Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-08-2024 23:03
Static task
static1
Behavioral task
behavioral1
Sample
2e4e86176bf859f065438ff3838f7ee634b52713d21295228805f33d4bb8f5f1.exe
Resource
win10v2004-20240802-en
General
-
Target
2e4e86176bf859f065438ff3838f7ee634b52713d21295228805f33d4bb8f5f1.exe
-
Size
1.8MB
-
MD5
36cf4ea06d474baa25cca0e55782025d
-
SHA1
49dc4e9f0a0bf5e558c255e38af668c5dc82049a
-
SHA256
2e4e86176bf859f065438ff3838f7ee634b52713d21295228805f33d4bb8f5f1
-
SHA512
2d18acb7b56b7f1ab83d1911309839a3c3b210c0819d44769739b7103726ab9fa7b738a440a3a4148117d3e6e92280edf2e603c15f20e6361c4041a97b937530
-
SSDEEP
49152:uPknQL8Fq6ywQJ/OXUpbw/IE5VIPsE2JY1hS:uPGQQF1sGEtiIUrWh
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
xworm
127.0.0.1:7000
beshomandotestbesnd.run.place:7000
-
Install_directory
%Userprofile%
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot2128988424:AAEkYnwvOQA95riqRZwlqBxg4GV-odRNOyo/sendMessage?chat_id=966649672
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0006000000025a1b-27.dat family_xworm behavioral2/memory/1016-41-0x0000000000560000-0x000000000057C000-memory.dmp family_xworm -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2e4e86176bf859f065438ff3838f7ee634b52713d21295228805f33d4bb8f5f1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4264 powershell.exe 2092 powershell.exe 356 powershell.exe 3064 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2e4e86176bf859f065438ff3838f7ee634b52713d21295228805f33d4bb8f5f1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2e4e86176bf859f065438ff3838f7ee634b52713d21295228805f33d4bb8f5f1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.lnk explorer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.lnk explorer.exe -
Executes dropped EXE 7 IoCs
pid Process 3580 axplong.exe 1016 explorer.exe 5104 LummaC22222.exe 1556 axplong.exe 5008 explorer 2940 axplong.exe 1568 explorer -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Software\Wine 2e4e86176bf859f065438ff3838f7ee634b52713d21295228805f33d4bb8f5f1.exe Key opened \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Software\Wine axplong.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\Software\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Users\\Admin\\explorer" explorer.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 5096 2e4e86176bf859f065438ff3838f7ee634b52713d21295228805f33d4bb8f5f1.exe 3580 axplong.exe 1556 axplong.exe 2940 axplong.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 2e4e86176bf859f065438ff3838f7ee634b52713d21295228805f33d4bb8f5f1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e4e86176bf859f065438ff3838f7ee634b52713d21295228805f33d4bb8f5f1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LummaC22222.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4480 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1016 explorer.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 5096 2e4e86176bf859f065438ff3838f7ee634b52713d21295228805f33d4bb8f5f1.exe 5096 2e4e86176bf859f065438ff3838f7ee634b52713d21295228805f33d4bb8f5f1.exe 3580 axplong.exe 3580 axplong.exe 3064 powershell.exe 3064 powershell.exe 4264 powershell.exe 4264 powershell.exe 2092 powershell.exe 2092 powershell.exe 356 powershell.exe 356 powershell.exe 1016 explorer.exe 1556 axplong.exe 1556 axplong.exe 2940 axplong.exe 2940 axplong.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1016 explorer.exe Token: SeDebugPrivilege 3064 powershell.exe Token: SeDebugPrivilege 4264 powershell.exe Token: SeDebugPrivilege 2092 powershell.exe Token: SeDebugPrivilege 356 powershell.exe Token: SeDebugPrivilege 1016 explorer.exe Token: SeDebugPrivilege 5008 explorer Token: SeDebugPrivilege 1568 explorer -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1016 explorer.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 5096 wrote to memory of 3580 5096 2e4e86176bf859f065438ff3838f7ee634b52713d21295228805f33d4bb8f5f1.exe 82 PID 5096 wrote to memory of 3580 5096 2e4e86176bf859f065438ff3838f7ee634b52713d21295228805f33d4bb8f5f1.exe 82 PID 5096 wrote to memory of 3580 5096 2e4e86176bf859f065438ff3838f7ee634b52713d21295228805f33d4bb8f5f1.exe 82 PID 3580 wrote to memory of 1016 3580 axplong.exe 84 PID 3580 wrote to memory of 1016 3580 axplong.exe 84 PID 3580 wrote to memory of 5104 3580 axplong.exe 85 PID 3580 wrote to memory of 5104 3580 axplong.exe 85 PID 3580 wrote to memory of 5104 3580 axplong.exe 85 PID 1016 wrote to memory of 3064 1016 explorer.exe 87 PID 1016 wrote to memory of 3064 1016 explorer.exe 87 PID 1016 wrote to memory of 4264 1016 explorer.exe 89 PID 1016 wrote to memory of 4264 1016 explorer.exe 89 PID 1016 wrote to memory of 2092 1016 explorer.exe 91 PID 1016 wrote to memory of 2092 1016 explorer.exe 91 PID 1016 wrote to memory of 356 1016 explorer.exe 93 PID 1016 wrote to memory of 356 1016 explorer.exe 93 PID 1016 wrote to memory of 4480 1016 explorer.exe 95 PID 1016 wrote to memory of 4480 1016 explorer.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e4e86176bf859f065438ff3838f7ee634b52713d21295228805f33d4bb8f5f1.exe"C:\Users\Admin\AppData\Local\Temp\2e4e86176bf859f065438ff3838f7ee634b52713d21295228805f33d4bb8f5f1.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\1000169001\explorer.exe"C:\Users\Admin\AppData\Local\Temp\1000169001\explorer.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1000169001\explorer.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'explorer.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\explorer'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'explorer'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:356
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "explorer" /tr "C:\Users\Admin\explorer"4⤵
- Scheduled Task/Job: Scheduled Task
PID:4480
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000170001\LummaC22222.exe"C:\Users\Admin\AppData\Local\Temp\1000170001\LummaC22222.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5104
-
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1556
-
C:\Users\Admin\explorerC:\Users\Admin\explorer1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
C:\Users\Admin\explorerC:\Users\Admin\explorer1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1568
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52cbbb74b7da1f720b48ed31085cbd5b8
SHA179caa9a3ea8abe1b9c4326c3633da64a5f724964
SHA256e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3
SHA512ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
944B
MD51a9fa92a4f2e2ec9e244d43a6a4f8fb9
SHA19910190edfaccece1dfcc1d92e357772f5dae8f7
SHA2560ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888
SHA5125d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64
-
Filesize
944B
MD569416944dac24129d0969e2ac46f0533
SHA1d71969659956b32411e0606a9bee640a0b108ef4
SHA256dffc7e01106427982d7cafd3d7e3be37e16b098fbb0958410ea8d7c68bfb97ca
SHA512aabb330053579af0d9de2661bd70eaadfd2e2e617759bc9c380db1c64731c6711304e49882138e9d337815377ee012a7458f91f692cb31538d73624385867f4c
-
Filesize
944B
MD56f0e62045515b66d0a0105abc22dbf19
SHA1894d685122f3f3c9a3457df2f0b12b0e851b394c
SHA256529811e4d3496c559f3bd92cd877b93b719c3ac4834202aa76ab9e16e25f9319
SHA512f78426df6032ee77f8c463446ab1c6bb4669ef7a2463dead831ec4ff83a07d7dc702d79372d8bcaf4594bf0fb6e11e9f027f3e0325de9b19be5f51b7b80ed54a
-
Filesize
87KB
MD57bc9e427746a95ed037db5e0b3230780
SHA1e5fb0551239eb8edf5b117b04a86742c7780355c
SHA2563d8b1b6802f265ff8eb229c38ff81824f3652f271eb97b7bfef86db369902a08
SHA512ae6e823d72a1a976401726ba3dfb61919bf529719fc555c680a99b3a58c15c982b9a8024d4ca2dab933acd1cc22c1f66bc0d46e7d0e7422825dad9c77852808b
-
Filesize
258KB
MD540e9f5e6b35423ed5af9a791fc6b8740
SHA175d24d3d05a855bb347f4e3a94eae4c38981aca9
SHA2567fdd7da7975da141ab5a48b856d24fba2ff35f52ad071119f6a83548494ba816
SHA512c2150dfb166653a2627aba466a6d98c0f426232542afc6a3c6fb5ebb04b114901233f51d57ea59dbef988d038d4103a637d9a51015104213b0be0fe09c96aea8
-
Filesize
624KB
MD5942af5a4ff2c48e982bc786fe8327ad8
SHA19901968dc98ddc0a9f34a5f099d8c15da59433e6
SHA2565cdda867f247f3875ab02f0466f0d444418b96cfa0c4f81dd131ebb0afa5b921
SHA5126d592db21e3c9888aea98f6f8be712a9a317f46e6511d932d97cc8171374803321070e1414d66666c238f8e23108ed07585f1a37ef118c3d5b193310901fbf88
-
Filesize
1.8MB
MD536cf4ea06d474baa25cca0e55782025d
SHA149dc4e9f0a0bf5e558c255e38af668c5dc82049a
SHA2562e4e86176bf859f065438ff3838f7ee634b52713d21295228805f33d4bb8f5f1
SHA5122d18acb7b56b7f1ab83d1911309839a3c3b210c0819d44769739b7103726ab9fa7b738a440a3a4148117d3e6e92280edf2e603c15f20e6361c4041a97b937530
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82