Analysis
-
max time kernel
146s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 08:55
Static task
static1
Behavioral task
behavioral1
Sample
89a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
89a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a.exe
Resource
win11-20240426-en
General
-
Target
89a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a.exe
-
Size
1.8MB
-
MD5
180a5d5d2777bef54af76986c19ccb66
-
SHA1
f447bf4ff09eef8951632bc6d927d564cb332f71
-
SHA256
89a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a
-
SHA512
e99a7817443ec392badf6a78e091b413591a045e19b0e65ce4f8bb4287f10316f22b1dd15354d06aa1e52cf9c64b2ce0b23774461e5e11070d474a3fe4b6ae39
-
SSDEEP
49152:n2AV4nnOJsTsZHTek3VeWRAJ8R2jcPyf7J:2AV4nOnZ3VeWCCK
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
amadey
4.21
49e482
http://147.45.47.70
-
install_dir
1b29d73536
-
install_file
axplont.exe
-
strings_key
4d31dd1a190d9879c21fac6d87dc0043
-
url_paths
/tr8nomy/index.php
Extracted
risepro
147.45.47.126:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 89a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dec59f9e3f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9920b3db42.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9920b3db42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dec59f9e3f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 89a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dec59f9e3f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 89a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9920b3db42.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation explortu.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation dec59f9e3f.exe Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 89a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a.exe -
Executes dropped EXE 8 IoCs
pid Process 4548 explortu.exe 1044 dec59f9e3f.exe 4724 axplont.exe 540 9920b3db42.exe 1312 axplont.exe 2592 explortu.exe 4740 explortu.exe 1624 axplont.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine 89a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine dec59f9e3f.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine 9920b3db42.exe Key opened \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Wine axplont.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9920b3db42.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000005001\\9920b3db42.exe" explortu.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 636 89a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a.exe 4548 explortu.exe 1044 dec59f9e3f.exe 4724 axplont.exe 540 9920b3db42.exe 1312 axplont.exe 2592 explortu.exe 1624 axplont.exe 4740 explortu.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\explortu.job 89a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a.exe File created C:\Windows\Tasks\axplont.job dec59f9e3f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 636 89a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a.exe 636 89a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a.exe 4548 explortu.exe 4548 explortu.exe 1044 dec59f9e3f.exe 1044 dec59f9e3f.exe 4724 axplont.exe 4724 axplont.exe 540 9920b3db42.exe 540 9920b3db42.exe 1312 axplont.exe 1312 axplont.exe 2592 explortu.exe 2592 explortu.exe 1624 axplont.exe 1624 axplont.exe 4740 explortu.exe 4740 explortu.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 636 wrote to memory of 4548 636 89a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a.exe 86 PID 636 wrote to memory of 4548 636 89a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a.exe 86 PID 636 wrote to memory of 4548 636 89a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a.exe 86 PID 4548 wrote to memory of 2840 4548 explortu.exe 94 PID 4548 wrote to memory of 2840 4548 explortu.exe 94 PID 4548 wrote to memory of 2840 4548 explortu.exe 94 PID 4548 wrote to memory of 1044 4548 explortu.exe 97 PID 4548 wrote to memory of 1044 4548 explortu.exe 97 PID 4548 wrote to memory of 1044 4548 explortu.exe 97 PID 1044 wrote to memory of 4724 1044 dec59f9e3f.exe 98 PID 1044 wrote to memory of 4724 1044 dec59f9e3f.exe 98 PID 1044 wrote to memory of 4724 1044 dec59f9e3f.exe 98 PID 4548 wrote to memory of 540 4548 explortu.exe 99 PID 4548 wrote to memory of 540 4548 explortu.exe 99 PID 4548 wrote to memory of 540 4548 explortu.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\89a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a.exe"C:\Users\Admin\AppData\Local\Temp\89a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵PID:2840
-
-
C:\Users\Admin\1000004002\dec59f9e3f.exe"C:\Users\Admin\1000004002\dec59f9e3f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4724
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\9920b3db42.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\9920b3db42.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:540
-
-
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1312
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4740
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5e9c43c9405c2823ac94cea6ffc1db64c
SHA1949fb058c018c3a85eda4ef2de5b4634d639a9ef
SHA256223f7f1d9b4dfc44b2d2382cd1f834bab5beedfca3de0966dcee37761363f231
SHA5129f0b0112da9f60e151e705af1b479b5e657b2264a99db075dfc59172dbfdfa7cfaa921491a822e7a4fa9a586877b696ae03cb3c216a5c0fb51b717e13e49b5d2
-
Filesize
2.3MB
MD5502e5f356925ab0b572f16e55255bccb
SHA104d2220948e8025a8fffef4c49f0f6e2a55919bd
SHA25658adcd78b5ce1232212e6691063a99aca8973b25fe488f0ee93ff7e55a236e03
SHA512266f056a4a9da6026c34d2a605e3cda31c72157127f9fc03d81887a0feb4df43025ef2f34d0af46a32784be3c9bd4b05f20e9139a2e826e68635201c0e898d4a
-
Filesize
1.8MB
MD5180a5d5d2777bef54af76986c19ccb66
SHA1f447bf4ff09eef8951632bc6d927d564cb332f71
SHA25689a9a2b8d8bc54b0cd09d278574a46030d9f750a299723da415d45b3a6d1b35a
SHA512e99a7817443ec392badf6a78e091b413591a045e19b0e65ce4f8bb4287f10316f22b1dd15354d06aa1e52cf9c64b2ce0b23774461e5e11070d474a3fe4b6ae39