Analysis
-
max time kernel
146s -
max time network
125s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/05/2024, 11:35
Static task
static1
Behavioral task
behavioral1
Sample
1f97d3413e4e3982dac52ea1447e302be4b8a63bb3ea53f752fc8d9d146cdad9.exe
Resource
win10v2004-20240508-en
General
-
Target
1f97d3413e4e3982dac52ea1447e302be4b8a63bb3ea53f752fc8d9d146cdad9.exe
-
Size
1.8MB
-
MD5
14944d6af7e647101a6eff996149c572
-
SHA1
2da6a722fd6f75b6ff194965c73b17954c3f8a4b
-
SHA256
1f97d3413e4e3982dac52ea1447e302be4b8a63bb3ea53f752fc8d9d146cdad9
-
SHA512
4b2f200ae02f03316832fe820eee7e68513fa638111f900604a0e508975fd2e89f6f828a07b22031a3cc3cdf0abc7bfc4e0c3a77f51713a4d19a135151b24fc7
-
SSDEEP
24576:nKb/YV7TMxY+Nx2fjnTBIwuJWsJrQCNJ91zWrdDnCje5PWF8mVSO/bvZlk0HOkm5:ni/YVXM2+NaBRunrQG97GWtb7k2OWW
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
amadey
4.21
49e482
http://147.45.47.70
-
install_dir
1b29d73536
-
install_file
axplont.exe
-
strings_key
4d31dd1a190d9879c21fac6d87dc0043
-
url_paths
/tr8nomy/index.php
Extracted
risepro
147.45.47.126:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1f97d3413e4e3982dac52ea1447e302be4b8a63bb3ea53f752fc8d9d146cdad9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f9e6e58663.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4141cf359c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1f97d3413e4e3982dac52ea1447e302be4b8a63bb3ea53f752fc8d9d146cdad9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f9e6e58663.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f9e6e58663.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1f97d3413e4e3982dac52ea1447e302be4b8a63bb3ea53f752fc8d9d146cdad9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4141cf359c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4141cf359c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe -
Executes dropped EXE 10 IoCs
pid Process 4792 explortu.exe 2784 f9e6e58663.exe 664 axplont.exe 3484 4141cf359c.exe 2344 axplont.exe 1468 explortu.exe 3612 axplont.exe 2532 explortu.exe 1300 axplont.exe 3100 explortu.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000\Software\Wine f9e6e58663.exe Key opened \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000\Software\Wine 4141cf359c.exe Key opened \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000\Software\Wine 1f97d3413e4e3982dac52ea1447e302be4b8a63bb3ea53f752fc8d9d146cdad9.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3001105534-2705918504-2956618779-1000\Software\Microsoft\Windows\CurrentVersion\Run\4141cf359c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000005001\\4141cf359c.exe" explortu.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 2620 1f97d3413e4e3982dac52ea1447e302be4b8a63bb3ea53f752fc8d9d146cdad9.exe 4792 explortu.exe 2784 f9e6e58663.exe 664 axplont.exe 3484 4141cf359c.exe 2344 axplont.exe 1468 explortu.exe 3612 axplont.exe 2532 explortu.exe 1300 axplont.exe 3100 explortu.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\explortu.job 1f97d3413e4e3982dac52ea1447e302be4b8a63bb3ea53f752fc8d9d146cdad9.exe File created C:\Windows\Tasks\axplont.job f9e6e58663.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2620 1f97d3413e4e3982dac52ea1447e302be4b8a63bb3ea53f752fc8d9d146cdad9.exe 2620 1f97d3413e4e3982dac52ea1447e302be4b8a63bb3ea53f752fc8d9d146cdad9.exe 4792 explortu.exe 4792 explortu.exe 2784 f9e6e58663.exe 2784 f9e6e58663.exe 664 axplont.exe 664 axplont.exe 3484 4141cf359c.exe 3484 4141cf359c.exe 2344 axplont.exe 2344 axplont.exe 1468 explortu.exe 1468 explortu.exe 3612 axplont.exe 3612 axplont.exe 2532 explortu.exe 2532 explortu.exe 1300 axplont.exe 1300 axplont.exe 3100 explortu.exe 3100 explortu.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2620 1f97d3413e4e3982dac52ea1447e302be4b8a63bb3ea53f752fc8d9d146cdad9.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2620 wrote to memory of 4792 2620 1f97d3413e4e3982dac52ea1447e302be4b8a63bb3ea53f752fc8d9d146cdad9.exe 79 PID 2620 wrote to memory of 4792 2620 1f97d3413e4e3982dac52ea1447e302be4b8a63bb3ea53f752fc8d9d146cdad9.exe 79 PID 2620 wrote to memory of 4792 2620 1f97d3413e4e3982dac52ea1447e302be4b8a63bb3ea53f752fc8d9d146cdad9.exe 79 PID 4792 wrote to memory of 4964 4792 explortu.exe 80 PID 4792 wrote to memory of 4964 4792 explortu.exe 80 PID 4792 wrote to memory of 4964 4792 explortu.exe 80 PID 4792 wrote to memory of 2784 4792 explortu.exe 81 PID 4792 wrote to memory of 2784 4792 explortu.exe 81 PID 4792 wrote to memory of 2784 4792 explortu.exe 81 PID 2784 wrote to memory of 664 2784 f9e6e58663.exe 82 PID 2784 wrote to memory of 664 2784 f9e6e58663.exe 82 PID 2784 wrote to memory of 664 2784 f9e6e58663.exe 82 PID 4792 wrote to memory of 3484 4792 explortu.exe 83 PID 4792 wrote to memory of 3484 4792 explortu.exe 83 PID 4792 wrote to memory of 3484 4792 explortu.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f97d3413e4e3982dac52ea1447e302be4b8a63bb3ea53f752fc8d9d146cdad9.exe"C:\Users\Admin\AppData\Local\Temp\1f97d3413e4e3982dac52ea1447e302be4b8a63bb3ea53f752fc8d9d146cdad9.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵PID:4964
-
-
C:\Users\Admin\1000004002\f9e6e58663.exe"C:\Users\Admin\1000004002\f9e6e58663.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:664
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\4141cf359c.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\4141cf359c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
-
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2344
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1468
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3612
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1300
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5115ba0b88377274edef6f9e340ff45b7
SHA13ef07e4b9dd8b12feee5f6397132802d007ceb1c
SHA256870a69dfa4972275f348fd1d6b4597e3801e3d613f25563ba97b6a013d29de99
SHA5127692b8eb9c11c098071b5a1c9f203963d7a63502570fac8b1e06f4b92c7f4071ee9aa51e24f6cd4f3e8c0d3e2977189f32edcd2815446be7b5d6c905f91be973
-
Filesize
2.3MB
MD5fd2b93a329a4c4ec60fb996b5a95b0cc
SHA128921ebb4efc2b282396d9ea34e41d1c353f272d
SHA256b23413dbad7501f8b973920d22f32566a14f63a25201aaff371dca5b17304b9d
SHA512a60b2a6242f8bbda64804d208aca9a0f6d69b14b92285308f6d3e7e4ca388d99f5eefbc1e01bc1da98c323c82d3a0f064dbc05ffab7bf3e81a98ef30c4f14381
-
Filesize
1.8MB
MD514944d6af7e647101a6eff996149c572
SHA12da6a722fd6f75b6ff194965c73b17954c3f8a4b
SHA2561f97d3413e4e3982dac52ea1447e302be4b8a63bb3ea53f752fc8d9d146cdad9
SHA5124b2f200ae02f03316832fe820eee7e68513fa638111f900604a0e508975fd2e89f6f828a07b22031a3cc3cdf0abc7bfc4e0c3a77f51713a4d19a135151b24fc7