Analysis
-
max time kernel
146s -
max time network
115s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-05-2024 02:02
Static task
static1
General
-
Target
b1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282.exe
-
Size
1.8MB
-
MD5
4bd3e99486ffbbd065656e0300d56c3e
-
SHA1
d65965f613f83d235f0bfcabea5505a7c547eeca
-
SHA256
b1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282
-
SHA512
856330451d808359d077c05387eac0a5b97f331e8abcb14a57f40887577d3905718b4263ada0c82af1284cba57d9da375e2827311736a56a3dcc27f7e63d0ee9
-
SSDEEP
49152:jzn259kIST2OIxVfd3T3ndRd/qwNqD4JId+6nYKHR:ja59tSKOYVf1TfRYD4J0+W3
Malware Config
Extracted
amadey
4.20
http://5.42.96.7
-
install_dir
7af68cdb52
-
install_file
axplons.exe
-
strings_key
e2ce58e78f631ed97d01fe7b70e85d5e
-
url_paths
/zamo7h/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
Processes:
b1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282.exeaxplons.exeaxplons.exeaxplons.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
axplons.exeb1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282.exeaxplons.exeaxplons.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe -
Executes dropped EXE 4 IoCs
Processes:
axplons.exeaxplons.exeaxplons.exeaxplons.exepid Process 2648 axplons.exe 1072 axplons.exe 4348 axplons.exe 2804 axplons.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
axplons.exeaxplons.exeb1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282.exeaxplons.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000\Software\Wine b1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282.exe Key opened \REGISTRY\USER\S-1-5-21-3938118698-2964058152-2337880935-1000\Software\Wine axplons.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
b1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282.exeaxplons.exeaxplons.exeaxplons.exepid Process 4344 b1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282.exe 2648 axplons.exe 1072 axplons.exe 4348 axplons.exe -
Drops file in Windows directory 1 IoCs
Processes:
b1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282.exedescription ioc Process File created C:\Windows\Tasks\axplons.job b1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
b1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282.exeaxplons.exeaxplons.exeaxplons.exepid Process 4344 b1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282.exe 4344 b1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282.exe 2648 axplons.exe 2648 axplons.exe 1072 axplons.exe 1072 axplons.exe 4348 axplons.exe 4348 axplons.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
b1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282.exedescription pid Process procid_target PID 4344 wrote to memory of 2648 4344 b1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282.exe 82 PID 4344 wrote to memory of 2648 4344 b1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282.exe 82 PID 4344 wrote to memory of 2648 4344 b1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282.exe"C:\Users\Admin\AppData\Local\Temp\b1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1072
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4348
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Executes dropped EXE
PID:2804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD54bd3e99486ffbbd065656e0300d56c3e
SHA1d65965f613f83d235f0bfcabea5505a7c547eeca
SHA256b1b7cc600c87f314a20d14a8657181e6577d163d333a503c3a366da53212b282
SHA512856330451d808359d077c05387eac0a5b97f331e8abcb14a57f40887577d3905718b4263ada0c82af1284cba57d9da375e2827311736a56a3dcc27f7e63d0ee9
-
Filesize
268KB
MD57a083e6b6a86fd3e6217ab4f352f2b07
SHA1ba1e4287ab23f507a692eed48c414faac6b7ca93
SHA256d0aac2799f081b4dda83561a35cdc101a8cb07772922fd82cc5f3d8c6014d6ee
SHA5123c9a4a23bc31e26d0e09e4a20e9338f48f9c267b0e0ac830fecdd57e667bd098a66b05d1875a77e2a8112d5f885cab31a520057671090f525ecf22f1adebe416