Analysis
-
max time kernel
149s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 20:27
Static task
static1
Behavioral task
behavioral1
Sample
01527bc98ff30f8f8358cbc3e49c824b103ad9a44a707527aa2b6269e38fed18.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
01527bc98ff30f8f8358cbc3e49c824b103ad9a44a707527aa2b6269e38fed18.exe
Resource
win11-20240611-en
General
-
Target
01527bc98ff30f8f8358cbc3e49c824b103ad9a44a707527aa2b6269e38fed18.exe
-
Size
1.8MB
-
MD5
df049ea95b9b735212f34f7f85b5f4a1
-
SHA1
79a1b117741c79c3b28389c96ee6a399b95fb4a3
-
SHA256
01527bc98ff30f8f8358cbc3e49c824b103ad9a44a707527aa2b6269e38fed18
-
SHA512
c35c2bccccc833106fa1003f0fb476395512e7546bebbc28e35b84ced957aa3fb50e9df06340892a53f0488a0bf7b4c788b691dd3790b72f51ddb172e3eab437
-
SSDEEP
24576:WGPL+lNVlzMoTxEEjSjLy9AcakEbLYTJi4wwgrMMuBQ9dQzg+/m1qGq6c9U3xNgD:dClrRjSXbqcLMzgrTyMmg+etq9lJpH
Malware Config
Extracted
amadey
8254624243
e76b71
http://77.91.77.81
-
install_dir
8254624243
-
install_file
axplong.exe
-
strings_key
90049e51fabf09df0d6748e0b271922e
-
url_paths
/Kiru9gu/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 01527bc98ff30f8f8358cbc3e49c824b103ad9a44a707527aa2b6269e38fed18.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 01527bc98ff30f8f8358cbc3e49c824b103ad9a44a707527aa2b6269e38fed18.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 01527bc98ff30f8f8358cbc3e49c824b103ad9a44a707527aa2b6269e38fed18.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 01527bc98ff30f8f8358cbc3e49c824b103ad9a44a707527aa2b6269e38fed18.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation axplong.exe -
Executes dropped EXE 9 IoCs
pid Process 4888 axplong.exe 4388 chromedriver.exe 6024 axplong.exe 640 chromedriver.exe 1348 axplong.exe 6052 asom.exe 4060 asom.exe 5868 axplong.exe 5348 asom.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine 01527bc98ff30f8f8358cbc3e49c824b103ad9a44a707527aa2b6269e38fed18.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Software\Wine axplong.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeDriver = "C:\\Users\\Admin\\AppData\\Roaming\\ChromeDriver.exe" chromedriver.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1944 01527bc98ff30f8f8358cbc3e49c824b103ad9a44a707527aa2b6269e38fed18.exe 4888 axplong.exe 6024 axplong.exe 1348 axplong.exe 5868 axplong.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4388 set thread context of 640 4388 chromedriver.exe 106 PID 6052 set thread context of 4060 6052 asom.exe 109 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 01527bc98ff30f8f8358cbc3e49c824b103ad9a44a707527aa2b6269e38fed18.exe File created C:\Windows\Tasks\Test Task17.job chromedriver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1944 01527bc98ff30f8f8358cbc3e49c824b103ad9a44a707527aa2b6269e38fed18.exe 1944 01527bc98ff30f8f8358cbc3e49c824b103ad9a44a707527aa2b6269e38fed18.exe 4888 axplong.exe 4888 axplong.exe 6024 axplong.exe 6024 axplong.exe 1348 axplong.exe 1348 axplong.exe 5868 axplong.exe 5868 axplong.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4388 chromedriver.exe Token: SeDebugPrivilege 4388 chromedriver.exe Token: SeDebugPrivilege 6052 asom.exe Token: SeDebugPrivilege 6052 asom.exe Token: SeDebugPrivilege 5348 asom.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1944 wrote to memory of 4888 1944 01527bc98ff30f8f8358cbc3e49c824b103ad9a44a707527aa2b6269e38fed18.exe 92 PID 1944 wrote to memory of 4888 1944 01527bc98ff30f8f8358cbc3e49c824b103ad9a44a707527aa2b6269e38fed18.exe 92 PID 1944 wrote to memory of 4888 1944 01527bc98ff30f8f8358cbc3e49c824b103ad9a44a707527aa2b6269e38fed18.exe 92 PID 4888 wrote to memory of 4388 4888 axplong.exe 100 PID 4888 wrote to memory of 4388 4888 axplong.exe 100 PID 4888 wrote to memory of 4388 4888 axplong.exe 100 PID 4388 wrote to memory of 640 4388 chromedriver.exe 106 PID 4388 wrote to memory of 640 4388 chromedriver.exe 106 PID 4388 wrote to memory of 640 4388 chromedriver.exe 106 PID 4388 wrote to memory of 640 4388 chromedriver.exe 106 PID 4388 wrote to memory of 640 4388 chromedriver.exe 106 PID 4388 wrote to memory of 640 4388 chromedriver.exe 106 PID 4388 wrote to memory of 640 4388 chromedriver.exe 106 PID 4388 wrote to memory of 640 4388 chromedriver.exe 106 PID 6052 wrote to memory of 4060 6052 asom.exe 109 PID 6052 wrote to memory of 4060 6052 asom.exe 109 PID 6052 wrote to memory of 4060 6052 asom.exe 109 PID 6052 wrote to memory of 4060 6052 asom.exe 109 PID 6052 wrote to memory of 4060 6052 asom.exe 109 PID 6052 wrote to memory of 4060 6052 asom.exe 109 PID 6052 wrote to memory of 4060 6052 asom.exe 109 PID 6052 wrote to memory of 4060 6052 asom.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\01527bc98ff30f8f8358cbc3e49c824b103ad9a44a707527aa2b6269e38fed18.exe"C:\Users\Admin\AppData\Local\Temp\01527bc98ff30f8f8358cbc3e49c824b103ad9a44a707527aa2b6269e38fed18.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\1000087001\chromedriver.exe"C:\Users\Admin\AppData\Local\Temp\1000087001\chromedriver.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\1000087001\chromedriver.exe"C:\Users\Admin\AppData\Local\Temp\1000087001\chromedriver.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:640
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3728,i,14221647728265121051,6840906015709541562,262144 --variations-seed-version --mojo-platform-channel-handle=4188 /prefetch:81⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeC:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6024
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeC:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
C:\ProgramData\kirwwsf\asom.exeC:\ProgramData\kirwwsf\asom.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6052 -
C:\ProgramData\kirwwsf\asom.exe"C:\ProgramData\kirwwsf\asom.exe"2⤵
- Executes dropped EXE
PID:4060
-
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeC:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5868
-
C:\ProgramData\kirwwsf\asom.exeC:\ProgramData\kirwwsf\asom.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
805B
MD54b74e933d78bd5e8fb1cc4653fb2133c
SHA1f6e931eec700fa325bd40c3adc6f1c0eba806066
SHA256fd99bed17853f5ad196ca6d4a62f5e2405fbdf5b98cbf45af8b7cef83e4bcec3
SHA512b56ff89eff1a757a87dcb875206ae92d39ffdb5adf638600c21bc7c76ff4cc25502ae1060716488c7ed1641f8cdfad2a320443b7b4d9f09808eb86eb87f351ec
-
Filesize
3.5MB
MD57e9e5a3bb475784e3fd62cd8ec68901b
SHA165d5cfc5dcadd1b216095ec0b0f2256351234485
SHA256997168ff6f969fd612eff93901e67726f13930bdfe473ecf1dc3ec1a1ab7ba21
SHA51297b672f8a99124263c844dd650ddca4b2f1adece23803c352d6619d3be73e29fd96150122669322502175cb657155052bd62f1ba607d40cc7877075c4866cf3b
-
Filesize
1.8MB
MD5df049ea95b9b735212f34f7f85b5f4a1
SHA179a1b117741c79c3b28389c96ee6a399b95fb4a3
SHA25601527bc98ff30f8f8358cbc3e49c824b103ad9a44a707527aa2b6269e38fed18
SHA512c35c2bccccc833106fa1003f0fb476395512e7546bebbc28e35b84ced957aa3fb50e9df06340892a53f0488a0bf7b4c788b691dd3790b72f51ddb172e3eab437
-
Filesize
236B
MD5bd16cb5645f209f47bdf2363f640345c
SHA141320820d15543f2b598af55d21fbc160b325236
SHA25654442b29d68a77912b5174190d1e84db10c617edfe2a7c08270f52352b6f2b52
SHA512989d0f047a53a7d7856f673d13aa6425d49fe1167ace7427056c86c784146d6dceeec2a8b1f1f511562a10c53bd014d67350e84eda734f044b66b7df4aa9c041