Analysis
-
max time kernel
149s -
max time network
132s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-05-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
2a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893.exe
Resource
win10v2004-20240508-en
General
-
Target
2a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893.exe
-
Size
1.8MB
-
MD5
9086b8ef6ee84dc302b9cab65774fb91
-
SHA1
b6a78a108cb3175977d2eef842d4577aad75d1a7
-
SHA256
2a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893
-
SHA512
426e766939141638940ec6a737d1e21ed7f78d0f7d8464693652642caf603db5b65db51a06e0f7655c1f6d1bcc2cd7f6ef4245f9e8363c525a2341653c2a9806
-
SSDEEP
49152:5GeoXOcYZXO9fWy+1vB4v/qeh6q9zl2EbPyeTiAgZ:Y7aJO5/Ow/bE42f4Xg
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
risepro
147.45.47.126:58709
Extracted
amadey
4.21
49e482
http://147.45.47.70
-
install_dir
1b29d73536
-
install_file
axplont.exe
-
strings_key
4d31dd1a190d9879c21fac6d87dc0043
-
url_paths
/tr8nomy/index.php
Extracted
xehook
2.1.5 Stable
https://ussrconnect.ru/
https://c0nnect1ng.ru/
https://vodkaenjoy.ru/
-
id
105
-
token
xehook105401801
Signatures
-
Detect Xehook Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1972-125-0x0000000000400000-0x000000000042C000-memory.dmp family_xehook -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
Processes:
2a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893.exeexplortu.exeexplortu.exeaxplont.exeexplortu.exeaxplont.exeexplortu.exef27a674c45.exeaxplont.execf2af46ac8.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f27a674c45.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cf2af46ac8.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explortu.exe2a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893.exef27a674c45.exeaxplont.exeexplortu.exeaxplont.exeexplortu.exeexplortu.exeaxplont.execf2af46ac8.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f27a674c45.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cf2af46ac8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f27a674c45.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cf2af46ac8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe -
Executes dropped EXE 10 IoCs
Processes:
explortu.exeexplortu.exef27a674c45.exeaxplont.execf2af46ac8.exevictor.exeexplortu.exeaxplont.exeexplortu.exeaxplont.exepid Process 1264 explortu.exe 3184 explortu.exe 3772 f27a674c45.exe 688 axplont.exe 4660 cf2af46ac8.exe 4272 victor.exe 4920 explortu.exe 1180 axplont.exe 2264 explortu.exe 2428 axplont.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
explortu.exeaxplont.exeexplortu.exe2a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893.exeexplortu.exef27a674c45.execf2af46ac8.exeexplortu.exeaxplont.exeaxplont.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine 2a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine f27a674c45.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine cf2af46ac8.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine axplont.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explortu.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Microsoft\Windows\CurrentVersion\Run\cf2af46ac8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000005001\\cf2af46ac8.exe" explortu.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
Processes:
2a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893.exeexplortu.exeexplortu.exef27a674c45.exeaxplont.execf2af46ac8.exeexplortu.exeaxplont.exeaxplont.exeexplortu.exepid Process 2880 2a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893.exe 1264 explortu.exe 3184 explortu.exe 3772 f27a674c45.exe 688 axplont.exe 4660 cf2af46ac8.exe 4920 explortu.exe 1180 axplont.exe 2428 axplont.exe 2264 explortu.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
explortu.exevictor.exedescription pid Process procid_target PID 1264 set thread context of 3184 1264 explortu.exe 86 PID 4272 set thread context of 1972 4272 victor.exe 91 -
Drops file in Windows directory 2 IoCs
Processes:
2a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893.exef27a674c45.exedescription ioc Process File created C:\Windows\Tasks\explortu.job 2a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893.exe File created C:\Windows\Tasks\axplont.job f27a674c45.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4916 4272 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
2a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893.exeexplortu.exeexplortu.exef27a674c45.exeaxplont.execf2af46ac8.exeexplortu.exeaxplont.exeaxplont.exeexplortu.exepid Process 2880 2a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893.exe 2880 2a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893.exe 1264 explortu.exe 1264 explortu.exe 3184 explortu.exe 3184 explortu.exe 3772 f27a674c45.exe 3772 f27a674c45.exe 688 axplont.exe 688 axplont.exe 4660 cf2af46ac8.exe 4660 cf2af46ac8.exe 4920 explortu.exe 4920 explortu.exe 1180 axplont.exe 1180 axplont.exe 2428 axplont.exe 2428 axplont.exe 2264 explortu.exe 2264 explortu.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegAsm.exedescription pid Process Token: SeDebugPrivilege 1972 RegAsm.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
2a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893.exeexplortu.exef27a674c45.exeaxplont.exevictor.exedescription pid Process procid_target PID 2880 wrote to memory of 1264 2880 2a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893.exe 82 PID 2880 wrote to memory of 1264 2880 2a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893.exe 82 PID 2880 wrote to memory of 1264 2880 2a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893.exe 82 PID 1264 wrote to memory of 3184 1264 explortu.exe 86 PID 1264 wrote to memory of 3184 1264 explortu.exe 86 PID 1264 wrote to memory of 3184 1264 explortu.exe 86 PID 1264 wrote to memory of 3184 1264 explortu.exe 86 PID 1264 wrote to memory of 3184 1264 explortu.exe 86 PID 1264 wrote to memory of 3184 1264 explortu.exe 86 PID 1264 wrote to memory of 3184 1264 explortu.exe 86 PID 1264 wrote to memory of 3184 1264 explortu.exe 86 PID 1264 wrote to memory of 3184 1264 explortu.exe 86 PID 1264 wrote to memory of 3184 1264 explortu.exe 86 PID 1264 wrote to memory of 3184 1264 explortu.exe 86 PID 1264 wrote to memory of 3184 1264 explortu.exe 86 PID 1264 wrote to memory of 3772 1264 explortu.exe 87 PID 1264 wrote to memory of 3772 1264 explortu.exe 87 PID 1264 wrote to memory of 3772 1264 explortu.exe 87 PID 3772 wrote to memory of 688 3772 f27a674c45.exe 88 PID 3772 wrote to memory of 688 3772 f27a674c45.exe 88 PID 3772 wrote to memory of 688 3772 f27a674c45.exe 88 PID 1264 wrote to memory of 4660 1264 explortu.exe 89 PID 1264 wrote to memory of 4660 1264 explortu.exe 89 PID 1264 wrote to memory of 4660 1264 explortu.exe 89 PID 688 wrote to memory of 4272 688 axplont.exe 90 PID 688 wrote to memory of 4272 688 axplont.exe 90 PID 688 wrote to memory of 4272 688 axplont.exe 90 PID 4272 wrote to memory of 1972 4272 victor.exe 91 PID 4272 wrote to memory of 1972 4272 victor.exe 91 PID 4272 wrote to memory of 1972 4272 victor.exe 91 PID 4272 wrote to memory of 1972 4272 victor.exe 91 PID 4272 wrote to memory of 1972 4272 victor.exe 91 PID 4272 wrote to memory of 1972 4272 victor.exe 91 PID 4272 wrote to memory of 1972 4272 victor.exe 91 PID 4272 wrote to memory of 1972 4272 victor.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893.exe"C:\Users\Admin\AppData\Local\Temp\2a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
C:\Users\Admin\1000004002\f27a674c45.exe"C:\Users\Admin\1000004002\f27a674c45.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\1000025001\victor.exe"C:\Users\Admin\AppData\Local\Temp\1000025001\victor.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 2686⤵
- Program crash
PID:4916
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\cf2af46ac8.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\cf2af46ac8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4272 -ip 42721⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2264
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5b9391180ca5ecf85b1355a8ab9e7788c
SHA14333a0cce449658f915c40531536284d08749641
SHA2565e37c478830203d0789606f447d9ff7e6457ab7c3e65ac460bbcef65d2cb2cba
SHA512bbdbdaad930a56d000b030a539cf332bf677fcad3da9effcc3e5795db6835ab0750d45ee48647902aee121884cda6b0aba36e95c70e7b599643698b2677b6458
-
Filesize
2.4MB
MD580ae5cbd00679a40fb626eb6bff225fc
SHA191c83604f19ae911ab7d21ef089adf15b9274277
SHA256b219a659c47935b91907c4f39270bf6aa01fcdc5958ec88fc16802a0cfdcc5bd
SHA5120e2a4509fd7f3f4c0ff9f7372c93b989696312cca21cd6507e8addec106e594bed6ef5f15555c030807759ccb9d1d33c92b0bf913cb86dd318914cb146882b10
-
Filesize
1.0MB
MD5585d16749fda38cb7f8a987137890167
SHA10b3f1064b2f0ddf397552e442e99e1c233c67df1
SHA256496219a22d96d4eb4c699045521b7fa73bba242d4e84e62f565e8d8046fa00c5
SHA512784c3a2e3fa3e90f57ed059a5bc204441da3ebc173a93b67e752f84cc2e2cf0f4ddc49aabeaa3233053e49d51633f6bb93a90c0735292084305b00bf79b2c632
-
Filesize
1.8MB
MD59086b8ef6ee84dc302b9cab65774fb91
SHA1b6a78a108cb3175977d2eef842d4577aad75d1a7
SHA2562a7bcc744f190d188bd472926addd188b18cfc6074a00c50c6f39fc16e383893
SHA512426e766939141638940ec6a737d1e21ed7f78d0f7d8464693652642caf603db5b65db51a06e0f7655c1f6d1bcc2cd7f6ef4245f9e8363c525a2341653c2a9806