Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02-06-2024 22:11

General

  • Target

    7326666bbd17beb98568820a10d9096d9442f5d3e7a7aa06e822d6322711ca7b.exe

  • Size

    1.9MB

  • MD5

    e5426f582b92e86692ddd2de537fc008

  • SHA1

    f65260cb69495bd3a58e0494df80b28ece315791

  • SHA256

    7326666bbd17beb98568820a10d9096d9442f5d3e7a7aa06e822d6322711ca7b

  • SHA512

    0cbac4358cc0ed09cecb9730756a38a6a8529768da152364e46ba07ffcabeeb2071499062833ceeecc0166757f057e8c6a437d74cda02aefd883ee22fb75b66a

  • SSDEEP

    49152:Rv1OWcNm3xQNtxy7DgyVcRGCBKWhPgsbSBp6h5bk:t1OWpxQtJJGCzhP3bSrS5

Malware Config

Extracted

Family

amadey

Version

4.21

Botnet

0e6740

C2

http://147.45.47.155

Attributes
  • install_dir

    9217037dc9

  • install_file

    explortu.exe

  • strings_key

    8e894a8a4a3d0da8924003a561cfb244

  • url_paths

    /ku4Nor9/index.php

rc4.plain

Extracted

Family

amadey

Version

4.21

Botnet

49e482

C2

http://147.45.47.70

Attributes
  • install_dir

    1b29d73536

  • install_file

    axplont.exe

  • strings_key

    4d31dd1a190d9879c21fac6d87dc0043

  • url_paths

    /tr8nomy/index.php

rc4.plain

Extracted

Family

risepro

C2

147.45.47.126:58709

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 11 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7326666bbd17beb98568820a10d9096d9442f5d3e7a7aa06e822d6322711ca7b.exe
    "C:\Users\Admin\AppData\Local\Temp\7326666bbd17beb98568820a10d9096d9442f5d3e7a7aa06e822d6322711ca7b.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:436
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2440
      • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
        "C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"
        3⤵
          PID:1520
        • C:\Users\Admin\1000004002\ddf9b4ff1a.exe
          "C:\Users\Admin\1000004002\ddf9b4ff1a.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1492
          • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
            "C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            PID:2804
        • C:\Users\Admin\AppData\Local\Temp\1000005001\a69e6f8b39.exe
          "C:\Users\Admin\AppData\Local\Temp\1000005001\a69e6f8b39.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          PID:4980
    • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
      C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:2492
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:2752
    • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
      C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:2500
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:4008
    • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
      C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:2040
    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe
      1⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:2492

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\1000004002\ddf9b4ff1a.exe

      Filesize

      1.8MB

      MD5

      ffb4cb16f985e6d330950d516cef3956

      SHA1

      e1559d2f5bf4e55ea9212a3f4a669779a45d842b

      SHA256

      4fdafc7cb15e04d4c5463c16877b2ff7a747b5f5630b5b557b768622d722a203

      SHA512

      5d5382e1be399e4ed43db086e901cf98eca61e4f221ac6d8947a89f5f9f913494af491e0798881003b8430d1ac48abd42fdeb0b64d74d31a80659d3f0b422302

    • C:\Users\Admin\AppData\Local\Temp\1000005001\a69e6f8b39.exe

      Filesize

      2.3MB

      MD5

      8c054c5928b0e8bd44b2eec900ce37f8

      SHA1

      902f950041b45f47c04910adaa094e4200216165

      SHA256

      facfd963fca9acc88d5aa946fe4cbe90645b0f63875f2c2d4108907f1a184964

      SHA512

      35f526925d63815ddf7cbbac9fa83b7561f19c3188e863f6050b1a38b7fade6c92719fda8a6fcc213906c76b79af53041c68564b115e4bae58a9e83b6fdd01d8

    • C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe

      Filesize

      1.9MB

      MD5

      e5426f582b92e86692ddd2de537fc008

      SHA1

      f65260cb69495bd3a58e0494df80b28ece315791

      SHA256

      7326666bbd17beb98568820a10d9096d9442f5d3e7a7aa06e822d6322711ca7b

      SHA512

      0cbac4358cc0ed09cecb9730756a38a6a8529768da152364e46ba07ffcabeeb2071499062833ceeecc0166757f057e8c6a437d74cda02aefd883ee22fb75b66a

    • memory/436-17-0x0000000000C60000-0x000000000112F000-memory.dmp

      Filesize

      4.8MB

    • memory/436-4-0x0000000000C60000-0x000000000112F000-memory.dmp

      Filesize

      4.8MB

    • memory/436-3-0x0000000000C60000-0x000000000112F000-memory.dmp

      Filesize

      4.8MB

    • memory/436-2-0x0000000000C61000-0x0000000000C8F000-memory.dmp

      Filesize

      184KB

    • memory/436-0-0x0000000000C60000-0x000000000112F000-memory.dmp

      Filesize

      4.8MB

    • memory/436-1-0x00000000778F6000-0x00000000778F8000-memory.dmp

      Filesize

      8KB

    • memory/1492-38-0x00000000005F0000-0x0000000000A8D000-memory.dmp

      Filesize

      4.6MB

    • memory/1492-39-0x00000000005F0000-0x0000000000A8D000-memory.dmp

      Filesize

      4.6MB

    • memory/1492-52-0x00000000005F0000-0x0000000000A8D000-memory.dmp

      Filesize

      4.6MB

    • memory/2040-130-0x0000000000280000-0x000000000071D000-memory.dmp

      Filesize

      4.6MB

    • memory/2040-133-0x0000000000280000-0x000000000071D000-memory.dmp

      Filesize

      4.6MB

    • memory/2440-123-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2440-85-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2440-99-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2440-73-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2440-20-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2440-75-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2440-96-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2440-78-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2440-111-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2440-81-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2440-18-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2440-93-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2440-114-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2440-135-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2440-19-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2440-126-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2440-102-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2440-120-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2440-90-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2440-117-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2492-83-0x0000000000280000-0x000000000071D000-memory.dmp

      Filesize

      4.6MB

    • memory/2492-79-0x0000000000280000-0x000000000071D000-memory.dmp

      Filesize

      4.6MB

    • memory/2492-132-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2492-134-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2500-109-0x0000000000280000-0x000000000071D000-memory.dmp

      Filesize

      4.6MB

    • memory/2500-106-0x0000000000280000-0x000000000071D000-memory.dmp

      Filesize

      4.6MB

    • memory/2752-84-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2752-82-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/2804-94-0x0000000000280000-0x000000000071D000-memory.dmp

      Filesize

      4.6MB

    • memory/2804-124-0x0000000000280000-0x000000000071D000-memory.dmp

      Filesize

      4.6MB

    • memory/2804-100-0x0000000000280000-0x000000000071D000-memory.dmp

      Filesize

      4.6MB

    • memory/2804-104-0x0000000000280000-0x000000000071D000-memory.dmp

      Filesize

      4.6MB

    • memory/2804-53-0x0000000000280000-0x000000000071D000-memory.dmp

      Filesize

      4.6MB

    • memory/2804-74-0x0000000000280000-0x000000000071D000-memory.dmp

      Filesize

      4.6MB

    • memory/2804-128-0x0000000000280000-0x000000000071D000-memory.dmp

      Filesize

      4.6MB

    • memory/2804-97-0x0000000000280000-0x000000000071D000-memory.dmp

      Filesize

      4.6MB

    • memory/2804-86-0x0000000000280000-0x000000000071D000-memory.dmp

      Filesize

      4.6MB

    • memory/2804-87-0x0000000000280000-0x000000000071D000-memory.dmp

      Filesize

      4.6MB

    • memory/2804-112-0x0000000000280000-0x000000000071D000-memory.dmp

      Filesize

      4.6MB

    • memory/2804-121-0x0000000000280000-0x000000000071D000-memory.dmp

      Filesize

      4.6MB

    • memory/2804-118-0x0000000000280000-0x000000000071D000-memory.dmp

      Filesize

      4.6MB

    • memory/2804-115-0x0000000000280000-0x000000000071D000-memory.dmp

      Filesize

      4.6MB

    • memory/2804-91-0x0000000000280000-0x000000000071D000-memory.dmp

      Filesize

      4.6MB

    • memory/4008-110-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/4008-108-0x00000000009A0000-0x0000000000E6F000-memory.dmp

      Filesize

      4.8MB

    • memory/4980-113-0x0000000000E10000-0x00000000013FC000-memory.dmp

      Filesize

      5.9MB

    • memory/4980-95-0x0000000000E10000-0x00000000013FC000-memory.dmp

      Filesize

      5.9MB

    • memory/4980-116-0x0000000000E10000-0x00000000013FC000-memory.dmp

      Filesize

      5.9MB

    • memory/4980-122-0x0000000000E10000-0x00000000013FC000-memory.dmp

      Filesize

      5.9MB

    • memory/4980-89-0x0000000000E10000-0x00000000013FC000-memory.dmp

      Filesize

      5.9MB

    • memory/4980-101-0x0000000000E10000-0x00000000013FC000-memory.dmp

      Filesize

      5.9MB

    • memory/4980-125-0x0000000000E10000-0x00000000013FC000-memory.dmp

      Filesize

      5.9MB

    • memory/4980-88-0x0000000000E10000-0x00000000013FC000-memory.dmp

      Filesize

      5.9MB

    • memory/4980-129-0x0000000000E10000-0x00000000013FC000-memory.dmp

      Filesize

      5.9MB

    • memory/4980-119-0x0000000000E10000-0x00000000013FC000-memory.dmp

      Filesize

      5.9MB

    • memory/4980-92-0x0000000000E10000-0x00000000013FC000-memory.dmp

      Filesize

      5.9MB

    • memory/4980-77-0x0000000000E10000-0x00000000013FC000-memory.dmp

      Filesize

      5.9MB

    • memory/4980-98-0x0000000000E10000-0x00000000013FC000-memory.dmp

      Filesize

      5.9MB

    • memory/4980-72-0x0000000000E10000-0x00000000013FC000-memory.dmp

      Filesize

      5.9MB

    • memory/4980-105-0x0000000000E10000-0x00000000013FC000-memory.dmp

      Filesize

      5.9MB