Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
efba0ede597d3c49c0bb6c2506a117f0c8a8858792af77ea24a97df34f8e79a6.exe
Resource
win10v2004-20240508-en
General
-
Target
efba0ede597d3c49c0bb6c2506a117f0c8a8858792af77ea24a97df34f8e79a6.exe
-
Size
1.8MB
-
MD5
cd6c579cfcb9bae246f8d572871b287e
-
SHA1
9107eb0f184e0b474e875eb33aec5a7ee404fc28
-
SHA256
efba0ede597d3c49c0bb6c2506a117f0c8a8858792af77ea24a97df34f8e79a6
-
SHA512
10bfc8f6972bcba99a5e5c6000eeab625f150a19c9eea9d88cb9c9f6dc60a8e2097cd71e69d73690deec6a800452f1587c9739f7de314e77ebda4a252e321e91
-
SSDEEP
49152:6jpTfaQ241PKkQL0a8r+63cfjvypiFhzwIW5rYXga:2TyQ2APkHYsfjqohcnrYXH
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
risepro
147.45.47.126:58709
Extracted
amadey
4.21
49e482
http://147.45.47.70
-
install_dir
1b29d73536
-
install_file
axplont.exe
-
strings_key
4d31dd1a190d9879c21fac6d87dc0043
-
url_paths
/tr8nomy/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c403713690.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e2548d3ae3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ efba0ede597d3c49c0bb6c2506a117f0c8a8858792af77ea24a97df34f8e79a6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion efba0ede597d3c49c0bb6c2506a117f0c8a8858792af77ea24a97df34f8e79a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e2548d3ae3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c403713690.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e2548d3ae3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion efba0ede597d3c49c0bb6c2506a117f0c8a8858792af77ea24a97df34f8e79a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c403713690.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation efba0ede597d3c49c0bb6c2506a117f0c8a8858792af77ea24a97df34f8e79a6.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation explortu.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation c403713690.exe -
Executes dropped EXE 11 IoCs
pid Process 2912 explortu.exe 2860 explortu.exe 2156 c403713690.exe 4092 e2548d3ae3.exe 2364 axplont.exe 4984 explortu.exe 2416 axplont.exe 3480 axplont.exe 2904 explortu.exe 4688 axplont.exe 2552 explortu.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Wine efba0ede597d3c49c0bb6c2506a117f0c8a8858792af77ea24a97df34f8e79a6.exe Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Wine e2548d3ae3.exe Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Wine c403713690.exe Key opened \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Software\Wine axplont.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e2548d3ae3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000005001\\e2548d3ae3.exe" explortu.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 2184 efba0ede597d3c49c0bb6c2506a117f0c8a8858792af77ea24a97df34f8e79a6.exe 2912 explortu.exe 2860 explortu.exe 2156 c403713690.exe 4092 e2548d3ae3.exe 2364 axplont.exe 4984 explortu.exe 2416 axplont.exe 3480 axplont.exe 2904 explortu.exe 2552 explortu.exe 4688 axplont.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2912 set thread context of 2860 2912 explortu.exe 95 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplont.job c403713690.exe File created C:\Windows\Tasks\explortu.job efba0ede597d3c49c0bb6c2506a117f0c8a8858792af77ea24a97df34f8e79a6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2184 efba0ede597d3c49c0bb6c2506a117f0c8a8858792af77ea24a97df34f8e79a6.exe 2184 efba0ede597d3c49c0bb6c2506a117f0c8a8858792af77ea24a97df34f8e79a6.exe 2912 explortu.exe 2912 explortu.exe 2860 explortu.exe 2860 explortu.exe 2156 c403713690.exe 2156 c403713690.exe 4092 e2548d3ae3.exe 4092 e2548d3ae3.exe 2364 axplont.exe 2364 axplont.exe 4984 explortu.exe 4984 explortu.exe 2416 axplont.exe 2416 axplont.exe 3480 axplont.exe 3480 axplont.exe 2904 explortu.exe 2904 explortu.exe 2552 explortu.exe 2552 explortu.exe 4688 axplont.exe 4688 axplont.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2912 2184 efba0ede597d3c49c0bb6c2506a117f0c8a8858792af77ea24a97df34f8e79a6.exe 86 PID 2184 wrote to memory of 2912 2184 efba0ede597d3c49c0bb6c2506a117f0c8a8858792af77ea24a97df34f8e79a6.exe 86 PID 2184 wrote to memory of 2912 2184 efba0ede597d3c49c0bb6c2506a117f0c8a8858792af77ea24a97df34f8e79a6.exe 86 PID 2912 wrote to memory of 2860 2912 explortu.exe 95 PID 2912 wrote to memory of 2860 2912 explortu.exe 95 PID 2912 wrote to memory of 2860 2912 explortu.exe 95 PID 2912 wrote to memory of 2860 2912 explortu.exe 95 PID 2912 wrote to memory of 2860 2912 explortu.exe 95 PID 2912 wrote to memory of 2860 2912 explortu.exe 95 PID 2912 wrote to memory of 2860 2912 explortu.exe 95 PID 2912 wrote to memory of 2860 2912 explortu.exe 95 PID 2912 wrote to memory of 2860 2912 explortu.exe 95 PID 2912 wrote to memory of 2860 2912 explortu.exe 95 PID 2912 wrote to memory of 2860 2912 explortu.exe 95 PID 2912 wrote to memory of 2860 2912 explortu.exe 95 PID 2912 wrote to memory of 2156 2912 explortu.exe 99 PID 2912 wrote to memory of 2156 2912 explortu.exe 99 PID 2912 wrote to memory of 2156 2912 explortu.exe 99 PID 2912 wrote to memory of 4092 2912 explortu.exe 100 PID 2912 wrote to memory of 4092 2912 explortu.exe 100 PID 2912 wrote to memory of 4092 2912 explortu.exe 100 PID 2156 wrote to memory of 2364 2156 c403713690.exe 101 PID 2156 wrote to memory of 2364 2156 c403713690.exe 101 PID 2156 wrote to memory of 2364 2156 c403713690.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\efba0ede597d3c49c0bb6c2506a117f0c8a8858792af77ea24a97df34f8e79a6.exe"C:\Users\Admin\AppData\Local\Temp\efba0ede597d3c49c0bb6c2506a117f0c8a8858792af77ea24a97df34f8e79a6.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
C:\Users\Admin\1000004002\c403713690.exe"C:\Users\Admin\1000004002\c403713690.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2364
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\e2548d3ae3.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\e2548d3ae3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4092
-
-
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2416
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3480
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2904
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4688
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5b5f49ea48bd953e7fdf40e250be52086
SHA124e385f539225596258193b66a9a24929616612f
SHA25662bd4a50cdbd1adda3a0d82a1f27bddc872ccf9c232be064033efd9feb531ed2
SHA51293eed99f7581df3e082dc08a19124d5f09118d70aa3559ee7f1c74ea13f2cdeac85bfff453b5529962596f317113e7be75ee6bf7d56724c8c4adb4816cbad522
-
Filesize
2.3MB
MD5c1fa27ad9d47cc1c4b35ce3cb0bf1a35
SHA194bf0f0fb1393111f2a1c048c42665fb6ba595c9
SHA2564762b2238b692ae0361a701516467ad8e46c0c9ac2a53518e16df165ab1ab5be
SHA51212993b9d29767f47010ab46193ae1e94780b1d61178fbe287e3c0acff0a38990ccc92bed6f954ed295c8ed4d831db9ec9e259925149f8cb1eacdc77e82f5b17d
-
Filesize
1.8MB
MD5cd6c579cfcb9bae246f8d572871b287e
SHA19107eb0f184e0b474e875eb33aec5a7ee404fc28
SHA256efba0ede597d3c49c0bb6c2506a117f0c8a8858792af77ea24a97df34f8e79a6
SHA51210bfc8f6972bcba99a5e5c6000eeab625f150a19c9eea9d88cb9c9f6dc60a8e2097cd71e69d73690deec6a800452f1587c9739f7de314e77ebda4a252e321e91