Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 10:25
Static task
static1
Behavioral task
behavioral1
Sample
d637c27bda7d7d26bc28c0bb6265445ec9477336a6eb11f047177214ee9d6e94.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
d637c27bda7d7d26bc28c0bb6265445ec9477336a6eb11f047177214ee9d6e94.exe
Resource
win11-20240426-en
General
-
Target
d637c27bda7d7d26bc28c0bb6265445ec9477336a6eb11f047177214ee9d6e94.exe
-
Size
1.8MB
-
MD5
f070d9b405cc81c606d3e4d5cd26da6b
-
SHA1
cc73c4840ee92f872b2440511fcc95fa396b90f3
-
SHA256
d637c27bda7d7d26bc28c0bb6265445ec9477336a6eb11f047177214ee9d6e94
-
SHA512
75141b19696a437bfa77b13c6902c79b1328feae3b3c9d6a6cfd267287ee00b6a0f69eb5cea8d95dc367112d1912f0c41da820926544eac530c7332231e345f6
-
SSDEEP
49152:x1IzgxvhmM6PBGvDjGltcxPIK7YIkkOH7XlbF1AnEkT:HIEoJQHGG97CLlbFm
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
amadey
4.21
49e482
http://147.45.47.70
-
install_dir
1b29d73536
-
install_file
axplont.exe
-
strings_key
4d31dd1a190d9879c21fac6d87dc0043
-
url_paths
/tr8nomy/index.php
Extracted
risepro
147.45.47.126:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d637c27bda7d7d26bc28c0bb6265445ec9477336a6eb11f047177214ee9d6e94.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3adb704a40.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6151e5c1e7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d637c27bda7d7d26bc28c0bb6265445ec9477336a6eb11f047177214ee9d6e94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d637c27bda7d7d26bc28c0bb6265445ec9477336a6eb11f047177214ee9d6e94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3adb704a40.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6151e5c1e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3adb704a40.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6151e5c1e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation d637c27bda7d7d26bc28c0bb6265445ec9477336a6eb11f047177214ee9d6e94.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation explortu.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation 3adb704a40.exe -
Executes dropped EXE 8 IoCs
pid Process 372 explortu.exe 3456 3adb704a40.exe 4272 axplont.exe 3220 6151e5c1e7.exe 2948 axplont.exe 2116 explortu.exe 4284 axplont.exe 3152 explortu.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Wine d637c27bda7d7d26bc28c0bb6265445ec9477336a6eb11f047177214ee9d6e94.exe Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Wine 3adb704a40.exe Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Wine 6151e5c1e7.exe Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Wine explortu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6151e5c1e7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000005001\\6151e5c1e7.exe" explortu.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 3868 d637c27bda7d7d26bc28c0bb6265445ec9477336a6eb11f047177214ee9d6e94.exe 372 explortu.exe 3456 3adb704a40.exe 4272 axplont.exe 3220 6151e5c1e7.exe 2948 axplont.exe 2116 explortu.exe 4284 axplont.exe 3152 explortu.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\explortu.job d637c27bda7d7d26bc28c0bb6265445ec9477336a6eb11f047177214ee9d6e94.exe File created C:\Windows\Tasks\axplont.job 3adb704a40.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3868 d637c27bda7d7d26bc28c0bb6265445ec9477336a6eb11f047177214ee9d6e94.exe 3868 d637c27bda7d7d26bc28c0bb6265445ec9477336a6eb11f047177214ee9d6e94.exe 372 explortu.exe 372 explortu.exe 3456 3adb704a40.exe 3456 3adb704a40.exe 4272 axplont.exe 4272 axplont.exe 3220 6151e5c1e7.exe 3220 6151e5c1e7.exe 2116 explortu.exe 2948 axplont.exe 2948 axplont.exe 2116 explortu.exe 4284 axplont.exe 4284 axplont.exe 3152 explortu.exe 3152 explortu.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3868 wrote to memory of 372 3868 d637c27bda7d7d26bc28c0bb6265445ec9477336a6eb11f047177214ee9d6e94.exe 84 PID 3868 wrote to memory of 372 3868 d637c27bda7d7d26bc28c0bb6265445ec9477336a6eb11f047177214ee9d6e94.exe 84 PID 3868 wrote to memory of 372 3868 d637c27bda7d7d26bc28c0bb6265445ec9477336a6eb11f047177214ee9d6e94.exe 84 PID 372 wrote to memory of 1480 372 explortu.exe 90 PID 372 wrote to memory of 1480 372 explortu.exe 90 PID 372 wrote to memory of 1480 372 explortu.exe 90 PID 372 wrote to memory of 3456 372 explortu.exe 92 PID 372 wrote to memory of 3456 372 explortu.exe 92 PID 372 wrote to memory of 3456 372 explortu.exe 92 PID 3456 wrote to memory of 4272 3456 3adb704a40.exe 93 PID 3456 wrote to memory of 4272 3456 3adb704a40.exe 93 PID 3456 wrote to memory of 4272 3456 3adb704a40.exe 93 PID 372 wrote to memory of 3220 372 explortu.exe 94 PID 372 wrote to memory of 3220 372 explortu.exe 94 PID 372 wrote to memory of 3220 372 explortu.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\d637c27bda7d7d26bc28c0bb6265445ec9477336a6eb11f047177214ee9d6e94.exe"C:\Users\Admin\AppData\Local\Temp\d637c27bda7d7d26bc28c0bb6265445ec9477336a6eb11f047177214ee9d6e94.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵PID:1480
-
-
C:\Users\Admin\1000004002\3adb704a40.exe"C:\Users\Admin\1000004002\3adb704a40.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4272
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\6151e5c1e7.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\6151e5c1e7.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3220
-
-
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2948
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5115ba0b88377274edef6f9e340ff45b7
SHA13ef07e4b9dd8b12feee5f6397132802d007ceb1c
SHA256870a69dfa4972275f348fd1d6b4597e3801e3d613f25563ba97b6a013d29de99
SHA5127692b8eb9c11c098071b5a1c9f203963d7a63502570fac8b1e06f4b92c7f4071ee9aa51e24f6cd4f3e8c0d3e2977189f32edcd2815446be7b5d6c905f91be973
-
Filesize
2.3MB
MD5fd2b93a329a4c4ec60fb996b5a95b0cc
SHA128921ebb4efc2b282396d9ea34e41d1c353f272d
SHA256b23413dbad7501f8b973920d22f32566a14f63a25201aaff371dca5b17304b9d
SHA512a60b2a6242f8bbda64804d208aca9a0f6d69b14b92285308f6d3e7e4ca388d99f5eefbc1e01bc1da98c323c82d3a0f064dbc05ffab7bf3e81a98ef30c4f14381
-
Filesize
1.8MB
MD5f070d9b405cc81c606d3e4d5cd26da6b
SHA1cc73c4840ee92f872b2440511fcc95fa396b90f3
SHA256d637c27bda7d7d26bc28c0bb6265445ec9477336a6eb11f047177214ee9d6e94
SHA51275141b19696a437bfa77b13c6902c79b1328feae3b3c9d6a6cfd267287ee00b6a0f69eb5cea8d95dc367112d1912f0c41da820926544eac530c7332231e345f6