Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-08-2024 01:34
Static task
static1
Behavioral task
behavioral1
Sample
e069df38101ae6dfccc79df77898745425b343698a3391aab13bd056eadf761b.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
e069df38101ae6dfccc79df77898745425b343698a3391aab13bd056eadf761b.exe
Resource
win11-20240802-en
General
-
Target
e069df38101ae6dfccc79df77898745425b343698a3391aab13bd056eadf761b.exe
-
Size
1.8MB
-
MD5
59e6967c28d4a09e8a7282ed1f9157b2
-
SHA1
f8fa914e790d40dcbd6c6bacbc748a7008fc8b67
-
SHA256
e069df38101ae6dfccc79df77898745425b343698a3391aab13bd056eadf761b
-
SHA512
7226aaaf052128d1ee4ee206ac632ebae291a24367556c95aa9843d93bdf6ca4454a9fc58cdde11df22ae539f832fc41199731e30345ff5d2e0c50387ede8d62
-
SSDEEP
49152:U2ALJ7tdS+KM6pUwgpM6ius6Hpys0H0T3aAi/U8:NALJ7tXqpUwgpBFs6MEX
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Signatures
-
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 2 IoCs
resource yara_rule behavioral2/files/0x000100000002aadc-26.dat family_purelog_stealer behavioral2/memory/4976-41-0x00000000009F0000-0x0000000000ADE000-memory.dmp family_purelog_stealer -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4976 created 3312 4976 Mswgoudnv.exe 53 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e069df38101ae6dfccc79df77898745425b343698a3391aab13bd056eadf761b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e069df38101ae6dfccc79df77898745425b343698a3391aab13bd056eadf761b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e069df38101ae6dfccc79df77898745425b343698a3391aab13bd056eadf761b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Executes dropped EXE 5 IoCs
pid Process 4532 axplong.exe 4976 Mswgoudnv.exe 3688 Mswgoudnv.exe 1976 axplong.exe 4276 axplong.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000\Software\Wine e069df38101ae6dfccc79df77898745425b343698a3391aab13bd056eadf761b.exe Key opened \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000\Software\Wine axplong.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000\Software\Microsoft\Windows\CurrentVersion\Run\afasdfga = "C:\\Users\\Admin\\AppData\\Roaming\\afasdfga.exe" Mswgoudnv.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3160 e069df38101ae6dfccc79df77898745425b343698a3391aab13bd056eadf761b.exe 4532 axplong.exe 1976 axplong.exe 4276 axplong.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4976 set thread context of 3688 4976 Mswgoudnv.exe 85 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job e069df38101ae6dfccc79df77898745425b343698a3391aab13bd056eadf761b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e069df38101ae6dfccc79df77898745425b343698a3391aab13bd056eadf761b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mswgoudnv.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3160 e069df38101ae6dfccc79df77898745425b343698a3391aab13bd056eadf761b.exe 3160 e069df38101ae6dfccc79df77898745425b343698a3391aab13bd056eadf761b.exe 4532 axplong.exe 4532 axplong.exe 4976 Mswgoudnv.exe 1976 axplong.exe 1976 axplong.exe 4276 axplong.exe 4276 axplong.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4976 Mswgoudnv.exe Token: SeDebugPrivilege 4976 Mswgoudnv.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3160 wrote to memory of 4532 3160 e069df38101ae6dfccc79df77898745425b343698a3391aab13bd056eadf761b.exe 83 PID 3160 wrote to memory of 4532 3160 e069df38101ae6dfccc79df77898745425b343698a3391aab13bd056eadf761b.exe 83 PID 3160 wrote to memory of 4532 3160 e069df38101ae6dfccc79df77898745425b343698a3391aab13bd056eadf761b.exe 83 PID 4532 wrote to memory of 4976 4532 axplong.exe 84 PID 4532 wrote to memory of 4976 4532 axplong.exe 84 PID 4532 wrote to memory of 4976 4532 axplong.exe 84 PID 4976 wrote to memory of 3688 4976 Mswgoudnv.exe 85 PID 4976 wrote to memory of 3688 4976 Mswgoudnv.exe 85 PID 4976 wrote to memory of 3688 4976 Mswgoudnv.exe 85 PID 4976 wrote to memory of 3688 4976 Mswgoudnv.exe 85 PID 4976 wrote to memory of 3688 4976 Mswgoudnv.exe 85 PID 4976 wrote to memory of 3688 4976 Mswgoudnv.exe 85 PID 4976 wrote to memory of 3688 4976 Mswgoudnv.exe 85 PID 4976 wrote to memory of 3688 4976 Mswgoudnv.exe 85
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\e069df38101ae6dfccc79df77898745425b343698a3391aab13bd056eadf761b.exe"C:\Users\Admin\AppData\Local\Temp\e069df38101ae6dfccc79df77898745425b343698a3391aab13bd056eadf761b.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\1000177001\Mswgoudnv.exe"C:\Users\Admin\AppData\Local\Temp\1000177001\Mswgoudnv.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4976
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000177001\Mswgoudnv.exe"C:\Users\Admin\AppData\Local\Temp\1000177001\Mswgoudnv.exe"2⤵
- Executes dropped EXE
PID:3688
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
924KB
MD5de64bb0f39113e48a8499d3401461cf8
SHA18d78c2d4701e4596e87e3f09adde214a2a2033e8
SHA25664b58794801f282e92571676e3571afc5c59033c262406bf0d36e1d6ef3cda6a
SHA51235b7cdcfb866dcdc79be34066a9ad5a8058b80e68925aeb23708606149841022de17e9d205389c13803c01e356174a2f657773df7d53f889e4e1fc1d68074179
-
Filesize
1.8MB
MD559e6967c28d4a09e8a7282ed1f9157b2
SHA1f8fa914e790d40dcbd6c6bacbc748a7008fc8b67
SHA256e069df38101ae6dfccc79df77898745425b343698a3391aab13bd056eadf761b
SHA5127226aaaf052128d1ee4ee206ac632ebae291a24367556c95aa9843d93bdf6ca4454a9fc58cdde11df22ae539f832fc41199731e30345ff5d2e0c50387ede8d62