Overview
overview
10Static
static
10Small Malw...un.exe
windows10-2004-x64
10Small Malw...ld.exe
windows10-2004-x64
5Small Malw...it.exe
windows10-2004-x64
10Small Malw...23.exe
windows10-2004-x64
10Small Malw...pd.exe
windows10-2004-x64
10Small Malw...23.exe
windows10-2004-x64
5Small Malw...c4.exe
windows10-2004-x64
10Small Malw...a2.exe
windows10-2004-x64
10Small Malw...wd.exe
windows10-2004-x64
10Small Malw...ac.exe
windows10-2004-x64
7Small Malw...64.exe
windows10-2004-x64
8Small Malw...ng.exe
windows10-2004-x64
10Small Malw...tu.exe
windows10-2004-x64
10Small Malw...ux.exe
windows10-2004-x64
10Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 22:15
Behavioral task
behavioral1
Sample
Small Malwares/1000002001/file300un.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
Small Malwares/1000004001/gold.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
Small Malwares/1000005001/judit.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
Small Malwares/1000007001/redline123123.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
Small Malwares/1000008001/upd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
Small Malwares/1000009001/lumma123.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
Small Malwares/1000011002/3a45e77bc4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
Small Malwares/1000012001/c9f61fb9a2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
Small Malwares/1000012001/lrthijawd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
Small Malwares/1000013001/8f8936a9ac.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Small Malwares/1000014001/services64.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
Small Malwares/8254624243/axplong.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
Small Malwares/9217037dc9/explortu.exe
Resource
win10v2004-20240508-en
General
-
Target
Small Malwares/8254624243/axplong.exe
-
Size
1.8MB
-
MD5
a7221b372210af6bea61be50186a3860
-
SHA1
3aa73526e25e9ade86cc74d820bd656e34c8c850
-
SHA256
c8f039706b71366f54bb879a8b9a01745dab0511c11d91bef773c2dddc216881
-
SHA512
939671a3336e29460244a3593a3a0e6925625207ec46fe31ac5864bbf28ceba0a9741e616d25a8625742f442f14dd351ecbe8610d62281e47d3c1d27a4e111f1
-
SSDEEP
49152:QsbBUcmzPnap2/GlHv0gm25LIXaRmySHyMW:QsVft26HvdTUXaRm3SM
Malware Config
Extracted
amadey
8254624243
e76b71
http://77.91.77.81
-
install_dir
8254624243
-
install_file
axplong.exe
-
strings_key
90049e51fabf09df0d6748e0b271922e
-
url_paths
/Kiru9gu/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
Processes:
axplong.exeaxplong.exeaxplong.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
axplong.exeaxplong.exeaxplong.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
axplong.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation axplong.exe -
Executes dropped EXE 2 IoCs
Processes:
axplong.exeaxplong.exepid process 3516 axplong.exe 1572 axplong.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
axplong.exeaxplong.exeaxplong.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Wine axplong.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
axplong.exeaxplong.exeaxplong.exepid process 3044 axplong.exe 3516 axplong.exe 1572 axplong.exe -
Drops file in Windows directory 1 IoCs
Processes:
axplong.exedescription ioc process File created C:\Windows\Tasks\axplong.job axplong.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
axplong.exeaxplong.exeaxplong.exepid process 3044 axplong.exe 3044 axplong.exe 3516 axplong.exe 3516 axplong.exe 1572 axplong.exe 1572 axplong.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
axplong.exepid process 3044 axplong.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
axplong.exedescription pid process target process PID 3044 wrote to memory of 3516 3044 axplong.exe axplong.exe PID 3044 wrote to memory of 3516 3044 axplong.exe axplong.exe PID 3044 wrote to memory of 3516 3044 axplong.exe axplong.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Small Malwares\8254624243\axplong.exe"C:\Users\Admin\AppData\Local\Temp\Small Malwares\8254624243\axplong.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeC:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5a7221b372210af6bea61be50186a3860
SHA13aa73526e25e9ade86cc74d820bd656e34c8c850
SHA256c8f039706b71366f54bb879a8b9a01745dab0511c11d91bef773c2dddc216881
SHA512939671a3336e29460244a3593a3a0e6925625207ec46fe31ac5864bbf28ceba0a9741e616d25a8625742f442f14dd351ecbe8610d62281e47d3c1d27a4e111f1