/4576-106-0x0000000000CA0000-0x0000000001178000-memory.dmp

    Filesize

    4.8MB

  • memory/4576-18-0x0000000000CA0000-0x0000000001178000-memory.dmp

    Filesize

    4.8MB

  • memory/4576-20-0x0000000000CA0000-0x0000000001178000-memory.dmp

    Filesize

    4.8MB

  • memory/4576-21-0x0000000000CA0000-0x0000000001178000-memory.dmp

    Filesize

    4.8MB

  • memory/4576-118-0x0000000000CA0000-0x0000000001178000-memory.dmp

    Filesize

    4.8MB

  • memory/4576-135-0x0000000000CA0000-0x0000000001178000-memory.dmp

    Filesize

    4.8MB

  • memory/4576-139-0x0000000000CA0000-0x0000000001178000-memory.dmp

    Filesize

    4.8MB

  • memory/4848-119-0x0000000000C80000-0x000000000112F000-memory.dmp

    Filesize

    4.7MB

  • memory/4848-142-0x0000000000C80000-0x000000000112F000-memory.dmp

    Filesize

    4.7MB

  • memory/4848-136-0x0000000000C80000-0x000000000112F000-memory.dmp

    Filesize

    4.7MB

  • memory/4848-145-0x0000000000C80000-0x000000000112F000-memory.dmp

    Filesize

    4.7MB

  • memory/4848-138-0x0000000000C80000-0x000000000112F000-memory.dmp

    Filesize

    4.7MB

  • memory/4848-125-0x0000000000C80000-0x000000000112F000-memory.dmp

    Filesize

    4.7MB

  • memory/4848-123-0x0000000000C80000-0x000000000112F000-memory.dmp

    Filesize

    4.7MB

  • memory/4848-87-0x0000000000C80000-0x000000000112F000-memory.dmp

    Filesize

    4.7MB