Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-05-2024 11:41
Static task
static1
Behavioral task
behavioral1
Sample
80c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824.exe
Resource
win10v2004-20240426-en
General
-
Target
80c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824.exe
-
Size
1.8MB
-
MD5
3b6ccfbc8b3a991f4bd7468919a56740
-
SHA1
7cb856253982d7d53ad9339456d9a2deff99c640
-
SHA256
80c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824
-
SHA512
c83570de37683c51723644860cd45a6f240bab1e84a05a93ecb8dc65d54f33eb222d90c1448aa49d8d44133c1ed9ff22a735f1d2209b7ed25ca22c14cd99aff3
-
SSDEEP
49152:qTqti3dhmBnGHALjTufYMyQVV2Th8DnkxZa:qTh3QGQuU5h2nU
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
amadey
4.21
49e482
http://147.45.47.70
-
install_dir
1b29d73536
-
install_file
axplont.exe
-
strings_key
4d31dd1a190d9879c21fac6d87dc0043
-
url_paths
/tr8nomy/index.php
Extracted
risepro
147.45.47.126:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
Processes:
explortu.exe4e3ebf4b98.exeexplortu.exed7807ec3e1.exeaxplont.exeexplortu.exeaxplont.exe80c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824.exeexplortu.exeaxplont.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4e3ebf4b98.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d7807ec3e1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 80c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explortu.exed7807ec3e1.exeexplortu.exeaxplont.exeexplortu.exeaxplont.exeexplortu.exe4e3ebf4b98.exeaxplont.exe80c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d7807ec3e1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4e3ebf4b98.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d7807ec3e1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 80c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 80c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4e3ebf4b98.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe -
Executes dropped EXE 9 IoCs
Processes:
explortu.exe4e3ebf4b98.exeaxplont.exeexplortu.exed7807ec3e1.exeaxplont.exeexplortu.exeaxplont.exeexplortu.exepid Process 2624 explortu.exe 2360 4e3ebf4b98.exe 3256 axplont.exe 4368 explortu.exe 3564 d7807ec3e1.exe 400 axplont.exe 4660 explortu.exe 4404 axplont.exe 5028 explortu.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
4e3ebf4b98.exeexplortu.exe80c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824.exeaxplont.exed7807ec3e1.exeaxplont.exeexplortu.exeaxplont.exeexplortu.exeexplortu.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine 4e3ebf4b98.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine 80c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine d7807ec3e1.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine explortu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explortu.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows\CurrentVersion\Run\d7807ec3e1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000005001\\d7807ec3e1.exe" explortu.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
Processes:
80c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824.exeexplortu.exe4e3ebf4b98.exeaxplont.exeexplortu.exed7807ec3e1.exeaxplont.exeexplortu.exeaxplont.exeexplortu.exepid Process 4892 80c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824.exe 2624 explortu.exe 2360 4e3ebf4b98.exe 3256 axplont.exe 4368 explortu.exe 3564 d7807ec3e1.exe 400 axplont.exe 4660 explortu.exe 4404 axplont.exe 5028 explortu.exe -
Drops file in Windows directory 2 IoCs
Processes:
80c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824.exe4e3ebf4b98.exedescription ioc Process File created C:\Windows\Tasks\explortu.job 80c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824.exe File created C:\Windows\Tasks\axplont.job 4e3ebf4b98.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
80c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824.exeexplortu.exe4e3ebf4b98.exeaxplont.exeexplortu.exed7807ec3e1.exeaxplont.exeexplortu.exeaxplont.exeexplortu.exepid Process 4892 80c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824.exe 4892 80c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824.exe 2624 explortu.exe 2624 explortu.exe 2360 4e3ebf4b98.exe 2360 4e3ebf4b98.exe 3256 axplont.exe 3256 axplont.exe 4368 explortu.exe 4368 explortu.exe 3564 d7807ec3e1.exe 3564 d7807ec3e1.exe 400 axplont.exe 400 axplont.exe 4660 explortu.exe 4660 explortu.exe 4404 axplont.exe 4404 axplont.exe 5028 explortu.exe 5028 explortu.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
80c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824.exeexplortu.exe4e3ebf4b98.exedescription pid Process procid_target PID 4892 wrote to memory of 2624 4892 80c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824.exe 79 PID 4892 wrote to memory of 2624 4892 80c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824.exe 79 PID 4892 wrote to memory of 2624 4892 80c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824.exe 79 PID 2624 wrote to memory of 3692 2624 explortu.exe 80 PID 2624 wrote to memory of 3692 2624 explortu.exe 80 PID 2624 wrote to memory of 3692 2624 explortu.exe 80 PID 2624 wrote to memory of 2360 2624 explortu.exe 81 PID 2624 wrote to memory of 2360 2624 explortu.exe 81 PID 2624 wrote to memory of 2360 2624 explortu.exe 81 PID 2360 wrote to memory of 3256 2360 4e3ebf4b98.exe 82 PID 2360 wrote to memory of 3256 2360 4e3ebf4b98.exe 82 PID 2360 wrote to memory of 3256 2360 4e3ebf4b98.exe 82 PID 2624 wrote to memory of 3564 2624 explortu.exe 84 PID 2624 wrote to memory of 3564 2624 explortu.exe 84 PID 2624 wrote to memory of 3564 2624 explortu.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\80c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824.exe"C:\Users\Admin\AppData\Local\Temp\80c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵PID:3692
-
-
C:\Users\Admin\1000004002\4e3ebf4b98.exe"C:\Users\Admin\1000004002\4e3ebf4b98.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3256
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\d7807ec3e1.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\d7807ec3e1.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3564
-
-
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:400
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD580bc99d64b9257994e7bc2ab96e0337e
SHA1b3deaec71aa2522a9338e57e0d53f2472e04328f
SHA256f71124b31207f487d9c9053de3bae678b56df3efc3cd8545eba380ebbcaab5f7
SHA5126fa3a0a8826828d3c3326fe5b8a5d74927088946d631a030f97a42682dd612d279c000fd18ab580326e0c86e852d4d186fefa5ed977626f8fa527dee27fe6dbf
-
Filesize
2.3MB
MD53550965ed383edb2c5bdb7af7721002a
SHA136dcb4ba64f2df6eeba24ed1ddd8a51737950675
SHA2569f89388df5852f3bf19ed07e10d4f019d87f6a3333a11560d840c9b371ed16bb
SHA5126863b0685d30bc6aaff588a0990f42a738d39f707612956859d6f9a542b423b0eeb7ef7e5ad19c1ecf8b06ea9375ba25448e1db3838d6ed4195dce6b3856a648
-
Filesize
1.8MB
MD53b6ccfbc8b3a991f4bd7468919a56740
SHA17cb856253982d7d53ad9339456d9a2deff99c640
SHA25680c90de3b68047e0c18a8314c2287847e1c7cf534b65663fc1133b8514d9c824
SHA512c83570de37683c51723644860cd45a6f240bab1e84a05a93ecb8dc65d54f33eb222d90c1448aa49d8d44133c1ed9ff22a735f1d2209b7ed25ca22c14cd99aff3