Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 19:09
Static task
static1
Behavioral task
behavioral1
Sample
84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exe
Resource
win11-20240426-en
General
-
Target
84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exe
-
Size
1.9MB
-
MD5
fe14bee19de8dafc19c99f1af6b3a89c
-
SHA1
9ae3ee811c2ba3a6159d69561eaaae70006a4994
-
SHA256
84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf
-
SHA512
dd4b0e06a20422658d613c31473e3e94e7c77122b18b95585f680053f2b494e253769a294b0499a5c1f06ae296e1afdf069b11d8e5b3499783ab803e94f26b51
-
SSDEEP
24576:Y2b7DOynx4ALClZIe5XYVkFBChWrjTndAcXZ9CTUoxg2JGFpZt7IXnkZ11DvNhC7:N5xduKe9YVkF4hWrXn7S/AFZ8YvcZvR
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
amadey
4.21
49e482
http://147.45.47.70
-
install_dir
1b29d73536
-
install_file
axplont.exe
-
strings_key
4d31dd1a190d9879c21fac6d87dc0043
-
url_paths
/tr8nomy/index.php
Extracted
risepro
147.45.47.126:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
Processes:
84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exe35f92739aa.exeaxplont.exeaxplont.exeexplortu.exeexplortu.exeexplortu.exe3119663e5f.exeaxplont.exeexplortu.exeaxplont.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 35f92739aa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3119663e5f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
axplont.exe3119663e5f.exeexplortu.exeaxplont.exeexplortu.exeexplortu.exe35f92739aa.exe84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exeaxplont.exeaxplont.exeexplortu.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3119663e5f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3119663e5f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 35f92739aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 35f92739aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exeexplortu.exe35f92739aa.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation explortu.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation 35f92739aa.exe -
Executes dropped EXE 10 IoCs
Processes:
explortu.exe35f92739aa.exeaxplont.exe3119663e5f.exeaxplont.exeexplortu.exeexplortu.exeaxplont.exeaxplont.exeexplortu.exepid process 4984 explortu.exe 2908 35f92739aa.exe 4728 axplont.exe 1672 3119663e5f.exe 1544 axplont.exe 4772 explortu.exe 4644 explortu.exe 1304 axplont.exe 5080 axplont.exe 3504 explortu.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
axplont.exeexplortu.exeaxplont.exeexplortu.exe84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exeaxplont.exe3119663e5f.exeaxplont.exeexplortu.exeexplortu.exe35f92739aa.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Wine 84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exe Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Wine 3119663e5f.exe Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Wine 35f92739aa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explortu.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3119663e5f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000005001\\3119663e5f.exe" explortu.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
Processes:
84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exeexplortu.exe35f92739aa.exeaxplont.exe3119663e5f.exeexplortu.exeaxplont.exeaxplont.exeexplortu.exeaxplont.exeexplortu.exepid process 4420 84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exe 4984 explortu.exe 2908 35f92739aa.exe 4728 axplont.exe 1672 3119663e5f.exe 4772 explortu.exe 1544 axplont.exe 1304 axplont.exe 4644 explortu.exe 5080 axplont.exe 3504 explortu.exe -
Drops file in Windows directory 2 IoCs
Processes:
84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exe35f92739aa.exedescription ioc process File created C:\Windows\Tasks\explortu.job 84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exe File created C:\Windows\Tasks\axplont.job 35f92739aa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exeexplortu.exe35f92739aa.exeaxplont.exe3119663e5f.exeexplortu.exeaxplont.exeaxplont.exeexplortu.exeaxplont.exeexplortu.exepid process 4420 84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exe 4420 84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exe 4984 explortu.exe 4984 explortu.exe 2908 35f92739aa.exe 2908 35f92739aa.exe 4728 axplont.exe 4728 axplont.exe 1672 3119663e5f.exe 1672 3119663e5f.exe 4772 explortu.exe 4772 explortu.exe 1544 axplont.exe 1544 axplont.exe 1304 axplont.exe 4644 explortu.exe 1304 axplont.exe 4644 explortu.exe 5080 axplont.exe 5080 axplont.exe 3504 explortu.exe 3504 explortu.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
35f92739aa.exepid process 2908 35f92739aa.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exeexplortu.exe35f92739aa.exedescription pid process target process PID 4420 wrote to memory of 4984 4420 84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exe explortu.exe PID 4420 wrote to memory of 4984 4420 84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exe explortu.exe PID 4420 wrote to memory of 4984 4420 84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exe explortu.exe PID 4984 wrote to memory of 2472 4984 explortu.exe explortu.exe PID 4984 wrote to memory of 2472 4984 explortu.exe explortu.exe PID 4984 wrote to memory of 2472 4984 explortu.exe explortu.exe PID 4984 wrote to memory of 2908 4984 explortu.exe 35f92739aa.exe PID 4984 wrote to memory of 2908 4984 explortu.exe 35f92739aa.exe PID 4984 wrote to memory of 2908 4984 explortu.exe 35f92739aa.exe PID 2908 wrote to memory of 4728 2908 35f92739aa.exe axplont.exe PID 2908 wrote to memory of 4728 2908 35f92739aa.exe axplont.exe PID 2908 wrote to memory of 4728 2908 35f92739aa.exe axplont.exe PID 4984 wrote to memory of 1672 4984 explortu.exe 3119663e5f.exe PID 4984 wrote to memory of 1672 4984 explortu.exe 3119663e5f.exe PID 4984 wrote to memory of 1672 4984 explortu.exe 3119663e5f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exe"C:\Users\Admin\AppData\Local\Temp\84b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵PID:2472
-
C:\Users\Admin\1000004002\35f92739aa.exe"C:\Users\Admin\1000004002\35f92739aa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\1000005001\3119663e5f.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\3119663e5f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1672
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1544
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4644
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1304
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5494fa4218dab0994e9988fce671abad0
SHA15ccbd948ff1305cd20ef6069017f6c1fb028e1ae
SHA2563f9855bde3536e644e608e4ae756920f954ccea056678e5cda231c22a64e1d35
SHA512f5726b1dabd49a54cca12aaba3f9052336c4306b50ce61135580a33e477721084708644473bf7e145795388ead26276ccc45db66fe404a430d96b430878ad88f
-
Filesize
2.3MB
MD534f8f9211e21525e424e2cb18cd6bc48
SHA1c866bb658f10ebf479de424379394fc574ad5612
SHA2563afe21c56f3c520af92db8933125fd09bb41189d4c7bcbdada4f77feec1486ad
SHA51297aac580df5718054ad339cd70c45ad5a1951bde27a797de268cecf13f8e31cc9385739823f1cd41d794089bb2aa8c00592322ef55c1badc30fc21bcea41f34a
-
Filesize
1.9MB
MD5fe14bee19de8dafc19c99f1af6b3a89c
SHA19ae3ee811c2ba3a6159d69561eaaae70006a4994
SHA25684b85f65be4409c7832334cc8799311d6b60596bf89ac73ddaa8810e12113aaf
SHA512dd4b0e06a20422658d613c31473e3e94e7c77122b18b95585f680053f2b494e253769a294b0499a5c1f06ae296e1afdf069b11d8e5b3499783ab803e94f26b51