Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
1a6bfde328a3fafb86fa74cac8a25393986ac0ab06f3c86e2591ec50a712da00.exe
Resource
win7-20240729-en
General
-
Target
1a6bfde328a3fafb86fa74cac8a25393986ac0ab06f3c86e2591ec50a712da00.exe
-
Size
3.6MB
-
MD5
210444e5c9bb7a0e60900251cf3836cd
-
SHA1
6e63727ad8d97a4314bacf715045a9f845fb1f69
-
SHA256
1a6bfde328a3fafb86fa74cac8a25393986ac0ab06f3c86e2591ec50a712da00
-
SHA512
ac15b8d15966bdfe038ef7c7c77b9395c542e857c4bee60faed18bc52d2d5503361092aba69d455532ba158dba1eb5a2ed1b50bd696e8c8dd4cab848dd62b367
-
SSDEEP
49152:ZxUsRjupscg5yDBwRu8s/PJEiUJU3LhmQf6JSiQD81LhHXNof+BkERCWD8X4Vijd:XUsVupscgpJgm0iVj9W+L8WDFV+Moy3o
Malware Config
Extracted
amadey
4.30
4dd39d
http://77.91.77.82
-
install_dir
ad40971b6b
-
install_file
explorti.exe
-
strings_key
a434973ad22def7137dbb5e059b7081e
-
url_paths
/Hun4Ko/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 古韵外传(合击)2.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 古韵外传(合击)2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 古韵外传(合击)2.exe -
Executes dropped EXE 1 IoCs
pid Process 2620 古韵外传(合击)2.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 古韵外传(合击)2.exe -
Loads dropped DLL 1 IoCs
pid Process 2716 1a6bfde328a3fafb86fa74cac8a25393986ac0ab06f3c86e2591ec50a712da00.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2620 古韵外传(合击)2.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorti.job 古韵外传(合击)2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a6bfde328a3fafb86fa74cac8a25393986ac0ab06f3c86e2591ec50a712da00.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 古韵外传(合击)2.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2620 古韵外传(合击)2.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2716 1a6bfde328a3fafb86fa74cac8a25393986ac0ab06f3c86e2591ec50a712da00.exe 2620 古韵外传(合击)2.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2716 1a6bfde328a3fafb86fa74cac8a25393986ac0ab06f3c86e2591ec50a712da00.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2620 2716 1a6bfde328a3fafb86fa74cac8a25393986ac0ab06f3c86e2591ec50a712da00.exe 30 PID 2716 wrote to memory of 2620 2716 1a6bfde328a3fafb86fa74cac8a25393986ac0ab06f3c86e2591ec50a712da00.exe 30 PID 2716 wrote to memory of 2620 2716 1a6bfde328a3fafb86fa74cac8a25393986ac0ab06f3c86e2591ec50a712da00.exe 30 PID 2716 wrote to memory of 2620 2716 1a6bfde328a3fafb86fa74cac8a25393986ac0ab06f3c86e2591ec50a712da00.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a6bfde328a3fafb86fa74cac8a25393986ac0ab06f3c86e2591ec50a712da00.exe"C:\Users\Admin\AppData\Local\Temp\1a6bfde328a3fafb86fa74cac8a25393986ac0ab06f3c86e2591ec50a712da00.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Roaming\古韵外传(合击)2.exeC:\Users\Admin\AppData\Roaming\古韵外传(合击)2.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5b0abfe65f6de9238e3b03b6d5e115706
SHA1217ab85c40c8b968fd5193eaba20b841bb09e891
SHA25664d60ef089b79cb8815f8d802b23f5ac7179e02b85bde8f71afb7658221aedeb
SHA51287b8ca733d9ca2909b022a6b891c84833b240d9d3ab0c5e4af5b8aa099084e462faa7db7f784d89ceb525edde1497fa40b98ee1127429453cf95d2285703718c