Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-08-2024 23:49
Static task
static1
Behavioral task
behavioral1
Sample
d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe
Resource
win10v2004-20240802-en
General
-
Target
d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe
-
Size
1.8MB
-
MD5
7f4964d85ebd1d327bd74973b123cef3
-
SHA1
9f0f6893280fa4658daf4fcfce9d5b83c441b10b
-
SHA256
d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316
-
SHA512
b4db6eed1ae279b373ab8ed59e2f3d3d84a87dec789e951999f8327de791b5678f0adbd4615de92d5398ec2dce8119b1341d9d180c6a25ce2a23c9c8392a2396
-
SSDEEP
49152:fFWyfs9A3PMQSgbYHNNiP8/Cr9pWG17CD1zFHC/c+4:8y0ePLjbfu+keCPCE/
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe -
Executes dropped EXE 4 IoCs
pid Process 1412 axplong.exe 2028 2.exe 2780 axplong.exe 2228 axplong.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1735401866-3802634615-1355934272-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1735401866-3802634615-1355934272-1000\Software\Wine d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe Key opened \REGISTRY\USER\S-1-5-21-1735401866-3802634615-1355934272-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1735401866-3802634615-1355934272-1000\Software\Wine axplong.exe -
Loads dropped DLL 1 IoCs
pid Process 2028 2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4500 d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe 1412 axplong.exe 2780 axplong.exe 2228 axplong.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2028 set thread context of 3544 2028 2.exe 84 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1288 3544 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4500 d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe 4500 d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe 1412 axplong.exe 1412 axplong.exe 2780 axplong.exe 2780 axplong.exe 2228 axplong.exe 2228 axplong.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4500 d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4500 wrote to memory of 1412 4500 d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe 81 PID 4500 wrote to memory of 1412 4500 d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe 81 PID 4500 wrote to memory of 1412 4500 d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe 81 PID 1412 wrote to memory of 2028 1412 axplong.exe 82 PID 1412 wrote to memory of 2028 1412 axplong.exe 82 PID 1412 wrote to memory of 2028 1412 axplong.exe 82 PID 2028 wrote to memory of 3544 2028 2.exe 84 PID 2028 wrote to memory of 3544 2028 2.exe 84 PID 2028 wrote to memory of 3544 2028 2.exe 84 PID 2028 wrote to memory of 3544 2028 2.exe 84 PID 2028 wrote to memory of 3544 2028 2.exe 84 PID 2028 wrote to memory of 3544 2028 2.exe 84 PID 2028 wrote to memory of 3544 2028 2.exe 84 PID 2028 wrote to memory of 3544 2028 2.exe 84 PID 2028 wrote to memory of 3544 2028 2.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe"C:\Users\Admin\AppData\Local\Temp\d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\1000087001\2.exe"C:\Users\Admin\AppData\Local\Temp\1000087001\2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"4⤵PID:3544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3544 -s 4205⤵
- Program crash
PID:1288
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3544 -ip 35441⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2780
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
673KB
MD5b859d1252109669c1a82b235aaf40932
SHA1b16ea90025a7d0fad9196aa09d1091244af37474
SHA256083d9bc8566b22e67b553f9e0b2f3bf6fe292220665dcc2fc10942cdc192125c
SHA5129c0006055afd089ef2acbb253628494dd8c29bab9d5333816be8404f875c85ac342df82ae339173f853d3ebdb2261e59841352f78f6b4bd3bff3d0d606f30655
-
Filesize
1.8MB
MD57f4964d85ebd1d327bd74973b123cef3
SHA19f0f6893280fa4658daf4fcfce9d5b83c441b10b
SHA256d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316
SHA512b4db6eed1ae279b373ab8ed59e2f3d3d84a87dec789e951999f8327de791b5678f0adbd4615de92d5398ec2dce8119b1341d9d180c6a25ce2a23c9c8392a2396
-
Filesize
534KB
MD5a6da8d868dbd5c9fe6b505db0ee7eb71
SHA13dad32b3b3230ad6f44b82d1eb1749c67800c6f8
SHA2564ad69afb341c6d8021db1d9b0b7e56d14b020a0d70739e31f0b65861f3c4eb2c
SHA512132f54ac3116fd644c57840c893dae2128f571a784ceaa6dd78bafa3e05fc8f2a9d2458f1e1cf321b6cecc2423d3c57ff6d3c4b6b60f92a41b665105a3262dd0