Analysis
-
max time kernel
143s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 19:32
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240705-en
General
-
Target
setup.exe
-
Size
1.8MB
-
MD5
c6620fe2690605f20f5b9c970e8130c6
-
SHA1
f5a500bab75cec90f2a004566cc61ef6484be12c
-
SHA256
ee170a14d676b69cab768f8a94e482ee9ad6dc1766038d6e26c24fe2cfbd7677
-
SHA512
c9d30d3000f27d6e2a49a6491ce31e371a6235d53e3e22d3b69d50a932f230f1c425c37ad4e64925418b590933fb4f79c391c895f31c91171930696b37aafbab
-
SSDEEP
49152:rWKMHFWJsNZi1WEzbfyDchLRg2ci2zjYlBwK:rWNlWS0dbfkQL22cJzsrV
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Signatures
-
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 2 IoCs
resource yara_rule behavioral2/files/0x000a000000023393-26.dat family_purelog_stealer behavioral2/memory/4848-41-0x0000000000080000-0x000000000018C000-memory.dmp family_purelog_stealer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation setup.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation ldx111.exe -
Executes dropped EXE 5 IoCs
pid Process 4676 axplong.exe 4848 ldx111.exe 6052 ldx111.exe 5308 axplong.exe 5440 axplong.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Wine setup.exe Key opened \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Wine axplong.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2244 setup.exe 4676 axplong.exe 5308 axplong.exe 5440 axplong.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4848 set thread context of 6052 4848 ldx111.exe 104 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ldx111.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ldx111.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ldx111.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ldx111.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 4028 timeout.exe 4688 timeout.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2244 setup.exe 2244 setup.exe 4676 axplong.exe 4676 axplong.exe 5308 axplong.exe 5308 axplong.exe 5440 axplong.exe 5440 axplong.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4848 ldx111.exe Token: SeDebugPrivilege 4848 ldx111.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 setup.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2244 wrote to memory of 4676 2244 setup.exe 87 PID 2244 wrote to memory of 4676 2244 setup.exe 87 PID 2244 wrote to memory of 4676 2244 setup.exe 87 PID 4676 wrote to memory of 4848 4676 axplong.exe 93 PID 4676 wrote to memory of 4848 4676 axplong.exe 93 PID 4676 wrote to memory of 4848 4676 axplong.exe 93 PID 4848 wrote to memory of 2216 4848 ldx111.exe 94 PID 4848 wrote to memory of 2216 4848 ldx111.exe 94 PID 4848 wrote to memory of 2216 4848 ldx111.exe 94 PID 2216 wrote to memory of 4028 2216 cmd.exe 96 PID 2216 wrote to memory of 4028 2216 cmd.exe 96 PID 2216 wrote to memory of 4028 2216 cmd.exe 96 PID 4848 wrote to memory of 3732 4848 ldx111.exe 100 PID 4848 wrote to memory of 3732 4848 ldx111.exe 100 PID 4848 wrote to memory of 3732 4848 ldx111.exe 100 PID 3732 wrote to memory of 4688 3732 cmd.exe 102 PID 3732 wrote to memory of 4688 3732 cmd.exe 102 PID 3732 wrote to memory of 4688 3732 cmd.exe 102 PID 4848 wrote to memory of 6052 4848 ldx111.exe 104 PID 4848 wrote to memory of 6052 4848 ldx111.exe 104 PID 4848 wrote to memory of 6052 4848 ldx111.exe 104 PID 4848 wrote to memory of 6052 4848 ldx111.exe 104 PID 4848 wrote to memory of 6052 4848 ldx111.exe 104 PID 4848 wrote to memory of 6052 4848 ldx111.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\1000031001\ldx111.exe"C:\Users\Admin\AppData\Local\Temp\1000031001\ldx111.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 104⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\timeout.exetimeout 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4028
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 104⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\timeout.exetimeout 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4688
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000031001\ldx111.exe"C:\Users\Admin\AppData\Local\Temp\1000031001\ldx111.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:6052
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5308
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD50a48fdb4519cfd9d0e03a5ed1c2333c6
SHA15929cda67aee22ecb44c00d3334d25b7d27ae6a5
SHA2562eb9d2a67aa9761b996f932affd2deab03145b56b96cb9f9ceebfbffc9e866a2
SHA512954fd758b3bf2f3134ff7a3849937a9a47e7d872a0d09917b954dad4f5b347242b2453da49e05a0cdc399d214b1be11f1ba453eb205b3c51694089fa6db717df
-
Filesize
1.8MB
MD5c6620fe2690605f20f5b9c970e8130c6
SHA1f5a500bab75cec90f2a004566cc61ef6484be12c
SHA256ee170a14d676b69cab768f8a94e482ee9ad6dc1766038d6e26c24fe2cfbd7677
SHA512c9d30d3000f27d6e2a49a6491ce31e371a6235d53e3e22d3b69d50a932f230f1c425c37ad4e64925418b590933fb4f79c391c895f31c91171930696b37aafbab