Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 05:05
Static task
static1
General
-
Target
785eaa3bc1ff11f50470a846c35cae7c4389c331c8a9eaaacfdced0b46a6b650.exe
-
Size
1.9MB
-
MD5
c84ab890634ffbc2ff51f707efb68cc2
-
SHA1
b2afe57c4d8a68cc513239d61900992ee85a2249
-
SHA256
785eaa3bc1ff11f50470a846c35cae7c4389c331c8a9eaaacfdced0b46a6b650
-
SHA512
14a4bb9c3b5301c4a5e175b8268db34457a1ac648008cbe47b7b0eee7322ad4f29444e949527a92beb0de43e5f06a6ad6826158186cec2af8964432f01c8c067
-
SSDEEP
49152:wR7msDJF85oDbrQSDsUghKGDIQ+PL+E2qls:Sm0F+oVD0hKGDIQeL+E2
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
amadey
4.21
49e482
http://147.45.47.70
-
install_dir
1b29d73536
-
install_file
axplont.exe
-
strings_key
4d31dd1a190d9879c21fac6d87dc0043
-
url_paths
/tr8nomy/index.php
Extracted
risepro
147.45.47.126:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 14aa91fd4e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 785eaa3bc1ff11f50470a846c35cae7c4389c331c8a9eaaacfdced0b46a6b650.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b9b8e8c011.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b9b8e8c011.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 785eaa3bc1ff11f50470a846c35cae7c4389c331c8a9eaaacfdced0b46a6b650.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b9b8e8c011.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 14aa91fd4e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 14aa91fd4e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 785eaa3bc1ff11f50470a846c35cae7c4389c331c8a9eaaacfdced0b46a6b650.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation 785eaa3bc1ff11f50470a846c35cae7c4389c331c8a9eaaacfdced0b46a6b650.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation explortu.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation b9b8e8c011.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation axplont.exe -
Executes dropped EXE 9 IoCs
pid Process 2260 explortu.exe 2016 b9b8e8c011.exe 5108 axplont.exe 212 victor.exe 2568 14aa91fd4e.exe 3804 axplont.exe 1880 explortu.exe 4168 explortu.exe 4740 axplont.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Wine b9b8e8c011.exe Key opened \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Wine 785eaa3bc1ff11f50470a846c35cae7c4389c331c8a9eaaacfdced0b46a6b650.exe Key opened \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Wine 14aa91fd4e.exe Key opened \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Wine axplont.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\14aa91fd4e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000005001\\14aa91fd4e.exe" explortu.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 4492 785eaa3bc1ff11f50470a846c35cae7c4389c331c8a9eaaacfdced0b46a6b650.exe 2260 explortu.exe 2016 b9b8e8c011.exe 5108 axplont.exe 2568 14aa91fd4e.exe 1880 explortu.exe 3804 axplont.exe 4168 explortu.exe 4740 axplont.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplont.job b9b8e8c011.exe File created C:\Windows\Tasks\explortu.job 785eaa3bc1ff11f50470a846c35cae7c4389c331c8a9eaaacfdced0b46a6b650.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4168 212 WerFault.exe 97 -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4492 785eaa3bc1ff11f50470a846c35cae7c4389c331c8a9eaaacfdced0b46a6b650.exe 4492 785eaa3bc1ff11f50470a846c35cae7c4389c331c8a9eaaacfdced0b46a6b650.exe 2260 explortu.exe 2260 explortu.exe 2016 b9b8e8c011.exe 2016 b9b8e8c011.exe 5108 axplont.exe 5108 axplont.exe 2568 14aa91fd4e.exe 2568 14aa91fd4e.exe 1880 explortu.exe 1880 explortu.exe 3804 axplont.exe 3804 axplont.exe 4740 axplont.exe 4740 axplont.exe 4168 explortu.exe 4168 explortu.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2016 b9b8e8c011.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4492 wrote to memory of 2260 4492 785eaa3bc1ff11f50470a846c35cae7c4389c331c8a9eaaacfdced0b46a6b650.exe 86 PID 4492 wrote to memory of 2260 4492 785eaa3bc1ff11f50470a846c35cae7c4389c331c8a9eaaacfdced0b46a6b650.exe 86 PID 4492 wrote to memory of 2260 4492 785eaa3bc1ff11f50470a846c35cae7c4389c331c8a9eaaacfdced0b46a6b650.exe 86 PID 2260 wrote to memory of 2284 2260 explortu.exe 91 PID 2260 wrote to memory of 2284 2260 explortu.exe 91 PID 2260 wrote to memory of 2284 2260 explortu.exe 91 PID 2260 wrote to memory of 2016 2260 explortu.exe 93 PID 2260 wrote to memory of 2016 2260 explortu.exe 93 PID 2260 wrote to memory of 2016 2260 explortu.exe 93 PID 2016 wrote to memory of 5108 2016 b9b8e8c011.exe 94 PID 2016 wrote to memory of 5108 2016 b9b8e8c011.exe 94 PID 2016 wrote to memory of 5108 2016 b9b8e8c011.exe 94 PID 5108 wrote to memory of 212 5108 axplont.exe 97 PID 5108 wrote to memory of 212 5108 axplont.exe 97 PID 5108 wrote to memory of 212 5108 axplont.exe 97 PID 2260 wrote to memory of 2568 2260 explortu.exe 101 PID 2260 wrote to memory of 2568 2260 explortu.exe 101 PID 2260 wrote to memory of 2568 2260 explortu.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\785eaa3bc1ff11f50470a846c35cae7c4389c331c8a9eaaacfdced0b46a6b650.exe"C:\Users\Admin\AppData\Local\Temp\785eaa3bc1ff11f50470a846c35cae7c4389c331c8a9eaaacfdced0b46a6b650.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵PID:2284
-
-
C:\Users\Admin\1000004002\b9b8e8c011.exe"C:\Users\Admin\1000004002\b9b8e8c011.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\1000036001\victor.exe"C:\Users\Admin\AppData\Local\Temp\1000036001\victor.exe"5⤵
- Executes dropped EXE
PID:212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 212 -s 2326⤵
- Program crash
PID:4168
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\14aa91fd4e.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\14aa91fd4e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 212 -ip 2121⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1880
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4168
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5238e6212561325caf21594988d686271
SHA19ea9b2247ca3f5791e91c74263ce4c8b9dd5952e
SHA256861ea16c509308f3d4eaff3a6db620b48c6a0575626002ec287a5b356781e423
SHA5126e42d5bea35d299cb5b38bcb4f27a71963cd92a690d8479cfc357e87607596ee7a27c2a565cb5c09f82e6f05523ae4b5f19c534a3e93c271ad79af62dc871e28
-
Filesize
2.4MB
MD5ebc16a7e0daafe552f108f405bd69026
SHA1099f185bc565398aa0df32878b238dbca526bf22
SHA25653da52ae0039ba4dfa7a5e61f2f3e6fe3277fc502bc22292e3eef8fa13a431aa
SHA512d1d27562f9e2f3680e99bd659627da42de36112f22c3284f40dbce2ebe1c9369a8748077bc92a9c5c1b7bf58da641b42b7905c788124ecd275e0a58890721899
-
Filesize
312KB
MD501cff6fb725465d86284505028b42cfd
SHA1f9182ea73fe1f80a41ba996ed9d00548c95abbcf
SHA2563814ef98c5c16988df008a989038faf39943b32fb9687dc9347ac16df722e4cd
SHA512ecf4e2e236dd55032c5e0ea4048557463519036279b586d53a1ef4ea50df049651385bbc11c55d515a73d6f568ea28080513035273de524466eae72b46461088
-
Filesize
1.9MB
MD5c84ab890634ffbc2ff51f707efb68cc2
SHA1b2afe57c4d8a68cc513239d61900992ee85a2249
SHA256785eaa3bc1ff11f50470a846c35cae7c4389c331c8a9eaaacfdced0b46a6b650
SHA51214a4bb9c3b5301c4a5e175b8268db34457a1ac648008cbe47b7b0eee7322ad4f29444e949527a92beb0de43e5f06a6ad6826158186cec2af8964432f01c8c067