Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    26-05-2024 04:30

General

  • Target

    86113573183316c6651feb5d3739a6dbe3d4a248b26777501f33c813ddd2a397.exe

  • Size

    1.8MB

  • MD5

    83a4172891b308c57bb11745b77c6413

  • SHA1

    82acdcdae8d9ed1bab00ec3e865541ebe9e1df69

  • SHA256

    86113573183316c6651feb5d3739a6dbe3d4a248b26777501f33c813ddd2a397

  • SHA512

    ec65de3d32edd8ea06a51d8b9630b84d03ba1a70545f432222759524a67b848d2f1d572059676d4e6a5132350eaf43123092b085b9bfca5363d3affe59ee7839

  • SSDEEP

    49152:G6dnw3DgInp9oXvi6mE4nN2+dZ8Dy0H4:11w3D9DoXORNtdkxH

Malware Config

Extracted

Family

amadey

Version

4.21

Botnet

0e6740

C2

http://147.45.47.155

Attributes
  • install_dir

    9217037dc9

  • install_file

    explortu.exe

  • strings_key

    8e894a8a4a3d0da8924003a561cfb244

  • url_paths

    /ku4Nor9/index.php

rc4.plain

Extracted

Family

amadey

Version

4.21

Botnet

49e482

C2

http://147.45.47.70

Attributes
  • install_dir

    1b29d73536

  • install_file

    axplont.exe

  • strings_key

    4d31dd1a190d9879c21fac6d87dc0043

  • url_paths

    /tr8nomy/index.php

rc4.plain

Extracted

Family

risepro

C2

147.45.47.126:58709

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86113573183316c6651feb5d3739a6dbe3d4a248b26777501f33c813ddd2a397.exe
    "C:\Users\Admin\AppData\Local\Temp\86113573183316c6651feb5d3739a6dbe3d4a248b26777501f33c813ddd2a397.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4468
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3864
      • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
        "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
        3⤵
          PID:2888
        • C:\Users\Admin\1000004002\e735db492c.exe
          "C:\Users\Admin\1000004002\e735db492c.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1916
          • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
            "C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:868
        • C:\Users\Admin\AppData\Local\Temp\1000005001\ca6606d453.exe
          "C:\Users\Admin\AppData\Local\Temp\1000005001\ca6606d453.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:1920
    • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
      C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:1084
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:2324
    • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
      C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:4356
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:416
    • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
      C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:2896
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:4064

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Virtualization/Sandbox Evasion

    2
    T1497

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    3
    T1012

    Virtualization/Sandbox Evasion

    2
    T1497

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\1000004002\e735db492c.exe
      Filesize

      1.8MB

      MD5

      0bec09b1c1da813d14043c3b7346028a

      SHA1

      5e98889bd5370990fe88a36a782befec6f08cd94

      SHA256

      3edef83d8d85e81a67c3d581f3617874cbc133002618b9483e3e10da97ca9edd

      SHA512

      b83adf55b90b8102681578c11e2ae23e95c359205781aeb94380bb3477010dde39c0552c59c8c9a2b4e30181274e5548e63c08251c00557c2d26c54c25105517

    • C:\Users\Admin\AppData\Local\Temp\1000005001\ca6606d453.exe
      Filesize

      2.3MB

      MD5

      4b33b5ab5512fdc6af1e6cd034ec6c49

      SHA1

      75336131e759e6406df0eb041f3db55f771172de

      SHA256

      86b69c0940863c4432bf62be9ef8be173e09b374ce3297abd145a8159ccdea5a

      SHA512

      1fae97add24531f83c5a9fdc99fca17f9f18915ac71067aa18ec27f5658bf6ae29dc8bc01437cbfe0693ae6fceecb08f290f13ceb51b719212df385e64caf543

    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      Filesize

      1.8MB

      MD5

      83a4172891b308c57bb11745b77c6413

      SHA1

      82acdcdae8d9ed1bab00ec3e865541ebe9e1df69

      SHA256

      86113573183316c6651feb5d3739a6dbe3d4a248b26777501f33c813ddd2a397

      SHA512

      ec65de3d32edd8ea06a51d8b9630b84d03ba1a70545f432222759524a67b848d2f1d572059676d4e6a5132350eaf43123092b085b9bfca5363d3affe59ee7839

    • memory/416-105-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/416-107-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/868-124-0x00000000004D0000-0x000000000098B000-memory.dmp
      Filesize

      4.7MB

    • memory/868-114-0x00000000004D0000-0x000000000098B000-memory.dmp
      Filesize

      4.7MB

    • memory/868-99-0x00000000004D0000-0x000000000098B000-memory.dmp
      Filesize

      4.7MB

    • memory/868-121-0x00000000004D0000-0x000000000098B000-memory.dmp
      Filesize

      4.7MB

    • memory/868-94-0x00000000004D0000-0x000000000098B000-memory.dmp
      Filesize

      4.7MB

    • memory/868-109-0x00000000004D0000-0x000000000098B000-memory.dmp
      Filesize

      4.7MB

    • memory/868-133-0x00000000004D0000-0x000000000098B000-memory.dmp
      Filesize

      4.7MB

    • memory/868-96-0x00000000004D0000-0x000000000098B000-memory.dmp
      Filesize

      4.7MB

    • memory/868-85-0x00000000004D0000-0x000000000098B000-memory.dmp
      Filesize

      4.7MB

    • memory/868-53-0x00000000004D0000-0x000000000098B000-memory.dmp
      Filesize

      4.7MB

    • memory/868-86-0x00000000004D0000-0x000000000098B000-memory.dmp
      Filesize

      4.7MB

    • memory/868-90-0x00000000004D0000-0x000000000098B000-memory.dmp
      Filesize

      4.7MB

    • memory/868-117-0x00000000004D0000-0x000000000098B000-memory.dmp
      Filesize

      4.7MB

    • memory/868-82-0x00000000004D0000-0x000000000098B000-memory.dmp
      Filesize

      4.7MB

    • memory/868-111-0x00000000004D0000-0x000000000098B000-memory.dmp
      Filesize

      4.7MB

    • memory/1084-75-0x00000000004D0000-0x000000000098B000-memory.dmp
      Filesize

      4.7MB

    • memory/1084-79-0x00000000004D0000-0x000000000098B000-memory.dmp
      Filesize

      4.7MB

    • memory/1916-52-0x0000000000AE0000-0x0000000000F9B000-memory.dmp
      Filesize

      4.7MB

    • memory/1916-39-0x0000000000AE0000-0x0000000000F9B000-memory.dmp
      Filesize

      4.7MB

    • memory/1920-89-0x00000000005D0000-0x0000000000BA1000-memory.dmp
      Filesize

      5.8MB

    • memory/1920-119-0x00000000005D0000-0x0000000000BA1000-memory.dmp
      Filesize

      5.8MB

    • memory/1920-112-0x00000000005D0000-0x0000000000BA1000-memory.dmp
      Filesize

      5.8MB

    • memory/1920-134-0x00000000005D0000-0x0000000000BA1000-memory.dmp
      Filesize

      5.8MB

    • memory/1920-97-0x00000000005D0000-0x0000000000BA1000-memory.dmp
      Filesize

      5.8MB

    • memory/1920-116-0x00000000005D0000-0x0000000000BA1000-memory.dmp
      Filesize

      5.8MB

    • memory/1920-101-0x00000000005D0000-0x0000000000BA1000-memory.dmp
      Filesize

      5.8MB

    • memory/1920-88-0x00000000005D0000-0x0000000000BA1000-memory.dmp
      Filesize

      5.8MB

    • memory/1920-72-0x00000000005D0000-0x0000000000BA1000-memory.dmp
      Filesize

      5.8MB

    • memory/1920-83-0x00000000005D0000-0x0000000000BA1000-memory.dmp
      Filesize

      5.8MB

    • memory/1920-92-0x00000000005D0000-0x0000000000BA1000-memory.dmp
      Filesize

      5.8MB

    • memory/1920-110-0x00000000005D0000-0x0000000000BA1000-memory.dmp
      Filesize

      5.8MB

    • memory/1920-95-0x00000000005D0000-0x0000000000BA1000-memory.dmp
      Filesize

      5.8MB

    • memory/1920-122-0x00000000005D0000-0x0000000000BA1000-memory.dmp
      Filesize

      5.8MB

    • memory/1920-125-0x00000000005D0000-0x0000000000BA1000-memory.dmp
      Filesize

      5.8MB

    • memory/2324-78-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/2324-80-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/2896-127-0x00000000004D0000-0x000000000098B000-memory.dmp
      Filesize

      4.7MB

    • memory/2896-130-0x00000000004D0000-0x000000000098B000-memory.dmp
      Filesize

      4.7MB

    • memory/3864-73-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/3864-118-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/3864-100-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/3864-132-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/3864-98-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/3864-108-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/3864-93-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/3864-91-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/3864-87-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/3864-84-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/3864-113-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/3864-81-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/3864-115-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/3864-77-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/3864-18-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/3864-123-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/3864-21-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/3864-120-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/3864-20-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/3864-19-0x0000000000101000-0x000000000012F000-memory.dmp
      Filesize

      184KB

    • memory/4064-129-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/4064-131-0x0000000000100000-0x00000000005BD000-memory.dmp
      Filesize

      4.7MB

    • memory/4356-103-0x00000000004D0000-0x000000000098B000-memory.dmp
      Filesize

      4.7MB

    • memory/4356-106-0x00000000004D0000-0x000000000098B000-memory.dmp
      Filesize

      4.7MB

    • memory/4468-17-0x0000000000750000-0x0000000000C0D000-memory.dmp
      Filesize

      4.7MB

    • memory/4468-0-0x0000000000750000-0x0000000000C0D000-memory.dmp
      Filesize

      4.7MB

    • memory/4468-5-0x0000000000750000-0x0000000000C0D000-memory.dmp
      Filesize

      4.7MB

    • memory/4468-3-0x0000000000750000-0x0000000000C0D000-memory.dmp
      Filesize

      4.7MB

    • memory/4468-2-0x0000000000751000-0x000000000077F000-memory.dmp
      Filesize

      184KB

    • memory/4468-1-0x0000000076ED6000-0x0000000076ED8000-memory.dmp
      Filesize

      8KB