Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
296s -
max time network
289s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
24/06/2024, 05:37
Static task
static1
Behavioral task
behavioral1
Sample
9b8e08ea2aec28b88beb62643cdc73c1178033173690935d4fe63fd8dc22d2c4.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9b8e08ea2aec28b88beb62643cdc73c1178033173690935d4fe63fd8dc22d2c4.exe
Resource
win10-20240404-en
General
-
Target
9b8e08ea2aec28b88beb62643cdc73c1178033173690935d4fe63fd8dc22d2c4.exe
-
Size
1.8MB
-
MD5
c7f6fb7822a4e281ba6ad23313d79c92
-
SHA1
2a6a9e04a5f9419c3742cbe5f44cba2e02bbddec
-
SHA256
9b8e08ea2aec28b88beb62643cdc73c1178033173690935d4fe63fd8dc22d2c4
-
SHA512
57ebdf7507f18b5f9bf04248fad1397862d638f77152f683c941e71b7f6fad2116a48cffcf4a78793d8267b4113114934289111b2f846a3b2bea0e48bfb83790
-
SSDEEP
49152:MhmFyCGytJt9uczgZWzQdX1ASJ4YXs2JWaUuFS:MUNbucSoQx9PsatUu
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0f149c3688.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9b8e08ea2aec28b88beb62643cdc73c1178033173690935d4fe63fd8dc22d2c4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9b8e08ea2aec28b88beb62643cdc73c1178033173690935d4fe63fd8dc22d2c4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9b8e08ea2aec28b88beb62643cdc73c1178033173690935d4fe63fd8dc22d2c4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0f149c3688.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0f149c3688.exe -
Executes dropped EXE 7 IoCs
pid Process 4064 explortu.exe 428 explortu.exe 2360 explortu.exe 4248 explortu.exe 2932 0f149c3688.exe 2692 explortu.exe 3288 explortu.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Wine 9b8e08ea2aec28b88beb62643cdc73c1178033173690935d4fe63fd8dc22d2c4.exe Key opened \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Wine 0f149c3688.exe Key opened \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Wine explortu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Run\0f149c3688.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000016001\\0f149c3688.exe" explortu.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 3816 9b8e08ea2aec28b88beb62643cdc73c1178033173690935d4fe63fd8dc22d2c4.exe 4064 explortu.exe 428 explortu.exe 2360 explortu.exe 4248 explortu.exe 2932 0f149c3688.exe 2692 explortu.exe 3288 explortu.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explortu.job 9b8e08ea2aec28b88beb62643cdc73c1178033173690935d4fe63fd8dc22d2c4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3816 9b8e08ea2aec28b88beb62643cdc73c1178033173690935d4fe63fd8dc22d2c4.exe 3816 9b8e08ea2aec28b88beb62643cdc73c1178033173690935d4fe63fd8dc22d2c4.exe 4064 explortu.exe 4064 explortu.exe 428 explortu.exe 428 explortu.exe 2360 explortu.exe 2360 explortu.exe 4248 explortu.exe 4248 explortu.exe 2932 0f149c3688.exe 2932 0f149c3688.exe 2692 explortu.exe 2692 explortu.exe 3288 explortu.exe 3288 explortu.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3816 wrote to memory of 4064 3816 9b8e08ea2aec28b88beb62643cdc73c1178033173690935d4fe63fd8dc22d2c4.exe 73 PID 3816 wrote to memory of 4064 3816 9b8e08ea2aec28b88beb62643cdc73c1178033173690935d4fe63fd8dc22d2c4.exe 73 PID 3816 wrote to memory of 4064 3816 9b8e08ea2aec28b88beb62643cdc73c1178033173690935d4fe63fd8dc22d2c4.exe 73 PID 4064 wrote to memory of 4360 4064 explortu.exe 76 PID 4064 wrote to memory of 4360 4064 explortu.exe 76 PID 4064 wrote to memory of 4360 4064 explortu.exe 76 PID 4064 wrote to memory of 2932 4064 explortu.exe 78 PID 4064 wrote to memory of 2932 4064 explortu.exe 78 PID 4064 wrote to memory of 2932 4064 explortu.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b8e08ea2aec28b88beb62643cdc73c1178033173690935d4fe63fd8dc22d2c4.exe"C:\Users\Admin\AppData\Local\Temp\9b8e08ea2aec28b88beb62643cdc73c1178033173690935d4fe63fd8dc22d2c4.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵PID:4360
-
-
C:\Users\Admin\AppData\Local\Temp\1000016001\0f149c3688.exe"C:\Users\Admin\AppData\Local\Temp\1000016001\0f149c3688.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
-
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:428
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2692
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD57cfeaeccbe1e171218a5b4ea49bff0d6
SHA15f357caf7bffba938a455639915269b2ac05e395
SHA256041c058f3cbacbf7627fed950268e8720b5e7e44ce1558bac2c2d6e0a117af9c
SHA512eb3366bd543d956e6d71dc3f4590b017fbc7d5cb8a99973edbc3c4ecf0ada0ea3f26fb03a612c0e0a333468e5e504f9ba6063f849635d632040c04a975033ec7
-
Filesize
1.9MB
MD525433a6f6d376aac1e835826e99b29f9
SHA1343c8403aee7707f99021bef5169ad735ff607c0
SHA25657d7e19bb6a898b52da0384506d31f6961233752bf5d827b70b9f28fd7547dc8
SHA512d66776bc3ab3f01c3519ee4f1de49180b6c91a7b922551d9b163f11571982b1173ba5f4c211a8c65b2ba90b62c1e5500a5599c650a7012aa5e5e8469d0152ce7
-
Filesize
1.8MB
MD5c7f6fb7822a4e281ba6ad23313d79c92
SHA12a6a9e04a5f9419c3742cbe5f44cba2e02bbddec
SHA2569b8e08ea2aec28b88beb62643cdc73c1178033173690935d4fe63fd8dc22d2c4
SHA51257ebdf7507f18b5f9bf04248fad1397862d638f77152f683c941e71b7f6fad2116a48cffcf4a78793d8267b4113114934289111b2f846a3b2bea0e48bfb83790