Analysis

  • max time kernel
    146s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/05/2024, 08:55

General

  • Target

    89a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a.exe

  • Size

    1.8MB

  • MD5

    180a5d5d2777bef54af76986c19ccb66

  • SHA1

    f447bf4ff09eef8951632bc6d927d564cb332f71

  • SHA256

    89a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a

  • SHA512

    e99a7817443ec392badf6a78e091b413591a045e19b0e65ce4f8bb4287f10316f22b1dd15354d06aa1e52cf9c64b2ce0b23774461e5e11070d474a3fe4b6ae39

  • SSDEEP

    49152:n2AV4nnOJsTsZHTek3VeWRAJ8R2jcPyf7J:2AV4nOnZ3VeWCCK

Malware Config

Extracted

Family

amadey

Version

4.21

Botnet

0e6740

C2

http://147.45.47.155

Attributes
  • install_dir

    9217037dc9

  • install_file

    explortu.exe

  • strings_key

    8e894a8a4a3d0da8924003a561cfb244

  • url_paths

    /ku4Nor9/index.php

rc4.plain

Extracted

Family

amadey

Version

4.21

Botnet

49e482

C2

http://147.45.47.70

Attributes
  • install_dir

    1b29d73536

  • install_file

    axplont.exe

  • strings_key

    4d31dd1a190d9879c21fac6d87dc0043

  • url_paths

    /tr8nomy/index.php

rc4.plain

Extracted

Family

risepro

C2

147.45.47.126:58709

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a.exe
    "C:\Users\Admin\AppData\Local\Temp\89a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:636
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4548
      • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
        "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
        3⤵
          PID:2840
        • C:\Users\Admin\1000004002\dec59f9e3f.exe
          "C:\Users\Admin\1000004002\dec59f9e3f.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1044
          • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
            "C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:4724
        • C:\Users\Admin\AppData\Local\Temp\1000005001\9920b3db42.exe
          "C:\Users\Admin\AppData\Local\Temp\1000005001\9920b3db42.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:540
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:2592
    • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
      C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:1312
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:4740
    • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
      C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:1624

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\1000004002\dec59f9e3f.exe

      Filesize

      1.8MB

      MD5

      e9c43c9405c2823ac94cea6ffc1db64c

      SHA1

      949fb058c018c3a85eda4ef2de5b4634d639a9ef

      SHA256

      223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231

      SHA512

      9f0b0112da9f60e151e705af1b479b5e657b2264a99db075dfc59172dbfdfa7cfaa921491a822e7a4fa9a586877b696ae03cb3c216a5c0fb51b717e13e49b5d2

    • C:\Users\Admin\AppData\Local\Temp\1000005001\9920b3db42.exe

      Filesize

      2.3MB

      MD5

      502e5f356925ab0b572f16e55255bccb

      SHA1

      04d2220948e8025a8fffef4c49f0f6e2a55919bd

      SHA256

      58adcd78b5ce1232212e6691063a99aca8973b25fe488f0ee93ff7e55a236e03

      SHA512

      266f056a4a9da6026c34d2a605e3cda31c72157127f9fc03d81887a0feb4df43025ef2f34d0af46a32784be3c9bd4b05f20e9139a2e826e68635201c0e898d4a

    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe

      Filesize

      1.8MB

      MD5

      180a5d5d2777bef54af76986c19ccb66

      SHA1

      f447bf4ff09eef8951632bc6d927d564cb332f71

      SHA256

      89a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a

      SHA512

      e99a7817443ec392badf6a78e091b413591a045e19b0e65ce4f8bb4287f10316f22b1dd15354d06aa1e52cf9c64b2ce0b23774461e5e11070d474a3fe4b6ae39

    • memory/540-99-0x00000000001B0000-0x000000000079C000-memory.dmp

      Filesize

      5.9MB

    • memory/540-110-0x00000000001B0000-0x000000000079C000-memory.dmp

      Filesize

      5.9MB

    • memory/540-82-0x00000000001B0000-0x000000000079C000-memory.dmp

      Filesize

      5.9MB

    • memory/540-93-0x00000000001B0000-0x000000000079C000-memory.dmp

      Filesize

      5.9MB

    • memory/540-128-0x00000000001B0000-0x000000000079C000-memory.dmp

      Filesize

      5.9MB

    • memory/540-125-0x00000000001B0000-0x000000000079C000-memory.dmp

      Filesize

      5.9MB

    • memory/540-122-0x00000000001B0000-0x000000000079C000-memory.dmp

      Filesize

      5.9MB

    • memory/540-119-0x00000000001B0000-0x000000000079C000-memory.dmp

      Filesize

      5.9MB

    • memory/540-79-0x00000000001B0000-0x000000000079C000-memory.dmp

      Filesize

      5.9MB

    • memory/540-96-0x00000000001B0000-0x000000000079C000-memory.dmp

      Filesize

      5.9MB

    • memory/540-102-0x00000000001B0000-0x000000000079C000-memory.dmp

      Filesize

      5.9MB

    • memory/540-105-0x00000000001B0000-0x000000000079C000-memory.dmp

      Filesize

      5.9MB

    • memory/540-74-0x00000000001B0000-0x000000000079C000-memory.dmp

      Filesize

      5.9MB

    • memory/636-2-0x0000000000E21000-0x0000000000E4F000-memory.dmp

      Filesize

      184KB

    • memory/636-1-0x0000000077394000-0x0000000077396000-memory.dmp

      Filesize

      8KB

    • memory/636-3-0x0000000000E20000-0x00000000012D4000-memory.dmp

      Filesize

      4.7MB

    • memory/636-5-0x0000000000E20000-0x00000000012D4000-memory.dmp

      Filesize

      4.7MB

    • memory/636-0-0x0000000000E20000-0x00000000012D4000-memory.dmp

      Filesize

      4.7MB

    • memory/636-17-0x0000000000E20000-0x00000000012D4000-memory.dmp

      Filesize

      4.7MB

    • memory/1044-53-0x00000000002A0000-0x000000000076E000-memory.dmp

      Filesize

      4.8MB

    • memory/1044-40-0x00000000002A0000-0x000000000076E000-memory.dmp

      Filesize

      4.8MB

    • memory/1312-85-0x0000000000680000-0x0000000000B4E000-memory.dmp

      Filesize

      4.8MB

    • memory/1312-88-0x0000000000680000-0x0000000000B4E000-memory.dmp

      Filesize

      4.8MB

    • memory/1624-116-0x0000000000680000-0x0000000000B4E000-memory.dmp

      Filesize

      4.8MB

    • memory/1624-112-0x0000000000680000-0x0000000000B4E000-memory.dmp

      Filesize

      4.8MB

    • memory/2592-90-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB

    • memory/2592-86-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB

    • memory/4548-91-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB

    • memory/4548-55-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB

    • memory/4548-129-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB

    • memory/4548-80-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB

    • memory/4548-94-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB

    • memory/4548-18-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB

    • memory/4548-126-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB

    • memory/4548-97-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB

    • memory/4548-20-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB

    • memory/4548-77-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB

    • memory/4548-100-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB

    • memory/4548-123-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB

    • memory/4548-76-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB

    • memory/4548-103-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB

    • memory/4548-19-0x0000000000841000-0x000000000086F000-memory.dmp

      Filesize

      184KB

    • memory/4548-75-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB

    • memory/4548-106-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB

    • memory/4548-120-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB

    • memory/4548-21-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB

    • memory/4548-117-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB

    • memory/4548-38-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB

    • memory/4724-127-0x0000000000680000-0x0000000000B4E000-memory.dmp

      Filesize

      4.8MB

    • memory/4724-98-0x0000000000680000-0x0000000000B4E000-memory.dmp

      Filesize

      4.8MB

    • memory/4724-81-0x0000000000680000-0x0000000000B4E000-memory.dmp

      Filesize

      4.8MB

    • memory/4724-118-0x0000000000680000-0x0000000000B4E000-memory.dmp

      Filesize

      4.8MB

    • memory/4724-130-0x0000000000680000-0x0000000000B4E000-memory.dmp

      Filesize

      4.8MB

    • memory/4724-107-0x0000000000680000-0x0000000000B4E000-memory.dmp

      Filesize

      4.8MB

    • memory/4724-54-0x0000000000680000-0x0000000000B4E000-memory.dmp

      Filesize

      4.8MB

    • memory/4724-124-0x0000000000680000-0x0000000000B4E000-memory.dmp

      Filesize

      4.8MB

    • memory/4724-101-0x0000000000680000-0x0000000000B4E000-memory.dmp

      Filesize

      4.8MB

    • memory/4724-104-0x0000000000680000-0x0000000000B4E000-memory.dmp

      Filesize

      4.8MB

    • memory/4724-121-0x0000000000680000-0x0000000000B4E000-memory.dmp

      Filesize

      4.8MB

    • memory/4724-78-0x0000000000680000-0x0000000000B4E000-memory.dmp

      Filesize

      4.8MB

    • memory/4724-92-0x0000000000680000-0x0000000000B4E000-memory.dmp

      Filesize

      4.8MB

    • memory/4724-95-0x0000000000680000-0x0000000000B4E000-memory.dmp

      Filesize

      4.8MB

    • memory/4740-115-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB

    • memory/4740-111-0x0000000000840000-0x0000000000CF4000-memory.dmp

      Filesize

      4.7MB