Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 18:58
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240708-en
General
-
Target
setup.exe
-
Size
1.8MB
-
MD5
2a846c38fb95e0103773296f7e7794eb
-
SHA1
57957dc05264a8580d1494d0152018be250d22a3
-
SHA256
5f88cedcc10d3ed6d330e1223602452cb5fe1210e8d245a4c0a7ff1991a23373
-
SHA512
d35edbc153d607857a32c93a28e26c9672de679de94aea1c032b6a45ec402321f8beca3679073f50cc1aa8da94d5781424a7733dab3bafb65ce7e14a1d52aed2
-
SSDEEP
24576:oIvyMO1yy9rBJGj1vReUIRT8e+SMT5OClJ4xMwp/isDudUf+sDDLTjWJMKMy2xzQ:oQq98Id7MdOCluSo/xDu8pDDaMRCJ1l
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
axplong.exesetup.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ setup.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
setup.exeaxplong.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion setup.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
setup.exeaxplong.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation setup.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation axplong.exe -
Executes dropped EXE 2 IoCs
Processes:
axplong.exe2.exepid process 1568 axplong.exe 4500 2.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
axplong.exesetup.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Wine setup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
setup.exeaxplong.exepid process 5044 setup.exe 1568 axplong.exe -
Drops file in Windows directory 1 IoCs
Processes:
setup.exedescription ioc process File created C:\Windows\Tasks\axplong.job setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1728 4500 WerFault.exe 2.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
setup.exeaxplong.exe2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
2.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
setup.exeaxplong.exepid process 5044 setup.exe 5044 setup.exe 1568 axplong.exe 1568 axplong.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
setup.exepid process 5044 setup.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
setup.exeaxplong.exedescription pid process target process PID 5044 wrote to memory of 1568 5044 setup.exe axplong.exe PID 5044 wrote to memory of 1568 5044 setup.exe axplong.exe PID 5044 wrote to memory of 1568 5044 setup.exe axplong.exe PID 1568 wrote to memory of 4500 1568 axplong.exe 2.exe PID 1568 wrote to memory of 4500 1568 axplong.exe 2.exe PID 1568 wrote to memory of 4500 1568 axplong.exe 2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\1000030001\2.exe"C:\Users\Admin\AppData\Local\Temp\1000030001\2.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:4500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4500 -s 3564⤵
- Program crash
PID:1728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4500 -ip 45001⤵PID:2224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234KB
MD5e84a4d01a5798411eceeca1f08e91afb
SHA1709622d549935f42c3859d11aa5920c1782f32c1
SHA2562f77a81b5d02bfc389b9dc7705fad1afffca1ade7be88aeb96a4630f50c02717
SHA5129c933d40129ab75c67b6adf29c049055ea58e2e571a4223c03177b3140f93545a8b3298c28d60bfbc86649c56467a2941b29349c4d94c78da69f5cfadb66b73d
-
Filesize
1.8MB
MD52a846c38fb95e0103773296f7e7794eb
SHA157957dc05264a8580d1494d0152018be250d22a3
SHA2565f88cedcc10d3ed6d330e1223602452cb5fe1210e8d245a4c0a7ff1991a23373
SHA512d35edbc153d607857a32c93a28e26c9672de679de94aea1c032b6a45ec402321f8beca3679073f50cc1aa8da94d5781424a7733dab3bafb65ce7e14a1d52aed2