Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    27-05-2024 12:56

General

  • Target

    dcbd7372953671d87c0268de8850fffd46a39a01f00779c88b40badd09d6ca40.exe

  • Size

    1.8MB

  • MD5

    d2b2c8565a8d5aa384faffd642f372c1

  • SHA1

    08c0828d68a9a09ee12581a630527e6c9cb1dd24

  • SHA256

    dcbd7372953671d87c0268de8850fffd46a39a01f00779c88b40badd09d6ca40

  • SHA512

    fd150df2a19f196499f6f2d3af1f2f7c1766c1349372dd080464d8bd65330e9578382807a358102b2cfc200b19a9a08d8c37915df18642da6ac24a58a07424a6

  • SSDEEP

    49152:r18ALGH0pe8dchvvLmnBXkGLMrrk1UsdaiQ97n:3dwzvvy2GLMeRU7

Malware Config

Extracted

Family

amadey

Version

4.21

Botnet

0e6740

C2

http://147.45.47.155

Attributes
  • install_dir

    9217037dc9

  • install_file

    explortu.exe

  • strings_key

    8e894a8a4a3d0da8924003a561cfb244

  • url_paths

    /ku4Nor9/index.php

rc4.plain

Extracted

Family

amadey

Version

4.21

Botnet

49e482

C2

http://147.45.47.70

Attributes
  • install_dir

    1b29d73536

  • install_file

    axplont.exe

  • strings_key

    4d31dd1a190d9879c21fac6d87dc0043

  • url_paths

    /tr8nomy/index.php

rc4.plain

Extracted

Family

xehook

Version

2.1.5 Stable

C2

https://ussrconnect.ru/

https://c0nnect1ng.ru/

https://vodkaenjoy.ru/

Attributes
  • id

    105

  • token

    xehook105401801

Extracted

Family

risepro

C2

147.45.47.126:58709

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Xehook Payload 1 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Xehook stealer

    Xehook is an infostealer written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcbd7372953671d87c0268de8850fffd46a39a01f00779c88b40badd09d6ca40.exe
    "C:\Users\Admin\AppData\Local\Temp\dcbd7372953671d87c0268de8850fffd46a39a01f00779c88b40badd09d6ca40.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1380
      • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
        "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
        3⤵
          PID:3556
        • C:\Users\Admin\1000004002\9a763d443c.exe
          "C:\Users\Admin\1000004002\9a763d443c.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3656
          • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
            "C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:384
            • C:\Users\Admin\AppData\Local\Temp\1000025001\victor.exe
              "C:\Users\Admin\AppData\Local\Temp\1000025001\victor.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1624
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                6⤵
                  PID:5072
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  6⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3084
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 292
                  6⤵
                  • Program crash
                  PID:1892
          • C:\Users\Admin\AppData\Local\Temp\1000005001\ad549f6435.exe
            "C:\Users\Admin\AppData\Local\Temp\1000005001\ad549f6435.exe"
            3⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:4984
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1624 -ip 1624
        1⤵
          PID:4784
        • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
          C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
          1⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:2912
        • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
          C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
          1⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:1308
        • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
          C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
          1⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:4344
        • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
          C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
          1⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:3976

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\1000004002\9a763d443c.exe
          Filesize

          1.8MB

          MD5

          32f7a46f6cbbc48e7aa90300642081e8

          SHA1

          db40f5c3bc65b7a672730aa1f4860abb68c69d81

          SHA256

          13775e77526c889dccf3eb528a1dc0990441d9aaf5529ba9be9ba56f877940c4

          SHA512

          f0c5da7152d6e7b36e28f2dd96cadff965cf63a206c3b98bcae3d07e7a092a7ab8224a36bf4e81f6cb5fdf05fdd997c73faf9f2ab8390866c64d58e436d70c91

        • C:\Users\Admin\AppData\Local\Temp\1000005001\ad549f6435.exe
          Filesize

          2.3MB

          MD5

          ab38578e35ae1205f21c424ca5dc6430

          SHA1

          171cbd1332ab542dbd4ca737a5f02dac310945d6

          SHA256

          39a0739e5109bbb47d01fa421b6ca459ac9bd0e7ff82286e4bf431c4b1db4cfe

          SHA512

          945cbc2469bedbc8111a13159cad86f174b4f045326f858dc3400714314d96cad054a4b0d03aef5dc63c6c6f8dd3a2c71d68ca737368bc47ee1c4e8fd2a8ca9b

        • C:\Users\Admin\AppData\Local\Temp\1000025001\victor.exe
          Filesize

          1.0MB

          MD5

          585d16749fda38cb7f8a987137890167

          SHA1

          0b3f1064b2f0ddf397552e442e99e1c233c67df1

          SHA256

          496219a22d96d4eb4c699045521b7fa73bba242d4e84e62f565e8d8046fa00c5

          SHA512

          784c3a2e3fa3e90f57ed059a5bc204441da3ebc173a93b67e752f84cc2e2cf0f4ddc49aabeaa3233053e49d51633f6bb93a90c0735292084305b00bf79b2c632

        • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
          Filesize

          1.8MB

          MD5

          d2b2c8565a8d5aa384faffd642f372c1

          SHA1

          08c0828d68a9a09ee12581a630527e6c9cb1dd24

          SHA256

          dcbd7372953671d87c0268de8850fffd46a39a01f00779c88b40badd09d6ca40

          SHA512

          fd150df2a19f196499f6f2d3af1f2f7c1766c1349372dd080464d8bd65330e9578382807a358102b2cfc200b19a9a08d8c37915df18642da6ac24a58a07424a6

        • memory/384-122-0x0000000000D30000-0x00000000011EF000-memory.dmp
          Filesize

          4.7MB

        • memory/384-150-0x0000000000D30000-0x00000000011EF000-memory.dmp
          Filesize

          4.7MB

        • memory/384-134-0x0000000000D30000-0x00000000011EF000-memory.dmp
          Filesize

          4.7MB

        • memory/384-131-0x0000000000D30000-0x00000000011EF000-memory.dmp
          Filesize

          4.7MB

        • memory/384-128-0x0000000000D30000-0x00000000011EF000-memory.dmp
          Filesize

          4.7MB

        • memory/384-125-0x0000000000D30000-0x00000000011EF000-memory.dmp
          Filesize

          4.7MB

        • memory/384-98-0x0000000000D30000-0x00000000011EF000-memory.dmp
          Filesize

          4.7MB

        • memory/384-147-0x0000000000D30000-0x00000000011EF000-memory.dmp
          Filesize

          4.7MB

        • memory/384-103-0x0000000000D30000-0x00000000011EF000-memory.dmp
          Filesize

          4.7MB

        • memory/384-137-0x0000000000D30000-0x00000000011EF000-memory.dmp
          Filesize

          4.7MB

        • memory/384-107-0x0000000000D30000-0x00000000011EF000-memory.dmp
          Filesize

          4.7MB

        • memory/384-113-0x0000000000D30000-0x00000000011EF000-memory.dmp
          Filesize

          4.7MB

        • memory/384-72-0x0000000000D30000-0x00000000011EF000-memory.dmp
          Filesize

          4.7MB

        • memory/384-153-0x0000000000D30000-0x00000000011EF000-memory.dmp
          Filesize

          4.7MB

        • memory/384-110-0x0000000000D30000-0x00000000011EF000-memory.dmp
          Filesize

          4.7MB

        • memory/1308-117-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/1308-119-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/1380-129-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/1380-148-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/1380-126-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/1380-95-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/1380-94-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/1380-151-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/1380-99-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/1380-123-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/1380-100-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/1380-101-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/1380-20-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/1380-18-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/1380-21-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/1380-105-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/1380-141-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/1380-19-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/1380-108-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/1380-135-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/1380-132-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/1380-111-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/1380-120-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/1624-88-0x0000000000CA0000-0x0000000000CA1000-memory.dmp
          Filesize

          4KB

        • memory/1624-90-0x0000000000CA0000-0x0000000000CA1000-memory.dmp
          Filesize

          4KB

        • memory/2912-115-0x0000000000D30000-0x00000000011EF000-memory.dmp
          Filesize

          4.7MB

        • memory/2912-118-0x0000000000D30000-0x00000000011EF000-memory.dmp
          Filesize

          4.7MB

        • memory/2932-0-0x0000000000F90000-0x0000000001424000-memory.dmp
          Filesize

          4.6MB

        • memory/2932-17-0x0000000000F90000-0x0000000001424000-memory.dmp
          Filesize

          4.6MB

        • memory/2932-5-0x0000000000F90000-0x0000000001424000-memory.dmp
          Filesize

          4.6MB

        • memory/2932-3-0x0000000000F90000-0x0000000001424000-memory.dmp
          Filesize

          4.6MB

        • memory/2932-2-0x0000000000F91000-0x0000000000FBF000-memory.dmp
          Filesize

          184KB

        • memory/2932-1-0x0000000077476000-0x0000000077478000-memory.dmp
          Filesize

          8KB

        • memory/3084-89-0x0000000000400000-0x000000000042C000-memory.dmp
          Filesize

          176KB

        • memory/3084-92-0x0000000005F90000-0x0000000006022000-memory.dmp
          Filesize

          584KB

        • memory/3084-93-0x0000000005E10000-0x0000000005E76000-memory.dmp
          Filesize

          408KB

        • memory/3084-91-0x00000000052F0000-0x0000000005896000-memory.dmp
          Filesize

          5.6MB

        • memory/3656-39-0x0000000000440000-0x00000000008FF000-memory.dmp
          Filesize

          4.7MB

        • memory/3656-70-0x0000000000440000-0x00000000008FF000-memory.dmp
          Filesize

          4.7MB

        • memory/3976-145-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/3976-142-0x0000000000E50000-0x00000000012E4000-memory.dmp
          Filesize

          4.6MB

        • memory/4344-139-0x0000000000D30000-0x00000000011EF000-memory.dmp
          Filesize

          4.7MB

        • memory/4344-144-0x0000000000D30000-0x00000000011EF000-memory.dmp
          Filesize

          4.7MB

        • memory/4984-130-0x0000000000270000-0x000000000084D000-memory.dmp
          Filesize

          5.9MB

        • memory/4984-109-0x0000000000270000-0x000000000084D000-memory.dmp
          Filesize

          5.9MB

        • memory/4984-133-0x0000000000270000-0x000000000084D000-memory.dmp
          Filesize

          5.9MB

        • memory/4984-124-0x0000000000270000-0x000000000084D000-memory.dmp
          Filesize

          5.9MB

        • memory/4984-146-0x0000000000270000-0x000000000084D000-memory.dmp
          Filesize

          5.9MB

        • memory/4984-58-0x0000000000270000-0x000000000084D000-memory.dmp
          Filesize

          5.9MB

        • memory/4984-136-0x0000000000270000-0x000000000084D000-memory.dmp
          Filesize

          5.9MB

        • memory/4984-112-0x0000000000270000-0x000000000084D000-memory.dmp
          Filesize

          5.9MB

        • memory/4984-106-0x0000000000270000-0x000000000084D000-memory.dmp
          Filesize

          5.9MB

        • memory/4984-104-0x0000000000270000-0x000000000084D000-memory.dmp
          Filesize

          5.9MB

        • memory/4984-102-0x0000000000270000-0x000000000084D000-memory.dmp
          Filesize

          5.9MB

        • memory/4984-149-0x0000000000270000-0x000000000084D000-memory.dmp
          Filesize

          5.9MB

        • memory/4984-127-0x0000000000270000-0x000000000084D000-memory.dmp
          Filesize

          5.9MB

        • memory/4984-97-0x0000000000270000-0x000000000084D000-memory.dmp
          Filesize

          5.9MB

        • memory/4984-121-0x0000000000270000-0x000000000084D000-memory.dmp
          Filesize

          5.9MB

        • memory/4984-152-0x0000000000270000-0x000000000084D000-memory.dmp
          Filesize

          5.9MB