Analysis
-
max time kernel
146s -
max time network
131s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-06-2024 03:15
Static task
static1
Behavioral task
behavioral1
Sample
3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe
Resource
win10v2004-20240508-en
General
-
Target
3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe
-
Size
1.8MB
-
MD5
80b2f60196d360a6da148e79f8893071
-
SHA1
b6426314b975b791dddda90c74874d98ac88e4ea
-
SHA256
3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664
-
SHA512
37986105666347b5d0c2b2d9dfbacbf1a13a4eeec6478f6399db0aba94057ac6c07ef0f1454634e4f4e6e78d279674525bede9a8e9956cd5a919025dd2e8fb0e
-
SSDEEP
49152:kGweN7S30wAjlNYY7fYUU6dhctA8I08FrS:kGd0YtbYUkAbFr
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
risepro
147.45.47.126:58709
Extracted
amadey
4.21
49e482
http://147.45.47.70
-
install_dir
1b29d73536
-
install_file
axplont.exe
-
strings_key
4d31dd1a190d9879c21fac6d87dc0043
-
url_paths
/tr8nomy/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 851852fb4b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ca455bb271.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ca455bb271.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 851852fb4b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 851852fb4b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ca455bb271.exe -
Executes dropped EXE 14 IoCs
pid Process 788 explortu.exe 4836 explortu.exe 3724 851852fb4b.exe 4816 axplont.exe 2888 ca455bb271.exe 1560 lgodjadrg.exe 972 work.exe 676 lgors.exe 4820 virclg.exe 1132 axplont.exe 1800 explortu.exe 3392 virclg.exe 3292 axplont.exe 5080 explortu.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine 851852fb4b.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine 3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine ca455bb271.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Wine explortu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows\CurrentVersion\Run\ca455bb271.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000005001\\ca455bb271.exe" explortu.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 3732 3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe 788 explortu.exe 4836 explortu.exe 3724 851852fb4b.exe 4816 axplont.exe 2888 ca455bb271.exe 1132 axplont.exe 1800 explortu.exe 3292 axplont.exe 5080 explortu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 788 set thread context of 4836 788 explortu.exe 81 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\virclg.job lgors.exe File created C:\Windows\Tasks\explortu.job 3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe File created C:\Windows\Tasks\axplont.job 851852fb4b.exe File created C:\Windows\Tasks\virclg.job lgors.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3732 3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe 3732 3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe 788 explortu.exe 788 explortu.exe 4836 explortu.exe 4836 explortu.exe 3724 851852fb4b.exe 3724 851852fb4b.exe 4816 axplont.exe 4816 axplont.exe 2888 ca455bb271.exe 2888 ca455bb271.exe 676 lgors.exe 676 lgors.exe 1132 axplont.exe 1132 axplont.exe 1800 explortu.exe 1800 explortu.exe 3292 axplont.exe 3292 axplont.exe 5080 explortu.exe 5080 explortu.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3724 851852fb4b.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3732 wrote to memory of 788 3732 3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe 80 PID 3732 wrote to memory of 788 3732 3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe 80 PID 3732 wrote to memory of 788 3732 3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe 80 PID 788 wrote to memory of 4836 788 explortu.exe 81 PID 788 wrote to memory of 4836 788 explortu.exe 81 PID 788 wrote to memory of 4836 788 explortu.exe 81 PID 788 wrote to memory of 4836 788 explortu.exe 81 PID 788 wrote to memory of 4836 788 explortu.exe 81 PID 788 wrote to memory of 4836 788 explortu.exe 81 PID 788 wrote to memory of 4836 788 explortu.exe 81 PID 788 wrote to memory of 4836 788 explortu.exe 81 PID 788 wrote to memory of 4836 788 explortu.exe 81 PID 788 wrote to memory of 4836 788 explortu.exe 81 PID 788 wrote to memory of 4836 788 explortu.exe 81 PID 788 wrote to memory of 4836 788 explortu.exe 81 PID 788 wrote to memory of 3724 788 explortu.exe 82 PID 788 wrote to memory of 3724 788 explortu.exe 82 PID 788 wrote to memory of 3724 788 explortu.exe 82 PID 3724 wrote to memory of 4816 3724 851852fb4b.exe 83 PID 3724 wrote to memory of 4816 3724 851852fb4b.exe 83 PID 3724 wrote to memory of 4816 3724 851852fb4b.exe 83 PID 788 wrote to memory of 2888 788 explortu.exe 84 PID 788 wrote to memory of 2888 788 explortu.exe 84 PID 788 wrote to memory of 2888 788 explortu.exe 84 PID 4816 wrote to memory of 1560 4816 axplont.exe 85 PID 4816 wrote to memory of 1560 4816 axplont.exe 85 PID 4816 wrote to memory of 1560 4816 axplont.exe 85 PID 1560 wrote to memory of 4764 1560 lgodjadrg.exe 86 PID 1560 wrote to memory of 4764 1560 lgodjadrg.exe 86 PID 1560 wrote to memory of 4764 1560 lgodjadrg.exe 86 PID 4764 wrote to memory of 972 4764 cmd.exe 90 PID 4764 wrote to memory of 972 4764 cmd.exe 90 PID 4764 wrote to memory of 972 4764 cmd.exe 90 PID 972 wrote to memory of 676 972 work.exe 91 PID 972 wrote to memory of 676 972 work.exe 91 PID 972 wrote to memory of 676 972 work.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe"C:\Users\Admin\AppData\Local\Temp\3b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Users\Admin\1000004002\851852fb4b.exe"C:\Users\Admin\1000004002\851852fb4b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\1000054001\lgodjadrg.exe"C:\Users\Admin\AppData\Local\Temp\1000054001\lgodjadrg.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exework.exe -priverdD7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\lgors.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\lgors.exe"8⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:676
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\ca455bb271.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\ca455bb271.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
-
C:\ProgramData\stwuwx\virclg.exeC:\ProgramData\stwuwx\virclg.exe start21⤵
- Executes dropped EXE
PID:4820
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1132
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1800
-
C:\ProgramData\stwuwx\virclg.exeC:\ProgramData\stwuwx\virclg.exe start21⤵
- Executes dropped EXE
PID:3392
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3292
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5b5d8813f3ddc3a4c2acd61b15554f33b
SHA14f853cec5a0bfb67c2b50a00d60d008e7518919a
SHA256aa9a4134d69fd2e211a4d997d53b70195192de672b38525ee8360a261ed3d7d2
SHA512a756071514fc11616da672bab897c52208a47dc667477f106e7112855c0c0eb513b40837b794869bd3234880a61acf76bf53f73c70ae1ec51b54fa62e3127d94
-
Filesize
2.3MB
MD50d02928aece928e87c0ad6ec550e37ac
SHA1ca9b875454b9cfe1bd468ccbffffec234f94fda7
SHA256bd555148acf8ec89578618a9e9fbf6cc14227fee987d4a20cf8254f538c6142d
SHA51272c191d5ba4065f35f4c483bf46f59184970ae5782d92e5185a351dc0b41190341cbb3bb639c24a05a2abe05c9a63e5d37a0ce67ff8b519f49c669675fc23d25
-
Filesize
613KB
MD5a1ad149a4d2a04338fd9a0d902410daf
SHA1d43db08458ea4a81cd32926a402d8a5d12728a2f
SHA2566e9f1c1298419230dbc24cfe76a8d64c8094e9d1335a0cef567042b3250e565a
SHA512cef534d0233f47048d6b80c49c4b44570fc436b90904ea84f03c24106ecb785802c424e1241ebd70b9a85f09b77f7c0322927c57a9d65959da4a425149e04128
-
Filesize
1.8MB
MD580b2f60196d360a6da148e79f8893071
SHA1b6426314b975b791dddda90c74874d98ac88e4ea
SHA2563b6b9992ce96744511654b2de630b82b301965fd6ff6735157f1ecd56859d664
SHA51237986105666347b5d0c2b2d9dfbacbf1a13a4eeec6478f6399db0aba94057ac6c07ef0f1454634e4f4e6e78d279674525bede9a8e9956cd5a919025dd2e8fb0e
-
Filesize
35B
MD5ff59d999beb970447667695ce3273f75
SHA1316fa09f467ba90ac34a054daf2e92e6e2854ff8
SHA256065d2b17ad499587dc9de7ee9ecda4938b45da1df388bc72e6627dff220f64d2
SHA512d5ac72cb065a3cd3cb118a69a2f356314eeed24dcb4880751e1a3683895e66cedc62607967e29f77a0c27adf1c9fe0efd86e804f693f0a63a5b51b0bf0056b5d
-
Filesize
294KB
MD5372b142bdf88cc3175d31b48a650955d
SHA1515f9a1e5c954cd849bacd19291534c50201ac49
SHA256e3873f55cd848b37d6897b3851a21aa6c17b3d74d94ea2adcd076cf3eb3f4121
SHA512cff5c69e361d4975f6b10000d5d53ccd0853503f585842ac3422131cf8313195ab8720b65e291c27fc12875b584129069b8548823774320ded37403cc64d8d11
-
Filesize
16KB
MD54f01c3d7439dde153ff0110a26e2a71c
SHA140d7203ad4e1fd40e13a56e6f747ee480740873c
SHA256cfb1fd0adf528fcf14647cf3fcd85fb7e4fddd2167b36f9e8b2424b62453df28
SHA512513d09b80e1ac80813bc691e71cdf5348478157350e43b9daed27741b7f5a7a16b2ae4d88ee9951395747c7f2a93ff0c1f2c3753a9e3bad2e2607767a1e3d28e