Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-05-2024 10:31
Behavioral task
behavioral1
Sample
6fba5a67a20fffc5773724d7d5fddcf5e66c3559c95a9c77e45ceb42d3896e5d.exe
Resource
win10v2004-20240508-en
General
-
Target
6fba5a67a20fffc5773724d7d5fddcf5e66c3559c95a9c77e45ceb42d3896e5d.exe
-
Size
1.7MB
-
MD5
445c97f698db73056437f42b1d431f93
-
SHA1
b70ee72867b8faa0039e552555191c6006bfca2b
-
SHA256
6fba5a67a20fffc5773724d7d5fddcf5e66c3559c95a9c77e45ceb42d3896e5d
-
SHA512
2099798eb9451b442bd500615c4f5bd1ad950ff9d9fb61dc2dbbf6f34bf1c26b9476fb281d4542e609c5f0e72ef60f7d3d10afa244b2e6bfbdb71008776f75fe
-
SSDEEP
49152:L1ZxWMiLZe8YuT9rGX1UJyAv3no9AKFetxJW:LLxW5ZefCdaC7MFetxE
Malware Config
Extracted
amadey
4.20
http://5.42.96.141
http://5.42.96.7
-
install_dir
908f070dff
-
install_file
explorku.exe
-
strings_key
b25a9385246248a95c600f9a061438e1
-
url_paths
/go34ko8/index.php
Extracted
risepro
147.45.47.126:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
explorku.exeaxplons.exeexplorku.exe6fba5a67a20fffc5773724d7d5fddcf5e66c3559c95a9c77e45ceb42d3896e5d.exeexplorku.exee1ebca2afa.exeaxplons.exeamers.exeaxplons.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6fba5a67a20fffc5773724d7d5fddcf5e66c3559c95a9c77e45ceb42d3896e5d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorku.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e1ebca2afa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amers.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplons.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorku.exe6fba5a67a20fffc5773724d7d5fddcf5e66c3559c95a9c77e45ceb42d3896e5d.exeaxplons.exee1ebca2afa.exeaxplons.exeaxplons.exeexplorku.exeexplorku.exeamers.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6fba5a67a20fffc5773724d7d5fddcf5e66c3559c95a9c77e45ceb42d3896e5d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e1ebca2afa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e1ebca2afa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amers.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amers.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplons.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6fba5a67a20fffc5773724d7d5fddcf5e66c3559c95a9c77e45ceb42d3896e5d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorku.exe -
Executes dropped EXE 8 IoCs
Processes:
explorku.exeamers.exeaxplons.exee1ebca2afa.exeaxplons.exeexplorku.exeaxplons.exeexplorku.exepid process 2076 explorku.exe 868 amers.exe 1288 axplons.exe 3120 e1ebca2afa.exe 3584 axplons.exe 1504 explorku.exe 4788 axplons.exe 4024 explorku.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
axplons.exeamers.exeaxplons.exeaxplons.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Wine amers.exe Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Wine axplons.exe Key opened \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Wine axplons.exe -
Processes:
resource yara_rule behavioral2/memory/3912-3-0x0000000000770000-0x0000000000CBE000-memory.dmp themida behavioral2/memory/3912-0-0x0000000000770000-0x0000000000CBE000-memory.dmp themida behavioral2/memory/3912-4-0x0000000000770000-0x0000000000CBE000-memory.dmp themida behavioral2/memory/3912-6-0x0000000000770000-0x0000000000CBE000-memory.dmp themida behavioral2/memory/3912-7-0x0000000000770000-0x0000000000CBE000-memory.dmp themida behavioral2/memory/3912-5-0x0000000000770000-0x0000000000CBE000-memory.dmp themida behavioral2/memory/3912-1-0x0000000000770000-0x0000000000CBE000-memory.dmp themida behavioral2/memory/3912-2-0x0000000000770000-0x0000000000CBE000-memory.dmp themida behavioral2/memory/3912-8-0x0000000000770000-0x0000000000CBE000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe themida behavioral2/memory/3912-21-0x0000000000770000-0x0000000000CBE000-memory.dmp themida behavioral2/memory/2076-29-0x0000000000790000-0x0000000000CDE000-memory.dmp themida behavioral2/memory/2076-30-0x0000000000790000-0x0000000000CDE000-memory.dmp themida behavioral2/memory/2076-28-0x0000000000790000-0x0000000000CDE000-memory.dmp themida behavioral2/memory/2076-26-0x0000000000790000-0x0000000000CDE000-memory.dmp themida behavioral2/memory/2076-25-0x0000000000790000-0x0000000000CDE000-memory.dmp themida behavioral2/memory/2076-27-0x0000000000790000-0x0000000000CDE000-memory.dmp themida behavioral2/memory/2076-24-0x0000000000790000-0x0000000000CDE000-memory.dmp themida behavioral2/memory/2076-22-0x0000000000790000-0x0000000000CDE000-memory.dmp themida behavioral2/memory/2076-23-0x0000000000790000-0x0000000000CDE000-memory.dmp themida behavioral2/memory/2076-47-0x0000000000790000-0x0000000000CDE000-memory.dmp themida C:\Users\Admin\1000006002\e1ebca2afa.exe themida behavioral2/memory/3120-83-0x00000000004E0000-0x0000000000B56000-memory.dmp themida behavioral2/memory/3120-84-0x00000000004E0000-0x0000000000B56000-memory.dmp themida behavioral2/memory/3120-86-0x00000000004E0000-0x0000000000B56000-memory.dmp themida behavioral2/memory/3120-85-0x00000000004E0000-0x0000000000B56000-memory.dmp themida behavioral2/memory/3120-88-0x00000000004E0000-0x0000000000B56000-memory.dmp themida behavioral2/memory/3120-90-0x00000000004E0000-0x0000000000B56000-memory.dmp themida behavioral2/memory/3120-89-0x00000000004E0000-0x0000000000B56000-memory.dmp themida behavioral2/memory/3120-87-0x00000000004E0000-0x0000000000B56000-memory.dmp themida behavioral2/memory/3120-91-0x00000000004E0000-0x0000000000B56000-memory.dmp themida behavioral2/memory/2076-92-0x0000000000790000-0x0000000000CDE000-memory.dmp themida behavioral2/memory/3120-94-0x00000000004E0000-0x0000000000B56000-memory.dmp themida behavioral2/memory/1504-101-0x0000000000790000-0x0000000000CDE000-memory.dmp themida behavioral2/memory/1504-102-0x0000000000790000-0x0000000000CDE000-memory.dmp themida behavioral2/memory/1504-103-0x0000000000790000-0x0000000000CDE000-memory.dmp themida behavioral2/memory/1504-107-0x0000000000790000-0x0000000000CDE000-memory.dmp themida behavioral2/memory/1504-108-0x0000000000790000-0x0000000000CDE000-memory.dmp themida behavioral2/memory/1504-106-0x0000000000790000-0x0000000000CDE000-memory.dmp themida behavioral2/memory/1504-105-0x0000000000790000-0x0000000000CDE000-memory.dmp themida behavioral2/memory/1504-104-0x0000000000790000-0x0000000000CDE000-memory.dmp themida behavioral2/memory/1504-109-0x0000000000790000-0x0000000000CDE000-memory.dmp themida behavioral2/memory/4024-133-0x0000000000790000-0x0000000000CDE000-memory.dmp themida behavioral2/memory/4024-136-0x0000000000790000-0x0000000000CDE000-memory.dmp themida behavioral2/memory/4024-134-0x0000000000790000-0x0000000000CDE000-memory.dmp themida behavioral2/memory/4024-135-0x0000000000790000-0x0000000000CDE000-memory.dmp themida behavioral2/memory/4024-142-0x0000000000790000-0x0000000000CDE000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explorku.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Microsoft\Windows\CurrentVersion\Run\e1ebca2afa.exe = "C:\\Users\\Admin\\1000006002\\e1ebca2afa.exe" explorku.exe -
Processes:
6fba5a67a20fffc5773724d7d5fddcf5e66c3559c95a9c77e45ceb42d3896e5d.exeexplorku.exee1ebca2afa.exeexplorku.exeexplorku.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6fba5a67a20fffc5773724d7d5fddcf5e66c3559c95a9c77e45ceb42d3896e5d.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorku.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e1ebca2afa.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorku.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorku.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
amers.exeaxplons.exeaxplons.exeaxplons.exepid process 868 amers.exe 1288 axplons.exe 3584 axplons.exe 4788 axplons.exe -
Drops file in Windows directory 2 IoCs
Processes:
6fba5a67a20fffc5773724d7d5fddcf5e66c3559c95a9c77e45ceb42d3896e5d.exeamers.exedescription ioc process File created C:\Windows\Tasks\explorku.job 6fba5a67a20fffc5773724d7d5fddcf5e66c3559c95a9c77e45ceb42d3896e5d.exe File created C:\Windows\Tasks\axplons.job amers.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
amers.exeaxplons.exeaxplons.exeaxplons.exepid process 868 amers.exe 868 amers.exe 1288 axplons.exe 1288 axplons.exe 3584 axplons.exe 3584 axplons.exe 4788 axplons.exe 4788 axplons.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
6fba5a67a20fffc5773724d7d5fddcf5e66c3559c95a9c77e45ceb42d3896e5d.exeexplorku.exeamers.exedescription pid process target process PID 3912 wrote to memory of 2076 3912 6fba5a67a20fffc5773724d7d5fddcf5e66c3559c95a9c77e45ceb42d3896e5d.exe explorku.exe PID 3912 wrote to memory of 2076 3912 6fba5a67a20fffc5773724d7d5fddcf5e66c3559c95a9c77e45ceb42d3896e5d.exe explorku.exe PID 3912 wrote to memory of 2076 3912 6fba5a67a20fffc5773724d7d5fddcf5e66c3559c95a9c77e45ceb42d3896e5d.exe explorku.exe PID 2076 wrote to memory of 412 2076 explorku.exe explorku.exe PID 2076 wrote to memory of 412 2076 explorku.exe explorku.exe PID 2076 wrote to memory of 412 2076 explorku.exe explorku.exe PID 2076 wrote to memory of 868 2076 explorku.exe amers.exe PID 2076 wrote to memory of 868 2076 explorku.exe amers.exe PID 2076 wrote to memory of 868 2076 explorku.exe amers.exe PID 868 wrote to memory of 1288 868 amers.exe axplons.exe PID 868 wrote to memory of 1288 868 amers.exe axplons.exe PID 868 wrote to memory of 1288 868 amers.exe axplons.exe PID 2076 wrote to memory of 3120 2076 explorku.exe e1ebca2afa.exe PID 2076 wrote to memory of 3120 2076 explorku.exe e1ebca2afa.exe PID 2076 wrote to memory of 3120 2076 explorku.exe e1ebca2afa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fba5a67a20fffc5773724d7d5fddcf5e66c3559c95a9c77e45ceb42d3896e5d.exe"C:\Users\Admin\AppData\Local\Temp\6fba5a67a20fffc5773724d7d5fddcf5e66c3559c95a9c77e45ceb42d3896e5d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe"3⤵PID:412
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\amers.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\amers.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1288
-
-
-
C:\Users\Admin\1000006002\e1ebca2afa.exe"C:\Users\Admin\1000006002\e1ebca2afa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:3120
-
-
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3584
-
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exeC:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:1504
-
C:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exeC:\Users\Admin\AppData\Local\Temp\7af68cdb52\axplons.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
C:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exeC:\Users\Admin\AppData\Local\Temp\908f070dff\explorku.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD529ae760d21e9a54c50daaf021b7e2ffc
SHA11114b6e97e0da531fd763aaf46146908f8a067a9
SHA2568a77b3b86e0da5f55e682ea9871014ec07ee7813a88a26f74dd0747675959d55
SHA512f5ac0e28451d9b81eb7b891d4e9555104d418b8f68cddf82fa210e6a642339a6e6f1c795257c219dd01d225420c37962813931a27d3049e4fea2430867f9ca50
-
Filesize
1.8MB
MD576b3df90091f71476b4f7dbbe57aabad
SHA1b8d504ed9a2bc2b88a7561df8359977054c2432f
SHA2569b0acd138f37415b01b9c5bba267c2fbe893fff81d109f886a1cf4edb8443220
SHA512dd6071855345d17df57cafb75dd54363fc5da4f84e0a71920db3eb10c4dcc1a484d8dcfe1541f127afefd3167dfa22e078dfbb4f07cb4989338eb0ac2c8ee5d8
-
Filesize
1.7MB
MD5445c97f698db73056437f42b1d431f93
SHA1b70ee72867b8faa0039e552555191c6006bfca2b
SHA2566fba5a67a20fffc5773724d7d5fddcf5e66c3559c95a9c77e45ceb42d3896e5d
SHA5122099798eb9451b442bd500615c4f5bd1ad950ff9d9fb61dc2dbbf6f34bf1c26b9476fb281d4542e609c5f0e72ef60f7d3d10afa244b2e6bfbdb71008776f75fe