Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 03:15
Static task
static1
Behavioral task
behavioral1
Sample
3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe
Resource
win10v2004-20240508-en
General
-
Target
3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe
-
Size
1.8MB
-
MD5
80b2f60196d360a6da148e79f8893071
-
SHA1
b6426314b975b791dddda90c74874d98ac88e4ea
-
SHA256
3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664
-
SHA512
37986105666347b5d0c2b2d9dfbacbf1a13a4eeec6478f6399db0aba94057ac6c07ef0f1454634e4f4e6e78d279674525bede9a8e9956cd5a919025dd2e8fb0e
-
SSDEEP
49152:kGweN7S30wAjlNYY7fYUU6dhctA8I08FrS:kGd0YtbYUkAbFr
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
amadey
4.21
49e482
http://147.45.47.70
-
install_dir
1b29d73536
-
install_file
axplont.exe
-
strings_key
4d31dd1a190d9879c21fac6d87dc0043
-
url_paths
/tr8nomy/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4f0accc77f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b55e835fba.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4f0accc77f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4f0accc77f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b55e835fba.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b55e835fba.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation explortu.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 4f0accc77f.exe -
Executes dropped EXE 8 IoCs
pid Process 3168 explortu.exe 428 4f0accc77f.exe 4904 axplont.exe 3404 b55e835fba.exe 4568 axplont.exe 4484 explortu.exe 4032 axplont.exe 4152 explortu.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Wine 3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe Key opened \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Wine 4f0accc77f.exe Key opened \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Wine b55e835fba.exe Key opened \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Wine axplont.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b55e835fba.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000005001\\b55e835fba.exe" explortu.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 2796 3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe 3168 explortu.exe 428 4f0accc77f.exe 4904 axplont.exe 3404 b55e835fba.exe 4568 axplont.exe 4484 explortu.exe 4032 axplont.exe 4152 explortu.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\explortu.job 3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe File created C:\Windows\Tasks\axplont.job 4f0accc77f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2796 3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe 2796 3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe 3168 explortu.exe 3168 explortu.exe 428 4f0accc77f.exe 428 4f0accc77f.exe 4904 axplont.exe 4904 axplont.exe 3404 b55e835fba.exe 3404 b55e835fba.exe 4568 axplont.exe 4568 axplont.exe 4484 explortu.exe 4484 explortu.exe 4152 explortu.exe 4032 axplont.exe 4152 explortu.exe 4032 axplont.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2796 wrote to memory of 3168 2796 3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe 85 PID 2796 wrote to memory of 3168 2796 3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe 85 PID 2796 wrote to memory of 3168 2796 3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe 85 PID 3168 wrote to memory of 5052 3168 explortu.exe 90 PID 3168 wrote to memory of 5052 3168 explortu.exe 90 PID 3168 wrote to memory of 5052 3168 explortu.exe 90 PID 3168 wrote to memory of 428 3168 explortu.exe 92 PID 3168 wrote to memory of 428 3168 explortu.exe 92 PID 3168 wrote to memory of 428 3168 explortu.exe 92 PID 428 wrote to memory of 4904 428 4f0accc77f.exe 93 PID 428 wrote to memory of 4904 428 4f0accc77f.exe 93 PID 428 wrote to memory of 4904 428 4f0accc77f.exe 93 PID 3168 wrote to memory of 3404 3168 explortu.exe 95 PID 3168 wrote to memory of 3404 3168 explortu.exe 95 PID 3168 wrote to memory of 3404 3168 explortu.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe"C:\Users\Admin\AppData\Local\Temp\3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵PID:5052
-
-
C:\Users\Admin\1000004002\4f0accc77f.exe"C:\Users\Admin\1000004002\4f0accc77f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\b55e835fba.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\b55e835fba.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4484
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4152
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5b5d8813f3ddc3a4c2acd61b15554f33b
SHA14f853cec5a0bfb67c2b50a00d60d008e7518919a
SHA256aa9a4134d69fd2e211a4d997d53b70195192de672b38525ee8360a261ed3d7d2
SHA512a756071514fc11616da672bab897c52208a47dc667477f106e7112855c0c0eb513b40837b794869bd3234880a61acf76bf53f73c70ae1ec51b54fa62e3127d94
-
Filesize
2.3MB
MD50d02928aece928e87c0ad6ec550e37ac
SHA1ca9b875454b9cfe1bd468ccbffffec234f94fda7
SHA256bd555148acf8ec89578618a9e9fbf6cc14227fee987d4a20cf8254f538c6142d
SHA51272c191d5ba4065f35f4c483bf46f59184970ae5782d92e5185a351dc0b41190341cbb3bb639c24a05a2abe05c9a63e5d37a0ce67ff8b519f49c669675fc23d25
-
Filesize
1.8MB
MD580b2f60196d360a6da148e79f8893071
SHA1b6426314b975b791dddda90c74874d98ac88e4ea
SHA2563b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664
SHA51237986105666347b5d0c2b2d9dfbacbf1a13a4eeec6478f6399db0aba94057ac6c07ef0f1454634e4f4e6e78d279674525bede9a8e9956cd5a919025dd2e8fb0e