Analysis
-
max time kernel
147s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 05:42
Static task
static1
Behavioral task
behavioral1
Sample
31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exe
Resource
win10v2004-20240426-en
General
-
Target
31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exe
-
Size
1.8MB
-
MD5
02e91d98e12207c4473852bce3568320
-
SHA1
ca469f24ef0d675edf4cbf17a194152a46d9f474
-
SHA256
31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae
-
SHA512
c2756849a0371d3f5f10165686563e430afea492569fd4c555c2f7ac1eb8b657881c112d50240df9612dd7ef23626de0678ee87f542b14112e25cf47f21fa0d1
-
SSDEEP
24576:bw+nf4ThJTnw90+THutAeNhQevt5tcfvp9yBWeFPQyYsdXgZR:PnQ3nGOCeFt5CfvpTqMqS
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
amadey
4.21
49e482
http://147.45.47.70
-
install_dir
1b29d73536
-
install_file
axplont.exe
-
strings_key
4d31dd1a190d9879c21fac6d87dc0043
-
url_paths
/tr8nomy/index.php
Extracted
risepro
147.45.47.126:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
Processes:
31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exeexplortu.exeeaf2704d56.exeaxplont.exe9108c66341.exeaxplont.exeexplortu.exeexplortu.exeaxplont.exeaxplont.exeexplortu.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ eaf2704d56.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9108c66341.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
axplont.exeeaf2704d56.exeaxplont.exeexplortu.exeexplortu.exeexplortu.exeaxplont.exe31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exeexplortu.exe9108c66341.exeaxplont.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eaf2704d56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9108c66341.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eaf2704d56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9108c66341.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
explortu.exeeaf2704d56.exe31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation explortu.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation eaf2704d56.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exe -
Executes dropped EXE 10 IoCs
Processes:
explortu.exeeaf2704d56.exeaxplont.exe9108c66341.exeaxplont.exeexplortu.exeexplortu.exeaxplont.exeaxplont.exeexplortu.exepid process 3928 explortu.exe 4532 eaf2704d56.exe 4636 axplont.exe 3408 9108c66341.exe 4676 axplont.exe 4292 explortu.exe 808 explortu.exe 588 axplont.exe 2148 axplont.exe 1424 explortu.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
explortu.exeaxplont.exeaxplont.exeexplortu.exeaxplont.exe31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exeeaf2704d56.exe9108c66341.exeexplortu.exeaxplont.exeexplortu.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine 31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine eaf2704d56.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine 9108c66341.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Software\Wine explortu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explortu.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9108c66341.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000005001\\9108c66341.exe" explortu.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
Processes:
31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exeexplortu.exeeaf2704d56.exeaxplont.exe9108c66341.exeaxplont.exeexplortu.exeexplortu.exeaxplont.exeaxplont.exeexplortu.exepid process 3264 31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exe 3928 explortu.exe 4532 eaf2704d56.exe 4636 axplont.exe 3408 9108c66341.exe 4676 axplont.exe 4292 explortu.exe 808 explortu.exe 588 axplont.exe 2148 axplont.exe 1424 explortu.exe -
Drops file in Windows directory 2 IoCs
Processes:
31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exeeaf2704d56.exedescription ioc process File created C:\Windows\Tasks\explortu.job 31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exe File created C:\Windows\Tasks\axplont.job eaf2704d56.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exeexplortu.exeeaf2704d56.exeaxplont.exe9108c66341.exeaxplont.exeexplortu.exeexplortu.exeaxplont.exeaxplont.exeexplortu.exepid process 3264 31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exe 3264 31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exe 3928 explortu.exe 3928 explortu.exe 4532 eaf2704d56.exe 4532 eaf2704d56.exe 4636 axplont.exe 4636 axplont.exe 3408 9108c66341.exe 3408 9108c66341.exe 4676 axplont.exe 4676 axplont.exe 4292 explortu.exe 4292 explortu.exe 808 explortu.exe 808 explortu.exe 588 axplont.exe 588 axplont.exe 2148 axplont.exe 2148 axplont.exe 1424 explortu.exe 1424 explortu.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exeexplortu.exeeaf2704d56.exedescription pid process target process PID 3264 wrote to memory of 3928 3264 31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exe explortu.exe PID 3264 wrote to memory of 3928 3264 31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exe explortu.exe PID 3264 wrote to memory of 3928 3264 31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exe explortu.exe PID 3928 wrote to memory of 4216 3928 explortu.exe explortu.exe PID 3928 wrote to memory of 4216 3928 explortu.exe explortu.exe PID 3928 wrote to memory of 4216 3928 explortu.exe explortu.exe PID 3928 wrote to memory of 4532 3928 explortu.exe eaf2704d56.exe PID 3928 wrote to memory of 4532 3928 explortu.exe eaf2704d56.exe PID 3928 wrote to memory of 4532 3928 explortu.exe eaf2704d56.exe PID 4532 wrote to memory of 4636 4532 eaf2704d56.exe axplont.exe PID 4532 wrote to memory of 4636 4532 eaf2704d56.exe axplont.exe PID 4532 wrote to memory of 4636 4532 eaf2704d56.exe axplont.exe PID 3928 wrote to memory of 3408 3928 explortu.exe 9108c66341.exe PID 3928 wrote to memory of 3408 3928 explortu.exe 9108c66341.exe PID 3928 wrote to memory of 3408 3928 explortu.exe 9108c66341.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exe"C:\Users\Admin\AppData\Local\Temp\31b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵PID:4216
-
-
C:\Users\Admin\1000004002\eaf2704d56.exe"C:\Users\Admin\1000004002\eaf2704d56.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4636
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\9108c66341.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\9108c66341.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3408
-
-
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:808
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:588
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2148
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5c7c9a6754922f1464d4880682eb071dc
SHA1a680b597905438925fd1f11b2bbfcd73009308aa
SHA256a61554f35d21eb178800ebca907e5eebb0d2ccfb23760010a314bf6694c0bcc6
SHA512c4277cbf583e256001c5034541ec84258f146d1c61a9b64e0adf4883730916452585dec2036fd49b6f210382a2c17ba30a586d9758f6196bb211ff7b08a90342
-
Filesize
2.3MB
MD52d8da46d6febc5407f21470f76b95884
SHA1b3876364f4fa640018bfc3186e46768ecec98a6d
SHA256e5daf6f39fafbb0d0e0d8ebe4fdcd3cf7d57c05b61dafd60341eb5367cb70354
SHA51291e28a4755f41abe4210e42902d87d0bd91d53371a1b3fd55bb16c4890ab7457d976a6a402985c95f9c65785f9d0b7296b7b6f4502907523981789d6f45055a5
-
Filesize
1.8MB
MD502e91d98e12207c4473852bce3568320
SHA1ca469f24ef0d675edf4cbf17a194152a46d9f474
SHA25631b3a198ab975b8118864e762a3a74364ee279aef7fe987c5632bcc1915858ae
SHA512c2756849a0371d3f5f10165686563e430afea492569fd4c555c2f7ac1eb8b657881c112d50240df9612dd7ef23626de0678ee87f542b14112e25cf47f21fa0d1