Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-05-2024 12:56
Static task
static1
Behavioral task
behavioral1
Sample
dcbd7372953671d87c0268de8850fffd46a39a01f00779c88b40badd09d6ca40.exe
Resource
win10v2004-20240508-en
General
-
Target
dcbd7372953671d87c0268de8850fffd46a39a01f00779c88b40badd09d6ca40.exe
-
Size
1.8MB
-
MD5
d2b2c8565a8d5aa384faffd642f372c1
-
SHA1
08c0828d68a9a09ee12581a630527e6c9cb1dd24
-
SHA256
dcbd7372953671d87c0268de8850fffd46a39a01f00779c88b40badd09d6ca40
-
SHA512
fd150df2a19f196499f6f2d3af1f2f7c1766c1349372dd080464d8bd65330e9578382807a358102b2cfc200b19a9a08d8c37915df18642da6ac24a58a07424a6
-
SSDEEP
49152:r18ALGH0pe8dchvvLmnBXkGLMrrk1UsdaiQ97n:3dwzvvy2GLMeRU7
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
amadey
4.21
49e482
http://147.45.47.70
-
install_dir
1b29d73536
-
install_file
axplont.exe
-
strings_key
4d31dd1a190d9879c21fac6d87dc0043
-
url_paths
/tr8nomy/index.php
Extracted
xehook
2.1.5 Stable
https://ussrconnect.ru/
https://c0nnect1ng.ru/
https://vodkaenjoy.ru/
-
id
105
-
token
xehook105401801
Extracted
risepro
147.45.47.126:58709
Signatures
-
Detect Xehook Payload 1 IoCs
resource yara_rule behavioral2/memory/3084-89-0x0000000000400000-0x000000000042C000-memory.dmp family_xehook -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dcbd7372953671d87c0268de8850fffd46a39a01f00779c88b40badd09d6ca40.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ad549f6435.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9a763d443c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ad549f6435.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dcbd7372953671d87c0268de8850fffd46a39a01f00779c88b40badd09d6ca40.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9a763d443c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ad549f6435.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dcbd7372953671d87c0268de8850fffd46a39a01f00779c88b40badd09d6ca40.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9a763d443c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe -
Executes dropped EXE 9 IoCs
pid Process 1380 explortu.exe 3656 9a763d443c.exe 4984 ad549f6435.exe 384 axplont.exe 1624 victor.exe 2912 axplont.exe 1308 explortu.exe 4344 axplont.exe 3976 explortu.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine dcbd7372953671d87c0268de8850fffd46a39a01f00779c88b40badd09d6ca40.exe Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine 9a763d443c.exe Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine ad549f6435.exe Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Wine explortu.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1230210488-3096403634-4129516247-1000\Software\Microsoft\Windows\CurrentVersion\Run\ad549f6435.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000005001\\ad549f6435.exe" explortu.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 2932 dcbd7372953671d87c0268de8850fffd46a39a01f00779c88b40badd09d6ca40.exe 1380 explortu.exe 3656 9a763d443c.exe 4984 ad549f6435.exe 384 axplont.exe 2912 axplont.exe 1308 explortu.exe 4344 axplont.exe 3976 explortu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1624 set thread context of 3084 1624 victor.exe 85 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\explortu.job dcbd7372953671d87c0268de8850fffd46a39a01f00779c88b40badd09d6ca40.exe File created C:\Windows\Tasks\axplont.job 9a763d443c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1892 1624 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2932 dcbd7372953671d87c0268de8850fffd46a39a01f00779c88b40badd09d6ca40.exe 2932 dcbd7372953671d87c0268de8850fffd46a39a01f00779c88b40badd09d6ca40.exe 1380 explortu.exe 1380 explortu.exe 3656 9a763d443c.exe 3656 9a763d443c.exe 4984 ad549f6435.exe 4984 ad549f6435.exe 384 axplont.exe 384 axplont.exe 2912 axplont.exe 2912 axplont.exe 1308 explortu.exe 1308 explortu.exe 4344 axplont.exe 4344 axplont.exe 3976 explortu.exe 3976 explortu.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3084 RegAsm.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 dcbd7372953671d87c0268de8850fffd46a39a01f00779c88b40badd09d6ca40.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1380 2932 dcbd7372953671d87c0268de8850fffd46a39a01f00779c88b40badd09d6ca40.exe 78 PID 2932 wrote to memory of 1380 2932 dcbd7372953671d87c0268de8850fffd46a39a01f00779c88b40badd09d6ca40.exe 78 PID 2932 wrote to memory of 1380 2932 dcbd7372953671d87c0268de8850fffd46a39a01f00779c88b40badd09d6ca40.exe 78 PID 1380 wrote to memory of 3556 1380 explortu.exe 79 PID 1380 wrote to memory of 3556 1380 explortu.exe 79 PID 1380 wrote to memory of 3556 1380 explortu.exe 79 PID 1380 wrote to memory of 3656 1380 explortu.exe 80 PID 1380 wrote to memory of 3656 1380 explortu.exe 80 PID 1380 wrote to memory of 3656 1380 explortu.exe 80 PID 1380 wrote to memory of 4984 1380 explortu.exe 81 PID 1380 wrote to memory of 4984 1380 explortu.exe 81 PID 1380 wrote to memory of 4984 1380 explortu.exe 81 PID 3656 wrote to memory of 384 3656 9a763d443c.exe 82 PID 3656 wrote to memory of 384 3656 9a763d443c.exe 82 PID 3656 wrote to memory of 384 3656 9a763d443c.exe 82 PID 384 wrote to memory of 1624 384 axplont.exe 83 PID 384 wrote to memory of 1624 384 axplont.exe 83 PID 384 wrote to memory of 1624 384 axplont.exe 83 PID 1624 wrote to memory of 5072 1624 victor.exe 84 PID 1624 wrote to memory of 5072 1624 victor.exe 84 PID 1624 wrote to memory of 5072 1624 victor.exe 84 PID 1624 wrote to memory of 3084 1624 victor.exe 85 PID 1624 wrote to memory of 3084 1624 victor.exe 85 PID 1624 wrote to memory of 3084 1624 victor.exe 85 PID 1624 wrote to memory of 3084 1624 victor.exe 85 PID 1624 wrote to memory of 3084 1624 victor.exe 85 PID 1624 wrote to memory of 3084 1624 victor.exe 85 PID 1624 wrote to memory of 3084 1624 victor.exe 85 PID 1624 wrote to memory of 3084 1624 victor.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcbd7372953671d87c0268de8850fffd46a39a01f00779c88b40badd09d6ca40.exe"C:\Users\Admin\AppData\Local\Temp\dcbd7372953671d87c0268de8850fffd46a39a01f00779c88b40badd09d6ca40.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵PID:3556
-
-
C:\Users\Admin\1000004002\9a763d443c.exe"C:\Users\Admin\1000004002\9a763d443c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\1000025001\victor.exe"C:\Users\Admin\AppData\Local\Temp\1000025001\victor.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:5072
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵
- Suspicious use of AdjustPrivilegeToken
PID:3084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 2926⤵
- Program crash
PID:1892
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\ad549f6435.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\ad549f6435.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1624 -ip 16241⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1308
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD532f7a46f6cbbc48e7aa90300642081e8
SHA1db40f5c3bc65b7a672730aa1f4860abb68c69d81
SHA25613775e77526c889dccf3eb528a1dc0990441d9aaf5529ba9be9ba56f877940c4
SHA512f0c5da7152d6e7b36e28f2dd96cadff965cf63a206c3b98bcae3d07e7a092a7ab8224a36bf4e81f6cb5fdf05fdd997c73faf9f2ab8390866c64d58e436d70c91
-
Filesize
2.3MB
MD5ab38578e35ae1205f21c424ca5dc6430
SHA1171cbd1332ab542dbd4ca737a5f02dac310945d6
SHA25639a0739e5109bbb47d01fa421b6ca459ac9bd0e7ff82286e4bf431c4b1db4cfe
SHA512945cbc2469bedbc8111a13159cad86f174b4f045326f858dc3400714314d96cad054a4b0d03aef5dc63c6c6f8dd3a2c71d68ca737368bc47ee1c4e8fd2a8ca9b
-
Filesize
1.0MB
MD5585d16749fda38cb7f8a987137890167
SHA10b3f1064b2f0ddf397552e442e99e1c233c67df1
SHA256496219a22d96d4eb4c699045521b7fa73bba242d4e84e62f565e8d8046fa00c5
SHA512784c3a2e3fa3e90f57ed059a5bc204441da3ebc173a93b67e752f84cc2e2cf0f4ddc49aabeaa3233053e49d51633f6bb93a90c0735292084305b00bf79b2c632
-
Filesize
1.8MB
MD5d2b2c8565a8d5aa384faffd642f372c1
SHA108c0828d68a9a09ee12581a630527e6c9cb1dd24
SHA256dcbd7372953671d87c0268de8850fffd46a39a01f00779c88b40badd09d6ca40
SHA512fd150df2a19f196499f6f2d3af1f2f7c1766c1349372dd080464d8bd65330e9578382807a358102b2cfc200b19a9a08d8c37915df18642da6ac24a58a07424a6